Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing H Qiao, J Ren, Z Wang, H Ba, H Zhou Future Generation Computer Systems 88, 107-116, 2018 | 33 | 2018 |
Tenants attested trusted cloud service J Ren, L Liu, D Zhang, Q Zhang, H Ba 2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 600-607, 2016 | 14 | 2016 |
Practical, provably secure, and black-box traceable CP-ABE for cryptographic cloud storage H Qiao, H Ba, H Zhou, Z Wang, J Ren, Y Hu Symmetry 10 (10), 482, 2018 | 10 | 2018 |
Tenant-oriented monitoring for customized security services in the cloud H Zhou, H Ba, Y Wang, Z Wang, J Ma, Y Li, H Qiao Symmetry 11 (2), 252, 2019 | 6 | 2019 |
jMonAtt: Integrity monitoring and attestation of jvm-based applications in cloud computing H Ba, H Zhou, S Bai, J Ren, Z Wang, L Ci 2017 4th International Conference on Information Science and Control …, 2017 | 6 | 2017 |
RIM4J: An Architecture for Language-Supported Runtime Measurement against Malicious Bytecode in Cloud Computing H Ba, H Zhou, H Qiao, Z Wang, J Ren Symmetry 10 (7), 253, 2018 | 5 | 2018 |
User-policy-based dynamic remote attestation in cloud computing H Ba, J Ren, Z Wang, H Zhou, Y Li, T Hong International Journal of Embedded Systems 8 (1), 39-45, 2016 | 5 | 2016 |
Astrape: An efficient concurrent cloud attestation with ciphertext-policy attribute-based encryption H Ba, H Zhou, S Mei, H Qiao, T Hong, Z Wang, J Ren Symmetry 10 (10), 425, 2018 | 4 | 2018 |
Agentless and uniform introspection for various security services in iaas cloud H Zhou, H Ba, J Ren, Y Wang, Y Li, Y Chen, Z Wang 2017 4th International Conference on Information Science and Control …, 2017 | 4 | 2017 |
On the detection of malicious behaviors against introspection using hardware architectural events H Zhou, H Ba, Y Wang, T Hong IEICE TRANSACTIONS on Information and Systems 103 (1), 177-180, 2020 | 3 | 2020 |
Dynamic evaluation of consumer satisfaction based on the grey prediction model S Bai, J Ren, H Ba, H Zhou, R Yang 2017 4th International Conference on Information Science and Control …, 2017 | 3 | 2017 |
Application-assisted dynamic attestation for jvm-based cloud H Ba, H Zhou, Z Wang, J Ren, T Hong, Y Li Algorithms and Architectures for Parallel Processing: ICA3PP International …, 2015 | 3 | 2015 |
Jvm-based dynamic attestation in cloud computing H Ba, Z Wang, J Ren, H Zhou 2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014 | 3 | 2014 |
Runtime Measurement Architecture for Bytecode Integrity in JVM-Based Cloud H Ba, H Zhou, J Ren, Z Wang 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), 262-263, 2017 | 2 | 2017 |
Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection H Zhou, H Ba, J Ren, Y Wang, Z Wang, Y Li Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2017 | 1 | 2017 |
Dynamic Remote Attestation Service for Virtual Machine on the IaaS Cloud Platform H Zhou, H Ba, J Ren, Y Chen, Y Wang, Z Wang 2017 International Conference on Network and Information Systems for …, 2017 | | 2017 |
OBC Based Optimization of Re-encryption for Cryptographic Cloud Storage H Qiao, J Ren, Z Wang, H Ba, H Zhou, T Hong International Conference on Algorithms and Architectures for Parallel …, 2016 | | 2016 |