关注
Ninghui Li
Ninghui Li
Professor of Computer Science, Purdue University
在 cs.purdue.edu 的电子邮件经过验证 - 首页
标题
引用次数
年份
{PolyScope}:{Multi-Policy} Access Control Analysis to Compute Authorized Attack Operations in Android Systems
YT Lee, W Enck, H Chen, H Vijayakumar, N Li, Z Qian, D Wang, ...
30th USENIX Security Symposium (USENIX Security 21), 2579-2596, 2021
162021
{PrivSyn}: Differentially private data synthesis
Z Zhang, T Wang, N Li, J Honorio, M Backes, S He, J Chen, Y Zhang
30th USENIX Security Symposium (USENIX Security 21), 929-946, 2021
962021
2008 Index IEEE Transactions on Dependable and Secure Computing Vol. 5
S Bagchi, E Bertino, B Blanchet, D Brumley, J Chandrashekar, ...
Computer networks 87, 98, 2008
2008
2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)| 978-1-7281-8543-9/20/$31.00© 2020 IEEE| DOI: 10.1109 …
S Abuadbba, A Abusnaina, GJ Ahn, A Al-Alaj, M Anisetti, CA Ardagna, ...
A construction for general and efficient oblivious commitment based envelope protocols
J Li, N Li
Information and Communications Security: 8th International Conference, ICICS …, 2006
142006
A critique of the ANSI standard on role-based access control
N Li, JW Byun, E Bertino
IEEE Security & Privacy 5 (6), 41-49, 2007
1292007
A formal language for specifying policy combining algorithms in access control
N Li, Q Wang, P Rao, D Lin, E Bertino, J Lobo
CERIAS.(Cited on pages 88 and 112.), Tech. Rep., 2008-9, 2008
102008
A formal semantics for P3P
T Yu, N Li, AI Antón
Proceedings of the 2004 workshop on Secure web service, 1-8, 2004
882004
A Framework for Role Based Access control in Group Communication Systems
CN Rotaru, N Li
IEEE Proceedings of the 17th International Conference on Parallel and …, 2004
72004
A framework for role-based access control in group communication systems
N Li, C Nita-Rotaru
Purdue University, 2003
62003
A Framework for Role-Based Access Control in Group Communication Systems.
C Nita-Rotaru, N Li
PDCS, 522-529, 2004
232004
A logic-based knowledge representation for authorization with delegation
N Li, J Feigenbaum, BN Grosof
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 162-174, 1999
1471999
A new construction of zero-knowledge sets secure in Random oracle Model
R Xue, N Li, J Li
The First International Symposium on Data, Privacy, and E-Commerce (ISDPE …, 2007
32007
A nonmonotonic delegation logic with prioritized conflict handling
N Li, BN Grosof, J Feigenbaum
Unpublished manuscript, 2000
82000
A Policy Management Tool for Fine-Grained Database Access Control
N Li, P Liu, T Yu
A practically implementable and tractable delegation logic
N Li, B Grosof, J Feigenbaum
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 27-42, 2000
1582000
A probabilistic discriminative model for android malware detection with decompiled source code
L Cen, CS Gates, L Si, N Li
IEEE Transactions on Dependable and Secure Computing 12 (4), 400-412, 2014
1732014
A roadmap for comprehensive online privacy policy management
AI Antón, E Bertino, N Li, T Yu
Communications of the ACM 50 (7), 109-116, 2007
1422007
A Roadmap For Comprehensive Online Privacy Policy Management A framework supporting the privacy policy life cycle helps guide the kind of research to consider before sound …
AI Antón, E Bertino, N Li, T Yu
A semantics based approach to privacy languages
N Li, T Yu, A Anton
Computer Systems Science and Engineering 21 (5), 339, 2006
422006
系统目前无法执行此操作,请稍后再试。
文章 1–20