{PolyScope}:{Multi-Policy} Access Control Analysis to Compute Authorized Attack Operations in Android Systems YT Lee, W Enck, H Chen, H Vijayakumar, N Li, Z Qian, D Wang, ... 30th USENIX Security Symposium (USENIX Security 21), 2579-2596, 2021 | 16 | 2021 |
{PrivSyn}: Differentially private data synthesis Z Zhang, T Wang, N Li, J Honorio, M Backes, S He, J Chen, Y Zhang 30th USENIX Security Symposium (USENIX Security 21), 929-946, 2021 | 96 | 2021 |
2008 Index IEEE Transactions on Dependable and Secure Computing Vol. 5 S Bagchi, E Bertino, B Blanchet, D Brumley, J Chandrashekar, ... Computer networks 87, 98, 2008 | | 2008 |
2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)| 978-1-7281-8543-9/20/$31.00© 2020 IEEE| DOI: 10.1109 … S Abuadbba, A Abusnaina, GJ Ahn, A Al-Alaj, M Anisetti, CA Ardagna, ... | | |
A construction for general and efficient oblivious commitment based envelope protocols J Li, N Li Information and Communications Security: 8th International Conference, ICICS …, 2006 | 14 | 2006 |
A critique of the ANSI standard on role-based access control N Li, JW Byun, E Bertino IEEE Security & Privacy 5 (6), 41-49, 2007 | 129 | 2007 |
A formal language for specifying policy combining algorithms in access control N Li, Q Wang, P Rao, D Lin, E Bertino, J Lobo CERIAS.(Cited on pages 88 and 112.), Tech. Rep., 2008-9, 2008 | 10 | 2008 |
A formal semantics for P3P T Yu, N Li, AI Antón Proceedings of the 2004 workshop on Secure web service, 1-8, 2004 | 88 | 2004 |
A Framework for Role Based Access control in Group Communication Systems CN Rotaru, N Li IEEE Proceedings of the 17th International Conference on Parallel and …, 2004 | 7 | 2004 |
A framework for role-based access control in group communication systems N Li, C Nita-Rotaru Purdue University, 2003 | 6 | 2003 |
A Framework for Role-Based Access Control in Group Communication Systems. C Nita-Rotaru, N Li PDCS, 522-529, 2004 | 23 | 2004 |
A logic-based knowledge representation for authorization with delegation N Li, J Feigenbaum, BN Grosof Proceedings of the 12th IEEE Computer Security Foundations Workshop, 162-174, 1999 | 147 | 1999 |
A new construction of zero-knowledge sets secure in Random oracle Model R Xue, N Li, J Li The First International Symposium on Data, Privacy, and E-Commerce (ISDPE …, 2007 | 3 | 2007 |
A nonmonotonic delegation logic with prioritized conflict handling N Li, BN Grosof, J Feigenbaum Unpublished manuscript, 2000 | 8 | 2000 |
A Policy Management Tool for Fine-Grained Database Access Control N Li, P Liu, T Yu | | |
A practically implementable and tractable delegation logic N Li, B Grosof, J Feigenbaum Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 27-42, 2000 | 158 | 2000 |
A probabilistic discriminative model for android malware detection with decompiled source code L Cen, CS Gates, L Si, N Li IEEE Transactions on Dependable and Secure Computing 12 (4), 400-412, 2014 | 173 | 2014 |
A roadmap for comprehensive online privacy policy management AI Antón, E Bertino, N Li, T Yu Communications of the ACM 50 (7), 109-116, 2007 | 142 | 2007 |
A Roadmap For Comprehensive Online Privacy Policy Management A framework supporting the privacy policy life cycle helps guide the kind of research to consider before sound … AI Antón, E Bertino, N Li, T Yu | | |
A semantics based approach to privacy languages N Li, T Yu, A Anton Computer Systems Science and Engineering 21 (5), 339, 2006 | 42 | 2006 |