Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("NINGHUI LI")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 10 of 10

  • Page / 1
Export

Selection :

  • and

Beyond Separation of Duty : An Algebra for Specifying High-Level Security PoliciesNINGHUI LI; QIHUA WANG.Journal of the Association for Computing Machinery. 2008, Vol 55, Num 3, issn 0004-5411, 12.1-12.46Article

Purpose based access control for privacy protection in relational database systemsBYUN, Ji-Won; NINGHUI LI.The VLDB journal. 2008, Vol 17, Num 4, pp 603-619, issn 1066-8888, 17 p.Article

Beyond proof-of-compliance : Security analysis in trust managementNINGHUI LI; MITCHELL, John C; WINSBOROUGH, William H et al.Journal of the Association for Computing Machinery. 2005, Vol 52, Num 3, pp 474-514, issn 0004-5411, 41 p.Article

Safety in automated trust negotiationWINSBOROUGH, William H; NINGHUI LI.IEEE symposium on security and privacy. 2004, pp 147-160, isbn 0-7695-2136-3, 1Vol, 14 p.Conference Paper

Privacy-preserving database systemsBERTINO, Elisa; BYUN, Ji-Won; NINGHUI LI et al.Lecture notes in computer science. 2005, pp 178-206, issn 0302-9743, isbn 3-540-29243-8, 1Vol, 29 p.Conference Paper

A construction for general and efficient oblivious commitment based envelope protocolsJIANGTAO LI; NINGHUI LI.Lecture notes in computer science. 2006, pp 122-138, issn 0302-9743, isbn 3-540-49496-0, 17 p.Conference Paper

DATALOG with constraints : A foundation for trust management languagesNINGHUI LI; MITCHELL, John C.Lecture notes in computer science. 2002, pp 58-73, issn 0302-9743, isbn 3-540-00389-4, 16 p.Conference Paper

Secure anonymization for incremental datasetsBYUN, Ji-Won; SOHN, Yonglak; BERTINO, Elisa et al.Lecture notes in computer science. 2006, pp 48-63, issn 0302-9743, isbn 3-540-38984-9, 1Vol, 16 p.Conference Paper

Distributed credential chain discovery in trust management with parameterized roles and constraintsZIQING MAO; NINGHUI LI; WINSBOROUGH, William H et al.Lecture notes in computer science. 2006, pp 159-173, issn 0302-9743, isbn 3-540-49496-0, 15 p.Conference Paper

Design of a role-based trust-management frameworkNINGHUI LI; MITCHELL, John C; WINSBOROUGH, William H et al.Proceedings - IEEE Symposium on Security and Privacy. 2002, pp 114-130, issn 1081-6011, isbn 0-7695-1543-6, 17 p.Conference Paper

  • Page / 1