Name
Papers
Collaborators
ZHANG XINWEN
73
96
Citations 
PageRank 
Referers 
1695
104.61
3487
Referees 
References 
1534
1046
Search Limit
1001000
Title
Citations
PageRank
Year
Mandatory Content Access Control for Privacy Protection in Information Centric Networks40.422017
LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code00.342016
Direct Resource Hijacking in Android00.342016
A Demonstration of Encrypted Logistics Information System.00.342016
Measuring and visualizing the contributions of Chinese and American LIS research institutions to emerging themes and salient themes30.512015
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures100.532015
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking130.652015
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning160.642015
Assessing Attack Surface with Component-Based Package Dependency70.472015
Invalidating Idealized BGP Security Proposals and Countermeasures50.482015
After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud391.152014
A Distortion-Based Approach to Privacy-Preserving Metering in Smart Grids90.502013
Protecting access privacy of cached contents in information centric networks.20.362013
Behavioral Attestation for Web Services Based Business Processes30.662010
MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services10.362010
Apex: extending Android permission model and enforcement with user-defined runtime constraints30720.082010
pBMDS: a behavior-based malware detection system for cellphone devices583.672010
On leveraging stochastic models for remote attestation30.432010
A secure DVB set-top box via trusting computing technologies30.642010
DR@FT: efficient remote attestation framework for dynamic systems10.352010
Towards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms341.642010
Beyond kernel-level integrity measurement: enabling remote attestation for the android platform392.112010
VMDriver: A Driver-Based Monitoring Mechanism for Virtualization110.622010
DAuth: Fine-Grained Authorization Delegation for Distributed Web Application Consumers70.732010
Towards a Usage Control Policy Specification with Petri Nets40.392009
Designing System-Level Defenses against Cellphone Malware252.372009
Towards secure dynamic collaborations with group-based RBAC model170.742009
Securing elastic applications on mobile devices for cloud computing593.002009
Remote Attestation of Attribute Updates and Information Flows in a UCON System130.872009
Building a stateful reference monitor with coloured petri nets10.352009
Behavioral Attestation for Business Processes50.432009
Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure10.352009
Towards System Integrity Protection with Graph-Based Policy Analysis60.522009
Patient-centric authorization framework for sharing electronic health records361.862009
VirusMeter: Preventing Your Cellphone from Spies675.432009
A usage control policy specification with Petri nets10.352009
Exploitation and threat analysis of open mobile devices50.572009
Model-based behavioral attestation251.012008
Behavioral attestation for web services (BA4WS)130.752008
Access control in Group Communication Systems00.342008
Access Control Model for Sharing Composite Electronic Health Records10.352008
Toward a Usage-Based Security Framework for Collaborative Computing Systems491.872008
Security Enforcement Model for Distributed Usage Control140.702008
Towards a Group-Based RBAC Model and Decentralized User-Role Administration20.432008
Systematic Policy Analysis for High-Assurance Services in SELinux120.862008
Usage control platformization via trustworthy SELinux120.752008
A general obligation model and continuity: enhanced policy enforcement engine for usage control361.532008
A technical architecture for enforcing usage control requirements in service-oriented architectures70.542007
SecureBus: towards application-transparent trusted computing with mandatory access control50.452007
A Model-Driven Framework for Trusted Computing Based Systems110.672007
  • 1
  • 2