Volgen
Qun Ni
Qun Ni
Software Engineer, Google Inc
Geverifieerd e-mailadres voor google.com
Titel
Geciteerd door
Geciteerd door
Jaar
Privacy-aware role-based access control
Q Ni, E Bertino, J Lobo, C Brodie, CM Karat, J Karat, A Trombeta
ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010
4942010
Risk-based access control systems built on fuzzy inferences
Q Ni, E Bertino, J Lobo
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
1772010
An obligation model bridging access control policies and privacy policies
Q Ni, E Bertino, J Lobo
Proceedings of the 13th ACM symposium on Access control models and …, 2008
1262008
An access control language for a general provenance model
Q Ni, S Xu, E Bertino, R Sandhu, W Han
Workshop on Secure Data Management, 68-88, 2009
992009
Conditional privacy-aware role based access control
Q Ni, D Lin, E Bertino, J Lobo
Computer Security–ESORICS 2007: 12th European Symposium On Research In …, 2007
852007
D-algebra for composing access control policy decisions
Q Ni, E Bertino, J Lobo
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
792009
Privacy-aware role-based access control
Q Ni, E Bertino, J Lobo, SB Calo
IEEE Security & Privacy 7 (4), 35-43, 2009
772009
Automating role-based provisioning by learning from examples
Q Ni, J Lobo, S Calo, P Rohatgi, E Bertino
Proceedings of the 14th ACM symposium on Access control models and …, 2009
672009
Analysis of privacy and security policies
E Bertino, C Brodie, SB Calo, LF Cranor, CM Karat, J Karat, N Li, D Lin, ...
IBM Journal of Research and Development 53 (2), 3: 1-3: 18, 2009
602009
Multi-domain and privacy-aware role based access control in ehealth
LD Martino, Q Ni, D Lin, E Bertino
2008 Second International Conference on Pervasive Computing Technologies for …, 2008
552008
Policy framework for security and privacy management
J Karat, CM Karat, E Bertino, N Li, Q Ni, C Brodie, J Lobo, SB Calo, ...
IBM Journal of Research and Development 53 (2), 4: 1-4: 14, 2009
372009
Access control policy analysis and visualization tools for security professionals
K Vaniea, Q Ni, L Cranor, E Bertino
Workshop on Usable IT Security Management, 2008
372008
A characterization of the problem of secure provenance management
S Xu, Q Ni, E Bertino, R Sandhu
2009 IEEE International Conference on Intelligence and Security Informatics …, 2009
282009
An ontology-enabled service oriented architecture for pervasive computing
Q Ni, M Sloman
International Conference on Information Technology: Coding and Computing …, 2005
222005
Apply measurable risk to strengthen security of a role-based delegation supporting workflow system
W Han, Q Ni, H Chen
2009 IEEE International Symposium on Policies for Distributed Systems and …, 2009
212009
Service composition in ontology enabled service oriented architecture for pervasive computing
Q Ni
Workshop on ubiquitous computing and e-research, 242-257, 2005
182005
xfACL: an extensible functional language for access control
Q Ni, E Bertino
Proceedings of the 16th ACM symposium on Access control models and …, 2011
152011
Privacy-aware RBAC-leveraging RBAC for privacy
Q Ni, E Bertino, J Lobo
IEEE Security and Privacy to appear, 2009
42009
Credibility-enhanced curated database: Improving the value of curated databases
Q Ni, E Bertino
2010 IEEE 26th International Conference on Data Engineering (ICDE 2010), 784-795, 2010
22010
Aggregating uncertain access risk estimations from different sources invited paper
Q Ni, E Bertino
2009 5th International Conference on Collaborative Computing: Networking …, 2009
12009
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20