Follow
Ping Yang
Title
Cited by
Cited by
Year
Efficient policy analysis for administrative role based access control
SD Stoller, P Yang, CR Ramakrishnan, MI Gofman
Proceedings of the 14th ACM conference on Computer and communications …, 2007
1622007
Policy analysis for administrative role-based access control
A Sasturkar, P Yang, SD Stoller, CR Ramakrishnan
Theoretical Computer Science 412 (44), 6208-6234, 2011
1402011
Scientific workflow provenance querying with security views
A Chebotko, S Chang, S Lu, F Fotouhi, P Yang
2008 The Ninth International Conference on Web-Age Information Management …, 2008
662008
Rbac-pat: A policy analysis tool for role based access control
MI Gofman, R Luo, AC Solomon, Y Zhang, P Yang, SD Stoller
International Conference on Tools and Algorithms for the Construction and …, 2009
612009
System and method for security and privacy aware virtual machine checkpointing
P Yang, K Gopalan
US Patent 9,069,782, 2015
582015
Symbolic reachability analysis for parameterized administrative role based access control
SD Stoller, P Yang, M Gofman, CR Ramakrishnan
Proceedings of the 14th ACM symposium on Access control models and …, 2009
582009
A logical encoding of the π-calculus: model checking mobile processes using tabled resolution
P Yang, CR Ramakrishnan, SA Smolka
International journal on software tools for technology transfer 6, 38-66, 2004
432004
Live migration ate my vm: Recovering a virtual machine after failure of post-copy live migration
D Fernando, J Terner, K Gopalan, P Yang
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 343-351, 2019
422019
Satisfiability analysis of workflows with control-flow patterns and authorization constraints
P Yang, X Xie, I Ray, S Lu
IEEE Transactions on Services Computing 7 (2), 237-251, 2013
362013
Sparc: a security and privacy aware virtual machinecheckpointing mechanism
MI Gofman, R Luo, P Yang, K Gopalan
Proceedings of the 10th annual ACM workshop on Privacy in the electronic …, 2011
342011
Cfgexplainer: Explaining graph neural network-based malware classification from control flow graphs
JD Herath, PP Wakodikar, P Yang, G Yan
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022
312022
Secure abstraction views for scientific workflow provenance querying
A Chebotko, S Lu, S Chang, F Fotouhi, P Yang
IEEE Transactions on Services Computing 3 (4), 322-337, 2010
302010
A logical encoding of the π-calculus: Model checking mobile processes using tabled resolution
P Yang, CR Ramakrishnan, SA Smolka
International Workshop on Verification, Model Checking, and Abstract …, 2002
282002
SciBlock: A blockchain-based tamper-proof non-repudiable storage for scientific workflow provenance
D Fernando, S Kulshrestha, JD Herath, N Mahadik, Y Ma, C Bai, P Yang, ...
2019 IEEE 5th International Conference on Collaboration and Internet …, 2019
252019
Ramp: Real-time anomaly detection in scientific workflows
JD Herath, C Bai, G Yan, P Yang, S Lu
2019 IEEE International Conference on Big Data (Big Data), 1367-1374, 2019
242019
Policy analysis for administrative role based access control without separate administration
P Yang, MI Gofman, SD Stoller, Z Yang
Journal of Computer Security 23 (1), 1-29, 2015
222015
Formal modeling and analysis of scientific workflows using hierarchical state machines
P Yang, Z Yang, S Lu
Third IEEE International Conference on e-Science and Grid Computing (e …, 2007
192007
User-role reachability analysis of evolving administrative role based access control
M Gofman, R Luo, P Yang
Computer Security–ESORICS 2010, 455-471, 2011
162011
Recovering a virtual machine after failure of post-copy live migration
K Gopalan, P Yang, DK Fernando, J Terner
US Patent 11,409,619, 2022
152022
Real-time evasion attacks against deep learning-based anomaly detection from distributed system logs
JD Herath, P Yang, G Yan
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
152021
The system can't perform the operation now. Try again later.
Articles 1–20