au.\*:("NINGHUI LI")
Results 1 to 14 of 14
Selection :
Beyond Separation of Duty : An Algebra for Specifying High-Level Security PoliciesNINGHUI LI; QIHUA WANG.Journal of the Association for Computing Machinery. 2008, Vol 55, Num 3, issn 0004-5411, 12.1-12.46Article
Purpose based access control for privacy protection in relational database systemsBYUN, Ji-Won; NINGHUI LI.The VLDB journal. 2008, Vol 17, Num 4, pp 603-619, issn 1066-8888, 17 p.Article
Beyond proof-of-compliance : Security analysis in trust managementNINGHUI LI; MITCHELL, John C; WINSBOROUGH, William H et al.Journal of the Association for Computing Machinery. 2005, Vol 52, Num 3, pp 474-514, issn 0004-5411, 41 p.Article
Safety in automated trust negotiationWINSBOROUGH, William H; NINGHUI LI.IEEE symposium on security and privacy. 2004, pp 147-160, isbn 0-7695-2136-3, 1Vol, 14 p.Conference Paper
Closeness: A New Privacy Measure for Data PublishingNINGHUI LI; TIANCHENG LI; VENKATASUBRAMANIAN, Suresh et al.IEEE transactions on knowledge and data engineering. 2010, Vol 22, Num 7, pp 943-956, issn 1041-4347, 14 p.Article
Nonmonotonicity, user interfaces, and risk assessment in certificate revocationNINGHUI LI; FEIGENBAUM, Joan.Lecture notes in computer science. 2002, pp 166-177, issn 0302-9743, isbn 3-540-44079-8, 12 p.Conference Paper
Privacy-preserving database systemsBERTINO, Elisa; BYUN, Ji-Won; NINGHUI LI et al.Lecture notes in computer science. 2005, pp 178-206, issn 0302-9743, isbn 3-540-29243-8, 1Vol, 29 p.Conference Paper
A construction for general and efficient oblivious commitment based envelope protocolsJIANGTAO LI; NINGHUI LI.Lecture notes in computer science. 2006, pp 122-138, issn 0302-9743, isbn 3-540-49496-0, 17 p.Conference Paper
DATALOG with constraints : A foundation for trust management languagesNINGHUI LI; MITCHELL, John C.Lecture notes in computer science. 2002, pp 58-73, issn 0302-9743, isbn 3-540-00389-4, 16 p.Conference Paper
A roadmap for comprehensive online privacy policy managementANTON, Annie I; BERTINO, Elisa; NINGHUI LI et al.Communications of the ACM. 2007, Vol 50, Num 7, pp 109-116, issn 0001-0782, 8 p.Article
OACerts : Oblivious attribute certificatesJIANGTAO LI; NINGHUI LI.Lecture notes in computer science. 2005, pp 301-317, issn 0302-9743, isbn 3-540-26223-7, 17 p.Conference Paper
Secure anonymization for incremental datasetsBYUN, Ji-Won; SOHN, Yonglak; BERTINO, Elisa et al.Lecture notes in computer science. 2006, pp 48-63, issn 0302-9743, isbn 3-540-38984-9, 1Vol, 16 p.Conference Paper
Distributed credential chain discovery in trust management with parameterized roles and constraintsZIQING MAO; NINGHUI LI; WINSBOROUGH, William H et al.Lecture notes in computer science. 2006, pp 159-173, issn 0302-9743, isbn 3-540-49496-0, 15 p.Conference Paper
Design of a role-based trust-management frameworkNINGHUI LI; MITCHELL, John C; WINSBOROUGH, William H et al.Proceedings - IEEE Symposium on Security and Privacy. 2002, pp 114-130, issn 1081-6011, isbn 0-7695-1543-6, 17 p.Conference Paper