2009 | ||
---|---|---|
91 | Qihua Wang, Hongxia Jin, Ninghui Li: Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging. ESORICS 2009: 268-284 | |
90 | Tiancheng Li, Xiaonan Ma, Ninghui Li: WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance. ESORICS 2009: 472-488 | |
89 | Ziqing Mao, Ninghui Li, Ian Molloy: Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection. Financial Cryptography 2009: 238-255 | |
88 | Tiancheng Li, Ninghui Li, Jian Zhang: Modeling and Integrating Background Knowledge in Data Anonymization. ICDE 2009: 6-17 | |
87 | Ian Molloy, Ninghui Li, Tiancheng Li: On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining. ICDM 2009: 872-877 | |
86 | Tiancheng Li, Ninghui Li: On the tradeoff between privacy and utility in data publishing. KDD 2009: 517-526 | |
85 | Hong Chen, Ninghui Li, Ziqing Mao: Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems. NDSS 2009 | |
84 | Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo, Dan Lin: Access control policy combining: theory meets practice. SACMAT 2009: 135-144 | |
83 | Guneshi T. Wickramaarachchi, Wahbeh H. Qardaji, Ninghui Li: An efficient framework for user authorization queries in RBAC systems. SACMAT 2009: 23-32 | |
82 | Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang: Trojan horse resistant discretionary access control. SACMAT 2009: 237-246 | |
81 | Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo: An algebra for fine-grained integration of XACML policies. SACMAT 2009: 63-72 | |
80 | Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, Qihua Wang, Jorge Lobo: Evaluating role mining algorithms. SACMAT 2009: 95-104 | |
79 | Ninghui Li: Homomorphic Encryption. Encyclopedia of Database Systems 2009: 1320 | |
78 | Ninghui Li: Asymmetric Encryption. Encyclopedia of Database Systems 2009: 142 | |
77 | Ninghui Li: Symmetric Encryption. Encyclopedia of Database Systems 2009: 2897-2898 | |
76 | Ninghui Li: Data Encryption. Encyclopedia of Database Systems 2009: 574 | |
75 | Ninghui Li, Qihua Wang, Mahesh V. Tripunitara: Resiliency Policies in Access Control. ACM Trans. Inf. Syst. Secur. 12(4): (2009) | |
74 | Tiancheng Li, Ninghui Li, Jian Zhang, Ian Molloy: Slicing: A New Approach to Privacy Preserving Data Publishing CoRR abs/0909.2290: (2009) | |
73 | Jiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu: Denial of service attacks and defenses in decentralized trust management. Int. J. Inf. Sec. 8(2): 89-101 (2009) | |
72 | Ji-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, Yonglak Sohn: Privacy-preserving incremental data dissemination. Journal of Computer Security 17(1): 43-68 (2009) | |
71 | Chenyun Dai, Gabriel Ghinita, Elisa Bertino, Ji-Won Byun, Ninghui Li: TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques. PVLDB 2(2): 1618-1621 (2009) | |
2008 | ||
70 | Indrakshi Ray, Ninghui Li: SACMAT 2008, 13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO, USA, June 11-13, 2008, Proceedings ACM 2008 | |
69 | Hong Chen, Xiaonan Ma, Windsor W. Hsu, Ninghui Li, Qihua Wang: Access Control Friendly Query Verification for Outsourced Data Publishing. ESORICS 2008: 177-191 | |
68 | Qihua Wang, Ninghui Li, Hong Chen: On the Security of Delegation in Access Control Systems. ESORICS 2008: 317-332 | |
67 | Tiancheng Li, Ninghui Li: Injector: Mining Background Knowledge for Data Anonymization. ICDE 2008: 446-455 | |
66 | Ninghui Li: How to make Discretionary Access Control secure against trojan horses. IPDPS 2008: 1-3 | |
65 | XiaoFeng Wang, Zhuowei Li, Ninghui Li, Jong Youl Choi: PRECIP: Towards Practical and Retrofittable Confidential Information Protection. NDSS 2008 | |
64 | Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo: EXAM: An Environment for Access Control Policy Analysis and Management. POLICY 2008: 238-240 | |
63 | Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo: Policy decomposition for collaborative access control. SACMAT 2008: 103-112 | |
62 | Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo: Mining roles with semantic meanings. SACMAT 2008: 21-30 | |
61 | Tiancheng Li, Ninghui Li: Towards optimal k-anonymization. Data Knowl. Eng. 65(1): 22-39 (2008) | |
60 | S. Jha, Ninghui Li, Mahesh V. Tripunitara, Qihua Wang, William H. Winsborough: Towards Formal Verification of Role-Based Access Control Policies. IEEE Trans. Dependable Sec. Comput. 5(4): 242-255 (2008) | |
59 | Ninghui Li, Qihua Wang: Beyond separation of duty: An algebra for specifying high-level security policies. J. ACM 55(3): (2008) | |
58 | Rui Xue, Ninghui Li, Jiangtao Li: Algebraic Construction for Zero-Knowledge Sets. J. Comput. Sci. Technol. 23(2): 166-175 (2008) | |
57 | Ji-Won Byun, Ninghui Li: Purpose based access control for privacy protection in relational database systems. VLDB J. 17(4): 603-619 (2008) | |
2007 | ||
56 | Jiangtao Li, Ninghui Li, Rui Xue: Universal Accumulators with Efficient Nonmembership Proofs. ACNS 2007: 253-269 | |
55 | Ninghui Li, Ziqing Mao: Administration in role-based access control. ASIACCS 2007: 127-138 | |
54 | Qihua Wang, Ninghui Li: Direct static enforcement of high-level security policies. ASIACCS 2007: 214-225 | |
53 | Ji-Won Byun, Ashish Kamra, Elisa Bertino, Ninghui Li: Efficient k -Anonymization Using Clustering Techniques. DASFAA 2007: 188-200 | |
52 | Qihua Wang, Ninghui Li: Satisfiability and Resiliency in Workflow Systems. ESORICS 2007: 90-105 | |
51 | Ian Molloy, Jiangtao Li, Ninghui Li: Dynamic Virtual Credit Card Numbers. Financial Cryptography 2007: 208-223 | |
50 | Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian: t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. ICDE 2007: 106-115 | |
49 | Ninghui Li, Ziqing Mao, Hong Chen: Usable Mandatory Integrity Protection for Operating Systems. IEEE Symposium on Security and Privacy 2007: 164-178 | |
48 | Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun: On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566 | |
47 | Ninghui Li, Mahesh V. Tripunitara, Ziad Bizri: On mutually exclusive roles and separation-of-duty. ACM Trans. Inf. Syst. Secur. 10(2): (2007) | |
46 | Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu: A roadmap for comprehensive online privacy policy management. Commun. ACM 50(7): 109-116 (2007) | |
45 | Ninghui Li, Ji-Won Byun, Elisa Bertino: A Critique of the ANSI Standard on Role-Based Access Control. IEEE Security & Privacy 5(6): 41-49 (2007) | |
44 | Mahesh V. Tripunitara, Ninghui Li: A theory for comparing the expressive power of access control models. Journal of Computer Security 15(2): 231-272 (2007) | |
2006 | ||
43 | Peng Ning, Sihan Qing, Ninghui Li: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings Springer 2006 | |
42 | Ninghui Li, Mahesh V. Tripunitara, Qihua Wang: Resiliency policies in access control. ACM Conference on Computer and Communications Security 2006: 113-123 | |
41 | Ninghui Li, Qihua Wang: Beyond separation of duty: an algebra for specifying high-level security policies. ACM Conference on Computer and Communications Security 2006: 356-369 | |
40 | Tiancheng Li, Ninghui Li: Optimal k-Anonymity with Flexible Generalization Schemes through Bottom-up Searching. ICDM Workshops 2006: 518-523 | |
39 | Jiangtao Li, Ninghui Li: A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols. ICICS 2006: 122-138 | |
38 | Ziqing Mao, Ninghui Li, William H. Winsborough: Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper). ICICS 2006: 159-173 | |
37 | Hong Chen, Ninghui Li: Constraint generation for separation of duty. SACMAT 2006: 130-138 | |
36 | Xiaoxin Wu, Ninghui Li: Achieving privacy in mesh networks. SASN 2006: 13-22 | |
35 | Ji-Won Byun, Yonglak Sohn, Elisa Bertino, Ninghui Li: Secure Anonymization for Incremental Datasets. Secure Data Management 2006: 48-63 | |
34 | William H. Winsborough, Ninghui Li: Safety in automated trust negotiation. ACM Trans. Inf. Syst. Secur. 9(3): 352-390 (2006) | |
33 | Ninghui Li, Mahesh V. Tripunitara: Security analysis in role-based access control. ACM Trans. Inf. Syst. Secur. 9(4): 391-420 (2006) | |
32 | Jiangtao Li, Ninghui Li: OACerts: Oblivious Attribute Certificates. IEEE Trans. Dependable Sec. Comput. 3(4): 340-352 (2006) | |
31 | Ninghui Li, John C. Mitchell: Understanding SPKI/SDSI using first-order logic. Int. J. Inf. Sec. 5(1): 48-64 (2006) | |
2005 | ||
30 | Jiangtao Li, Ninghui Li, William H. Winsborough: Automated trust negotiation using cryptographic credentials. ACM Conference on Computer and Communications Security 2005: 46-57 | |
29 | Jiangtao Li, Ninghui Li: OACerts: Oblivious Attribute Certificates. ACNS 2005: 301-317 | |
28 | Elisa Bertino, Ji-Won Byun, Ninghui Li: Privacy-Preserving Database Systems. FOSAD 2005: 178-206 | |
27 | Ninghui Li, Mahesh V. Tripunitara: On Safety in Discretionary Access Control. IEEE Symposium on Security and Privacy 2005: 96-109 | |
26 | Jiangtao Li, Ninghui Li: Policy-hiding access control in open environment. PODC 2005: 29-38 | |
25 | Ji-Won Byun, Elisa Bertino, Ninghui Li: Purpose based access control of complex data for privacy protection. SACMAT 2005: 102-110 | |
24 | Ninghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. Distributed Computing 17(4): 293-302 (2005) | |
23 | Ninghui Li, John C. Mitchell, William H. Winsborough: Beyond proof-of-compliance: security analysis in trust management. J. ACM 52(3): 474-514 (2005) | |
2004 | ||
22 | Ninghui Li, Ziad Bizri, Mahesh V. Tripunitara: On mutually-exclusive roles and separation of duty. ACM Conference on Computer and Communications Security 2004: 42-51 | |
21 | Mahesh V. Tripunitara, Ninghui Li: Comparing the expressive power of access control models. ACM Conference on Computer and Communications Security 2004: 62-71 | |
20 | Ninghui Li, John C. Mitchell, Derrick Tong: Securing Java RMI-Based Distributed Applications. ACSAC 2004: 262-271 | |
19 | William H. Winsborough, Ninghui Li: Safety in Automated Trust Negotiation. IEEE Symposium on Security and Privacy 2004: 147-160 | |
18 | Cristina Nita-Rotaru, Ninghui Li: A Framework for Role-Based Access Control in Group Communication Systems. ISCA PDCS 2004: 522-529 | |
17 | Ninghui Li, Mahesh V. Tripunitara: Security analysis in role-based access control. SACMAT 2004: 126-135 | |
16 | Ting Yu, Ninghui Li, Annie I. Antón: A formal semantics for P3P. SWS 2004: 1-8 | |
2003 | ||
15 | Ninghui Li, John C. Mitchell: Understanding SPKI/SDSI Using First-Order Logic. CSFW 2003: 89- | |
14 | Ninghui Li, John C. Mitchell: A Role-based Trust-management Framework. DISCEX (1) 2003: 201- | |
13 | Ninghui Li, William H. Winsborough, John C. Mitchell: Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. IEEE Symposium on Security and Privacy 2003: 123-139 | |
12 | Ninghui Li, John C. Mitchell: DATALOG with Constraints: A Foundation for Trust Management Languages. PADL 2003: 58-73 | |
11 | Ninghui Li, Wenliang Du, Dan Boneh: Oblivious signature-based envelope. PODC 2003: 182-189 | |
10 | Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum: Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur. 6(1): 128-171 (2003) | |
9 | Ninghui Li, William H. Winsborough, John C. Mitchell: Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security 11(1): 35-86 (2003) | |
2002 | ||
8 | Ninghui Li, John C. Mitchell, William H. Winsborough: Design of a Role-Based Trust-Management Framework. IEEE Symposium on Security and Privacy 2002: 114-130 | |
7 | William H. Winsborough, Ninghui Li: Towards Practical Automated Trust Negotiation. POLICY 2002: 92-103 | |
6 | William H. Winsborough, Ninghui Li: Protecting sensitive attributes in automated trust negotiation. WPES 2002: 41-51 | |
2001 | ||
5 | Ninghui Li, William H. Winsborough, John C. Mitchell: Distributed credential chain discovery in trust management: extended abstract. ACM Conference on Computer and Communications Security 2001: 156-165 | |
4 | Ninghui Li, Joan Feigenbaum: Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation. Financial Cryptography 2001: 157-168 | |
2000 | ||
3 | Ninghui Li: Local Names in SPKI/SDSI. CSFW 2000: 2-15 | |
2 | Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum: A Practically Implementable and Tractable Delegation Logic. IEEE Symposium on Security and Privacy 2000: 27-42 | |
1999 | ||
1 | Ninghui Li, Joan Feigenbaum, Benjamin N. Grosof: A Logic-based Knowledge Representation for Authorization with Delegation. CSFW 1999: 162-174 |