2008 |
5 | EE | Qi Cui,
Wenchang Shi:
An Approach for Compliance Validation of Trusted Computing Applications.
WKDD 2008: 574-579 |
2006 |
4 | EE | Yanjun Wu,
Wenchang Shi:
Portal monitoring based anti-malware framework: design and implementation.
IPCCC 2006 |
2005 |
3 | EE | Bin Liang,
Heng Liu,
Wenchang Shi,
Yanjun Wu:
Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model.
ISPEC 2005: 109-120 |
2 | EE | Yanjun Wu,
Wenchang Shi,
Hongliang Liang,
Qinghua Shang,
Chunyang Yuan,
Bin Liang:
Security On-demand Architecture with Multiple Modules Support.
ISPEC 2005: 121-131 |
1 | EE | Zhouyi Zhou,
Bin Liang,
Li Jiang,
Wenchang Shi,
Yeping He:
A Formal Description of SECIMOS Operating System.
MMM-ACNS 2005: 286-297 |