Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("NINGHUI LI")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 14 of 14

  • Page / 1
Export

Selection :

  • and

Beyond Separation of Duty : An Algebra for Specifying High-Level Security PoliciesNINGHUI LI; QIHUA WANG.Journal of the Association for Computing Machinery. 2008, Vol 55, Num 3, issn 0004-5411, 12.1-12.46Article

Purpose based access control for privacy protection in relational database systemsBYUN, Ji-Won; NINGHUI LI.The VLDB journal. 2008, Vol 17, Num 4, pp 603-619, issn 1066-8888, 17 p.Article

Beyond proof-of-compliance : Security analysis in trust managementNINGHUI LI; MITCHELL, John C; WINSBOROUGH, William H et al.Journal of the Association for Computing Machinery. 2005, Vol 52, Num 3, pp 474-514, issn 0004-5411, 41 p.Article

Safety in automated trust negotiationWINSBOROUGH, William H; NINGHUI LI.IEEE symposium on security and privacy. 2004, pp 147-160, isbn 0-7695-2136-3, 1Vol, 14 p.Conference Paper

Closeness: A New Privacy Measure for Data PublishingNINGHUI LI; TIANCHENG LI; VENKATASUBRAMANIAN, Suresh et al.IEEE transactions on knowledge and data engineering. 2010, Vol 22, Num 7, pp 943-956, issn 1041-4347, 14 p.Article

Nonmonotonicity, user interfaces, and risk assessment in certificate revocationNINGHUI LI; FEIGENBAUM, Joan.Lecture notes in computer science. 2002, pp 166-177, issn 0302-9743, isbn 3-540-44079-8, 12 p.Conference Paper

Privacy-preserving database systemsBERTINO, Elisa; BYUN, Ji-Won; NINGHUI LI et al.Lecture notes in computer science. 2005, pp 178-206, issn 0302-9743, isbn 3-540-29243-8, 1Vol, 29 p.Conference Paper

A construction for general and efficient oblivious commitment based envelope protocolsJIANGTAO LI; NINGHUI LI.Lecture notes in computer science. 2006, pp 122-138, issn 0302-9743, isbn 3-540-49496-0, 17 p.Conference Paper

DATALOG with constraints : A foundation for trust management languagesNINGHUI LI; MITCHELL, John C.Lecture notes in computer science. 2002, pp 58-73, issn 0302-9743, isbn 3-540-00389-4, 16 p.Conference Paper

A roadmap for comprehensive online privacy policy managementANTON, Annie I; BERTINO, Elisa; NINGHUI LI et al.Communications of the ACM. 2007, Vol 50, Num 7, pp 109-116, issn 0001-0782, 8 p.Article

OACerts : Oblivious attribute certificatesJIANGTAO LI; NINGHUI LI.Lecture notes in computer science. 2005, pp 301-317, issn 0302-9743, isbn 3-540-26223-7, 17 p.Conference Paper

Secure anonymization for incremental datasetsBYUN, Ji-Won; SOHN, Yonglak; BERTINO, Elisa et al.Lecture notes in computer science. 2006, pp 48-63, issn 0302-9743, isbn 3-540-38984-9, 1Vol, 16 p.Conference Paper

Distributed credential chain discovery in trust management with parameterized roles and constraintsZIQING MAO; NINGHUI LI; WINSBOROUGH, William H et al.Lecture notes in computer science. 2006, pp 159-173, issn 0302-9743, isbn 3-540-49496-0, 15 p.Conference Paper

Design of a role-based trust-management frameworkNINGHUI LI; MITCHELL, John C; WINSBOROUGH, William H et al.Proceedings - IEEE Symposium on Security and Privacy. 2002, pp 114-130, issn 1081-6011, isbn 0-7695-1543-6, 17 p.Conference Paper

  • Page / 1