Mandatory Content Access Control for Privacy Protection in Information Centric Networks | 4 | 0.42 | 2017 |
LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code | 0 | 0.34 | 2016 |
Direct Resource Hijacking in Android | 0 | 0.34 | 2016 |
A Demonstration of Encrypted Logistics Information System. | 0 | 0.34 | 2016 |
Measuring and visualizing the contributions of Chinese and American LIS research institutions to emerging themes and salient themes | 3 | 0.51 | 2015 |
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures | 10 | 0.53 | 2015 |
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking | 13 | 0.65 | 2015 |
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning | 16 | 0.64 | 2015 |
Assessing Attack Surface with Component-Based Package Dependency | 7 | 0.47 | 2015 |
Invalidating Idealized BGP Security Proposals and Countermeasures | 5 | 0.48 | 2015 |
After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud | 39 | 1.15 | 2014 |
A Distortion-Based Approach to Privacy-Preserving Metering in Smart Grids | 9 | 0.50 | 2013 |
Protecting access privacy of cached contents in information centric networks. | 2 | 0.36 | 2013 |
Behavioral Attestation for Web Services Based Business Processes | 3 | 0.66 | 2010 |
MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services | 1 | 0.36 | 2010 |
Apex: extending Android permission model and enforcement with user-defined runtime constraints | 307 | 20.08 | 2010 |
pBMDS: a behavior-based malware detection system for cellphone devices | 58 | 3.67 | 2010 |
On leveraging stochastic models for remote attestation | 3 | 0.43 | 2010 |
A secure DVB set-top box via trusting computing technologies | 3 | 0.64 | 2010 |
DR@FT: efficient remote attestation framework for dynamic systems | 1 | 0.35 | 2010 |
Towards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms | 34 | 1.64 | 2010 |
Beyond kernel-level integrity measurement: enabling remote attestation for the android platform | 39 | 2.11 | 2010 |
VMDriver: A Driver-Based Monitoring Mechanism for Virtualization | 11 | 0.62 | 2010 |
DAuth: Fine-Grained Authorization Delegation for Distributed Web Application Consumers | 7 | 0.73 | 2010 |
Towards a Usage Control Policy Specification with Petri Nets | 4 | 0.39 | 2009 |
Designing System-Level Defenses against Cellphone Malware | 25 | 2.37 | 2009 |
Towards secure dynamic collaborations with group-based RBAC model | 17 | 0.74 | 2009 |
Securing elastic applications on mobile devices for cloud computing | 59 | 3.00 | 2009 |
Remote Attestation of Attribute Updates and Information Flows in a UCON System | 13 | 0.87 | 2009 |
Building a stateful reference monitor with coloured petri nets | 1 | 0.35 | 2009 |
Behavioral Attestation for Business Processes | 5 | 0.43 | 2009 |
Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure | 1 | 0.35 | 2009 |
Towards System Integrity Protection with Graph-Based Policy Analysis | 6 | 0.52 | 2009 |
Patient-centric authorization framework for sharing electronic health records | 36 | 1.86 | 2009 |
VirusMeter: Preventing Your Cellphone from Spies | 67 | 5.43 | 2009 |
A usage control policy specification with Petri nets | 1 | 0.35 | 2009 |
Exploitation and threat analysis of open mobile devices | 5 | 0.57 | 2009 |
Model-based behavioral attestation | 25 | 1.01 | 2008 |
Behavioral attestation for web services (BA4WS) | 13 | 0.75 | 2008 |
Access control in Group Communication Systems | 0 | 0.34 | 2008 |
Access Control Model for Sharing Composite Electronic Health Records | 1 | 0.35 | 2008 |
Toward a Usage-Based Security Framework for Collaborative Computing Systems | 49 | 1.87 | 2008 |
Security Enforcement Model for Distributed Usage Control | 14 | 0.70 | 2008 |
Towards a Group-Based RBAC Model and Decentralized User-Role Administration | 2 | 0.43 | 2008 |
Systematic Policy Analysis for High-Assurance Services in SELinux | 12 | 0.86 | 2008 |
Usage control platformization via trustworthy SELinux | 12 | 0.75 | 2008 |
A general obligation model and continuity: enhanced policy enforcement engine for usage control | 36 | 1.53 | 2008 |
A technical architecture for enforcing usage control requirements in service-oriented architectures | 7 | 0.54 | 2007 |
SecureBus: towards application-transparent trusted computing with mandatory access control | 5 | 0.45 | 2007 |
A Model-Driven Framework for Trusted Computing Based Systems | 11 | 0.67 | 2007 |