2009 |
11 | EE | Qihua Wang,
Hongxia Jin:
Selective message distribution with people-tagging in user-collaborative environments.
CHI Extended Abstracts 2009: 4549-4554 |
2008 |
10 | EE | Hong Chen,
Xiaonan Ma,
Windsor W. Hsu,
Ninghui Li,
Qihua Wang:
Access Control Friendly Query Verification for Outsourced Data Publishing.
ESORICS 2008: 177-191 |
9 | EE | Qihua Wang,
Ninghui Li,
Hong Chen:
On the Security of Delegation in Access Control Systems.
ESORICS 2008: 317-332 |
8 | EE | Ian Molloy,
Hong Chen,
Tiancheng Li,
Qihua Wang,
Ninghui Li,
Elisa Bertino,
Seraphin B. Calo,
Jorge Lobo:
Mining roles with semantic meanings.
SACMAT 2008: 21-30 |
7 | EE | S. Jha,
Ninghui Li,
Mahesh V. Tripunitara,
Qihua Wang,
William H. Winsborough:
Towards Formal Verification of Role-Based Access Control Policies.
IEEE Trans. Dependable Sec. Comput. 5(4): 242-255 (2008) |
6 | EE | Ninghui Li,
Qihua Wang:
Beyond separation of duty: An algebra for specifying high-level security policies.
J. ACM 55(3): (2008) |
2007 |
5 | EE | Qihua Wang,
Ninghui Li:
Direct static enforcement of high-level security policies.
ASIACCS 2007: 214-225 |
4 | EE | Qihua Wang,
Ninghui Li:
Satisfiability and Resiliency in Workflow Systems.
ESORICS 2007: 90-105 |
3 | EE | Qihua Wang,
Ting Yu,
Ninghui Li,
Jorge Lobo,
Elisa Bertino,
Keith Irwin,
Ji-Won Byun:
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases.
VLDB 2007: 555-566 |
2006 |
2 | EE | Ninghui Li,
Mahesh V. Tripunitara,
Qihua Wang:
Resiliency policies in access control.
ACM Conference on Computer and Communications Security 2006: 113-123 |
1 | EE | Ninghui Li,
Qihua Wang:
Beyond separation of duty: an algebra for specifying high-level security policies.
ACM Conference on Computer and Communications Security 2006: 356-369 |