2008 |
17 | EE | Cungang Yang,
Celia Li,
Jie Xiao:
Location-based design for secure and efficient wireless sensor networks.
Computer Networks 52(16): 3119-3129 (2008) |
2007 |
16 | EE | Xiaoyan Chen,
Bobby N. W. Ma,
Cungang Yang:
M-CLIQUES: Modified CLIQUES key agreement for secure multicast.
Computers & Security 26(3): 238-245 (2007) |
15 | EE | Cungang Yang:
Designing secure e-commerce with role-based access control.
Int. J. Web Eng. Technol. 3(1): 73-95 (2007) |
14 | EE | Celia Li,
Cungang Yang,
Richard Cheung:
Key management for role hierarchy in distributed systems.
J. Network and Computer Applications 30(3): 920-936 (2007) |
2006 |
13 | EE | Cungang Yang,
Chang N. Zhang:
An Approach to XML-Based Administration and Secure Information Flow Analysis on an Object Oriented Role-Based Access Control Model.
J. Inf. Sci. Eng. 22(1): 49-61 (2006) |
2005 |
12 | EE | Celia Li,
Cungang Yang,
Richard Cheung:
Key Management for Role Hierarchy in Distributed Systems.
ACISP 2005: 293-302 |
11 | EE | Cungang Yang,
Chang N. Zhang:
A Privacy Enhanced Role-Based Access Control Model for Enterprises.
ICCNMC 2005: 1012-1021 |
2004 |
10 | EE | Cungang Yang,
Celia Li:
Access control in a hierarchy using one-way hash functions.
Computers & Security 23(8): 659-664 (2004) |
9 | | Cungang Yang,
Celia Li,
Chang N. Zhang:
An XML-Based Administration Method on Role-Based Access Control in Distributed Systems.
I. J. Comput. Appl. 11(2): 98-105 (2004) |
2003 |
8 | EE | Cungang Yang,
Chang N. Zhang:
Designing Secure E-Commerce with Role-based Access Control.
CEC 2003: 313-319 |
7 | | Cungang Yang,
Chang N. Zhang:
Secure Web-based Applications with XML and RBAC.
IAW 2003: 276-281 |
6 | | Cungang Yang,
Chang N. Zhang:
An XML Based Administration Method on Role-Based Access Control in the Enterprise Environment.
ICEIS (3) 2003: 646-649 |
5 | | Cungang Yang,
Chang N. Zhang:
An Approach to Secure Information Flow on Object Oriented Role-based Access Control Model.
SAC 2003: 302-306 |
4 | EE | Cungang Yang,
Chang N. Zhang:
An XML-based administration method on role-based access control in the enterprise environment.
Inf. Manag. Comput. Security 11(5): 249-257 (2003) |
2002 |
3 | EE | Chang N. Zhang,
Cungang Yang:
Information flow analysis on role-based access control model.
Inf. Manag. Comput. Security 10(5): 225-236 (2002) |
2 | EE | Chang N. Zhang,
Cungang Yang:
Designing a Complete Model of Role-based Access Control System for Distributed Networks.
J. Inf. Sci. Eng. 18(6): 871-889 (2002) |
2001 |
1 | EE | Chang N. Zhang,
Cungang Yang:
An Object-Oriented RBAC Model for Distributed System.
WICSA 2001: 24- |