Volgen
Jim Luo
Jim Luo
Geverifieerd e-mailadres voor nrl.navy.mil
Titel
Geciteerd door
Geciteerd door
Jaar
MobiCloud: building secure cloud framework for mobile computing and communication
D Huang, X Zhang, M Kang, J Luo
2010 fifth IEEE international symposium on service oriented system …, 2010
2922010
Security ontology for annotating resources
A Kim, J Luo, M Kang
On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE …, 2005
2412005
Method And System For Storing And Using A Plurality Of Passwords
SA Blomquist, C Blomquist, JZ Luo, B Stover, JA Grlicky, SW Alexander
US Patent App. 12/678,585, 2011
922011
Adding OWL-S support to the existing UDDI infrastructure
J Luo, B Montrose, A Kim, A Khashnobish, M Kang
2006 IEEE International Conference on Web Services (ICWS'06), 153-162, 2006
812006
System and method for adding semantic support to existing syntactic infrastructure
M Kang, B Montrose, J Luo
US Patent 7,933,764, 2011
292011
Security ontology to facilitate web service description and discovery
A Kim, J Luo, M Kang
Journal on data semantics IX, 167-195, 2007
232007
A framework for event prioritization in cyber network defense
A Kim, MH Kang, JZ Luo, A Velasquez
DTIC Document, 2014
222014
An approach for semantic query processing with UDDI
J Luo, B Montrose, M Kang
On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops: OTM …, 2005
182005
Risk based mobile access control (RiBMAC) policy framework
J Luo, M Kang
2011-MILCOM 2011 Military Communications Conference, 1448-1453, 2011
122011
Building private blockchains over public blockchains (PoP) an attribute-based access control approach
D Huang, CJ Chung, Q Dong, J Luo, M Kang
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 355-363, 2019
112019
Application lockbox for mobile device security
J Luo, M Kang
2011 Eighth International Conference on Information Technology: New …, 2011
112011
A quad-redundant plc architecture for cyber-resilient industrial control systems
J Luo, M Kang, E Bisse, M Veldink, D Okunev, S Kolb, JG Tylka, ...
IEEE Embedded Systems Letters 13 (4), 218-221, 2020
102020
Achieving fine-grained access control with discretionary user revocation over cloud data
Q Dong, D Huang, J Luo, M Kang
2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018
82018
Attribute based encryption for information sharing on tactical mobile networks
J Luo, Q Dong, D Huang, M Kang
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 1-9, 2018
72018
An Infrastructure for Multi-Level Secure Service-Oriented Architecture (MLS-SOA) Using the Multiple Single-Level Approach
J Luo, M Kang, ...
Naval Research Laboratory, 2009
52009
Adding Semantic Support to Existing UDDI Infrastructure
J Luo, B Montrose, M Kang
Naval Research Lab, Washington, DC, NRL Memorandum Report NRL/MR/5540-05-650, 2005
42005
ACRS4SDN: An autonomous cyber response system for software-defined networks
A Velazquez, B Montrose, M Li, J Luo, M Kang, S PATRA, D Nau
US Naval Research Laboratory, Tech. Rep., 2022
22022
ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption
Q Dong, D Huang, J Luo, M Kang
Cryptology ePrint Archive, 2017
12017
HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing
Q Dong, D Huang, J Luo, M Kang
Cryptology ePrint Archive, 2017
12017
Infrastructure for multi-level secure service-oriented architecture (MLS-SOA)
J Luo, M Kang
2010-MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 475-481, 2010
12010
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20