Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Ninghui
    Last name: Li
    DBLP: l/NinghuiLi
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 100 of 136  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Christopher S. Gates, Jing Chen, Ninghui Li, Robert W. Proctor.
    Effective Risk Communication for Android Apps.
    IEEE Trans. Dependable Sec. Comput. 2014, Volume 11 (0) 2014
    Conference paper
    Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Pratim Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy.
    Generating Summary Risk Scores for Mobile Applications.
    IEEE Trans. Dependable Sec. Comput. 2014, Volume 11 (0) 2014
    Conference paper
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    PriView: practical differentially private release of marginal contingency tables.
    International Conference on Management of Data, SIGMOD 2014, Snowbird, UT, USA, June 22-27, 2014 2014 (0) 2014
    Conference paper
    Christopher S. Gates, Ninghui Li, Zenglin Xu, Suresh Chari, Ian Molloy, Youngja Park.
    Detecting Insider Information Theft Using Features from File Access Logs.
    Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II 2014 (0) 2014
    Conference paper
    Lei Cen, Luo Si, Ninghui Li, Hongxia Jin.
    User Comment Analysis for Android apps and CSPI Detection with Comment Expansion.
    Proceeding of the 1st International Workshop on Privacy-Preserving IR: When Information Retrieval Meets Privacy and Security co-located with 37th Annual International ACM SIGIR conference, PIR@SIGIR 2014, Gold Coast, Australia, July 11, 2014. 2014 (0) 2014
    Journal article
    Mahesh V. Tripunitara, Ninghui Li.
    The Foundational Work of Harrison-Ruzzo-Ullman Revisited.
    IEEE Trans. Dependable Sec. Comput. 2013, Volume 10 (0) 2013
    Conference paper
    Jianneng Cao, Qian Xiao, Gabriel Ghinita, Ninghui Li, Elisa Bertino, Kian-Lee Tan.
    Efficient and accurate strategies for differentially-private sliding window queries.
    Joint 2013 EDBT/ICDT Conferences, EDBT '13 Proceedings, Genoa, Italy, March 18-22, 2013 2013 (0) 2013
    Conference paper
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    Differentially private grids for geospatial data.
    29th IEEE International Conference on Data Engineering, ICDE 2013, Brisbane, Australia, April 8-12, 2013 2013 (0) 2013
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su, Yi Wu, Weining Yang.
    Membership privacy: a unifying framework for privacy definitions.
    2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013 2013 (0) 2013
    Conference paper
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    Understanding Hierarchical Methods for Differentially Private Histograms.
    PVLDB 2012, Volume 6 (0) 2013
    Conference paper
    Tiancheng Li, Ninghui Li, Jian Zhang 0003, Ian Molloy.
    Slicing: A New Approach for Privacy Preserving Data Publishing.
    IEEE Trans. Knowl. Data Eng. 2012, Volume 24 (0) 2012
    Conference paper
    Ninghui Li, Haining Chen, Elisa Bertino.
    On practical specification and enforcement of obligations.
    Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012 2012 (0) 2012
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su, Jianneng Cao.
    PrivBasis: Frequent Itemset Mining with Differential Privacy.
    PVLDB 2011, Volume 5 (0) 2012
    Conference paper
    Wahbeh H. Qardaji, Ninghui Li.
    Anonymizing Network Traces with Temporal Pseudonym Consistency.
    32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), Macau, China, June 18-21, 2012 2012 (0) 2012
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su, Jianneng Cao.
    PrivBasis: Frequent Itemset Mining with Differential Privacy
    CoRR 2012, Volume 0 (0) 2012
    Journal article
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    Differentially Private Grids for Geospatial Data
    CoRR 2012, Volume 0 (0) 2012
    Conference paper
    Bhaskar Pratim Sarma, Ninghui Li, Christopher S. Gates, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy.
    Android permissions: a perspective combining risks and benefits.
    17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, Newark, NJ, USA - June 20 - 22, 2012 2012 (0) 2012
    Conference paper
    Hao Peng, Christopher S. Gates, Bhaskar Pratim Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy.
    Using probabilistic generative models for ranking risks of Android apps.
    the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012 2012 (0) 2012
    Conference paper
    Weining Yang, Ninghui Li, Yuan Qi, Wahbeh H. Qardaji, Stephen E. McLaughlin, Patrick Drew McDaniel.
    Minimizing private data disclosures in the smart grid.
    the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012 2012 (0) 2012
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su.
    On sampling, anonymization, and differential privacy or,
    7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012 2012 (0) 2012
    Conference paper
    Wahbeh H. Qardaji, Ninghui Li.
    Recursive partitioning and summarization: a practical framework for differentially private data publishing.
    7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012 2012 (0) 2012
    Conference paper
    Christopher S. Gates, Ninghui Li, Jing Chen, Robert W. Proctor.
    CodeShield: towards personalized application whitelisting.
    28th Annual Computer Security Applications Conference, ACSAC 2012, Orlando, FL, USA, 3-7 December 2012 2012 (0) 2012
    Conference paper
    Omar Chowdhury, Haining Chen, Jianwei Niu, Ninghui Li, Elisa Bertino.
    On XACML's Adequacy to Specify and to Enforce HIPAA.
    3rd USENIX Workshop on Health Security and Privacy, HealthSec'12, Bellevue, WA, USA, August 6-7, 2012 2012 (0) 2012
    Journal article
    Ninghui Li, Wahbeh H. Qardaji, Dong Su.
    Provably Private Data Anonymization: Or, k-Anonymity Meets Differential Privacy
    CoRR 2011, Volume 0 (0) 2011
    Journal article
    Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo.
    Fine-grained integration of access control policies.
    Computers Security 2011, Volume 30 (0) 2011
    Journal article
    Ninghui Li.
    Introduction to special section SACMAT'08.
    ACM Trans. Inf. Syst. Secur. 2011, Volume 14 (0) 2011
    Conference paper
    Yuqing Sun, Qihua Wang, Ninghui Li, Elisa Bertino, Mikhail J. Atallah.
    On the Complexity of Authorization in RBAC under Qualification and Security Constraints.
    IEEE Trans. Dependable Sec. Comput. 2011, Volume 8 (0) 2011
    Book chapter
    Ninghui Li.
    Trust Management.
    Encyclopedia of Cryptography and Security, 2nd Ed. 2011 (0) 2011
    Book chapter
    Ninghui Li.
    Discretionary Access Control.
    Encyclopedia of Cryptography and Security, 2nd Ed. 2011 (0) 2011
    Conference paper
    Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp.
    Security Risk Management Using Incentives.
    IEEE Security Privacy 2011, Volume 9 (0) 2011
    Conference paper
    Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang.
    Combining Discretionary Policy with Mandatory Information Flow in Operating Systems.
    ACM Trans. Inf. Syst. Secur. 2011, Volume 14 (0) 2011
    Conference paper
    Ian Molloy, Ninghui Li.
    Attack on the GridCode one-time password.
    Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24, 2011 2011 (0) 2011
    Conference paper
    Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp.
    Beyond Risk-Based Access Control: Towards Incentive-Based Access Control.
    Financial Cryptography and Data Security - 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers 2012 (0) 2011
    Conference paper
    Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian.
    Closeness: A New Privacy Measure for Data Publishing.
    IEEE Trans. Knowl. Data Eng. 2010, Volume 22 (0) 2010
    Conference paper
    Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo, Luke Dickens.
    Mining roles with noisy data.
    SACMAT 2010, 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings 2010 (0) 2010
    Conference paper
    Hong Chen, Ninghui Li, Christopher S. Gates, Ziqing Mao.
    Towards analyzing complex operating system access control configurations.
    SACMAT 2010, 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings 2010 (0) 2010
    Journal article
    Graham Cormode, Ninghui Li, Tiancheng Li, Divesh Srivastava.
    Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data.
    PVLDB 2010, Volume 3 (0) 2010
    Conference paper
    Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo.
    EXAM: a comprehensive environment for the analysis of access control policies.
    Int. J. Inf. Sec. 2010, Volume 9 (0) 2010
    Conference paper
    Qihua Wang, Ninghui Li.
    Satisfiability and Resiliency in Workflow Authorization Systems.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2010
    Conference paper
    Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo.
    Mining Roles with Multiple Objectives.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2010
    Journal article
    Nan Ding, Yuan (Alan) Qi, Rongjing Xiang, Ian Molloy, Ninghui Li.
    Nonparametric Bayesian Matrix Factorization by Power-EP.
    Journal of Machine Learning Research - Proceedings Track 2010, Volume 9 (0) 2010
    Conference paper
    Timothy W. Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford, Bhavani M. Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan, Jiawei Han, ChengXiang Zhai, Ravi S. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic.
    Assured Information Sharing Life Cycle.
    IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings 2009 (0) 2009
    Journal article
    John Karat, Clare-Marie Karat, Elisa Bertino, Ninghui Li, Qun Ni, Carolyn Brodie, Jorge Lobo, Seraphin B. Calo, Lorrie Faith Cranor, Ponnurangam Kumaraguru, Robert W. Reeder.
    Policy framework for security and privacy management.
    IBM Journal of Research and Development 2009, Volume 53 (0) 2009
    Journal article
    Elisa Bertino, Carolyn Brodie, Seraphin B. Calo, Lorrie Faith Cranor, Clare-Marie Karat, John Karat, Ninghui Li, Dan Lin, Jorge Lobo, Qun Ni, Prathima Rao, Xiping Wang.
    Analysis of privacy and security policies.
    IBM Journal of Research and Development 2009, Volume 53 (0) 2009
    Conference paper
    Tiancheng Li, Xiaonan Ma, Ninghui Li.
    WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance.
    Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Qihua Wang, Hongxia Jin, Ninghui Li.
    Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging.
    Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Ziqing Mao, Ninghui Li, Ian Molloy.
    Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection.
    Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers 2009 (0) 2009
    Conference paper
    Tiancheng Li, Ninghui Li, Jian Zhang.
    Modeling and Integrating Background Knowledge in Data Anonymization.
    Proceedings of the 25th International Conference on Data Engineering, ICDE 2009, March 29 2009 - April 2 2009, Shanghai, China 2009 (0) 2009
    Conference paper
    Tiancheng Li, Ninghui Li.
    On the tradeoff between privacy and utility in data publishing.
    Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009 2009 (0) 2009
    Conference paper
    Hong Chen, Ninghui Li, Ziqing Mao.
    Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems.
    Proceedings of the Network and Distributed System Security Symposium, NDSS 2009, San Diego, California, USA, 8th February - 11th February 2009 2009 (0) 2009
    Conference paper
    Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo.
    An algebra for fine-grained integration of XACML policies.
    SACMAT 2009, 14th ACM Symposium on Access Control Models and Technologies, Stresa, Italy, June 3-5, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, Qihua Wang, Jorge Lobo.
    Evaluating role mining algorithms.
    SACMAT 2009, 14th ACM Symposium on Access Control Models and Technologies, Stresa, Italy, June 3-5, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Guneshi T. Wickramaarachchi, Wahbeh H. Qardaji, Ninghui Li.
    An efficient framework for user authorization queries in RBAC systems.
    SACMAT 2009, 14th ACM Symposium on Access Control Models and Technologies, Stresa, Italy, June 3-5, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang.
    Trojan horse resistant discretionary access control.
    SACMAT 2009, 14th ACM Symposium on Access Control Models and Technologies, Stresa, Italy, June 3-5, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo, Dan Lin.
    Access control policy combining: theory meets practice.
    SACMAT 2009, 14th ACM Symposium on Access Control Models and Technologies, Stresa, Italy, June 3-5, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Tiancheng Li, Ninghui Li, Jian Zhang, Ian Molloy.
    Slicing: A New Approach to Privacy Preserving Data Publishing
    CoRR 2009, Volume 0 (0) 2009
    Conference paper
    Jiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu.
    Denial of service attacks and defenses in decentralized trust management.
    Int. J. Inf. Sec. 2009, Volume 8 (0) 2009
    Conference paper
    Ji-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, Yonglak Sohn.
    Privacy-preserving incremental data dissemination.
    Journal of Computer Security 2009, Volume 17 (0) 2009
    Conference paper
    Ninghui Li, Qihua Wang, Mahesh V. Tripunitara.
    Resiliency Policies in Access Control.
    ACM Trans. Inf. Syst. Secur. 2008, Volume 12 (0) 2009
    Conference paper
    Chenyun Dai, Gabriel Ghinita, Elisa Bertino, Ji-Won Byun, Ninghui Li.
    TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques.
    PVLDB 2009, Volume 2 (0) 2009
    Book chapter
    Ninghui Li.
    Asymmetric Encryption.
    Encyclopedia of Database Systems 2009 (0) 2009
    Book chapter
    Ninghui Li.
    Data Encryption.
    Encyclopedia of Database Systems 2009 (0) 2009
    Book chapter
    Ninghui Li.
    Homomorphic Encryption.
    Encyclopedia of Database Systems 2009 (0) 2009
    Book chapter
    Ninghui Li.
    Symmetric Encryption.
    Encyclopedia of Database Systems 2009 (0) 2009
    Conference paper
    Ian Molloy, Ninghui Li, Tiancheng Li.
    On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining.
    ICDM 2009, The Ninth IEEE International Conference on Data Mining, Miami, Florida, USA, 6-9 December 2009 2009 (0) 2009
    Journal article
    Jiangtao Li, Ninghui Li, William H. Winsborough.
    Automated trust negotiation using cryptographic credentials.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2009
    Conference paper
    Qihua Wang, Ninghui Li, Hong Chen.
    On the Security of Delegation in Access Control Systems.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Hong Chen, Xiaonan Ma, Windsor W. Hsu, Ninghui Li, Qihua Wang.
    Access Control Friendly Query Verification for Outsourced Data Publishing.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Tiancheng Li, Ninghui Li.
    Injector: Mining Background Knowledge for Data Anonymization.
    Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, México 2008 (0) 2008
    Conference paper
    Ninghui Li.
    How to make Discretionary Access Control secure against trojan horses.
    22nd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, Miami, Florida USA, April 14-18, 2008 2008 (0) 2008
    Conference paper
    XiaoFeng Wang, Zhuowei Li, Ninghui Li, Jong Youl Choi.
    PRECIP: Towards Practical and Retrofittable Confidential Information Protection.
    Proceedings of the Network and Distributed System Security Symposium, NDSS 2008, San Diego, California, USA, 10th February - 13th February 2008 2008 (0) 2008
    Conference paper
    Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo.
    EXAM: An Environment for Access Control Policy Analysis and Management.
    9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA 2008 (0) 2008
    Conference paper
    Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo.
    Policy decomposition for collaborative access control.
    SACMAT 2008, 13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO, USA, June 11-13, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo.
    Mining roles with semantic meanings.
    SACMAT 2008, 13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO, USA, June 11-13, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Tiancheng Li, Ninghui Li.
    Towards optimal k-anonymization.
    Data Knowl. Eng. 2008, Volume 65 (0) 2008
    Conference paper
    Ninghui Li, Qihua Wang.
    Beyond separation of duty: An algebra for specifying high-level security policies.
    J. ACM 2008, Volume 55 (0) 2008
    Conference paper
    Rui Xue, Ninghui Li, Jiangtao Li.
    Algebraic Construction for Zero-Knowledge Sets.
    J. Comput. Sci. Technol. 2008, Volume 23 (0) 2008
    Conference paper
    S. Jha, Ninghui Li, Mahesh V. Tripunitara, Qihua Wang, William H. Winsborough.
    Towards Formal Verification of Role-Based Access Control Policies.
    IEEE Trans. Dependable Sec. Comput. 2008, Volume 5 (0) 2008
    Conference paper
    Ji-Won Byun, Ninghui Li.
    Purpose based access control for privacy protection in relational database systems.
    VLDB J. 2008, Volume 17 (0) 2008
    Conference paper
    Jiangtao Li, Ninghui Li, Rui Xue.
    Universal Accumulators with Efficient Nonmembership Proofs.
    Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Ninghui Li, Ziqing Mao.
    Administration in role-based access control.
    Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007 2007 (0) 2007
    Conference paper
    Qihua Wang, Ninghui Li.
    Direct static enforcement of high-level security policies.
    Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007 2007 (0) 2007
    Conference paper
    Ji-Won Byun, Ashish Kamra, Elisa Bertino, Ninghui Li.
    Efficient
    Advances in Databases: Concepts, Systems and Applications, 12th International Conference on Database Systems for Advanced Applications, DASFAA 2007, Bangkok, Thailand, April 9-12, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Qihua Wang, Ninghui Li.
    Satisfiability and Resiliency in Workflow Systems.
    Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Ian Molloy, Jiangtao Li, Ninghui Li.
    Dynamic Virtual Credit Card Numbers.
    Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers 2008 (0) 2007
    Conference paper
    Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian.
    t-Closeness: Privacy Beyond k-Anonymity and l-Diversity.
    Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, The Marmara Hotel, Istanbul, Turkey, April 15-20, 2007 2007 (0) 2007
    Conference paper
    Ninghui Li, Ziqing Mao, Hong Chen.
    Usable Mandatory Integrity Protection for Operating Systems.
    2007 IEEE Symposium on Security and Privacy (SP 2007), 20-23 May 2007, Oakland, California, USA 2007 (0) 2007
    Conference paper
    Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun.
    On the Correctness Criteria of Fine-Grained Access Control in Relational Databases.
    Proceedings of the 33rd International Conference on Very Large Data Bases, University of Vienna, Austria, September 23-27, 2007 2007 (0) 2007
    Conference paper
    Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu.
    A roadmap for comprehensive online privacy policy management.
    Commun. ACM 2007, Volume 50 (0) 2007
    Conference paper
    Ninghui Li, Ji-Won Byun, Elisa Bertino.
    A Critique of the ANSI Standard on Role-Based Access Control.
    IEEE Security Privacy 2007, Volume 5 (0) 2007
    Conference paper
    Mahesh V. Tripunitara, Ninghui Li.
    A theory for comparing the expressive power of access control models.
    Journal of Computer Security 2007, Volume 15 (0) 2007
    Conference paper
    Ninghui Li, Mahesh V. Tripunitara, Ziad Bizri.
    On mutually exclusive roles and separation-of-duty.
    ACM Trans. Inf. Syst. Secur. 2007, Volume 10 (0) 2007
    Conference paper
    Jiangtao Li 0001, Ninghui Li, XiaoFeng Wang, Ting Yu.
    Denial of Service Attacks and Defenses in Decentralized Trust Management.
    Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, Aug. 28 2006 - September 1, 2006 2006 (0) 2006
    Conference paper
    Ninghui Li, Ting Yu, Annie I. Antón.
    A semantics based approach to privacy languages.
    Comput. Syst. Sci. Eng. 2006, Volume 21 (0) 2006
    Conference paper
    Ninghui Li, Qihua Wang.
    Beyond separation of duty: an algebra for specifying high-level security policies.
    Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30 - November 3, 2006 2006 (0) 2006
    Conference paper
    Ninghui Li, Mahesh V. Tripunitara, Qihua Wang.
    Resiliency policies in access control.
    Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30 - November 3, 2006 2006 (0) 2006
    Conference paper
    Tiancheng Li, Ninghui Li.
    Optimal k-Anonymity with Flexible Generalization Schemes through Bottom-up Searching.
    Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 18-22 December 2006, Hong Kong, China 2006 (0) 2006
    Conference paper
    Jiangtao Li, Ninghui Li.
    A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols.
    Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings 2006 (0) 2006
    Conference paper
    Ziqing Mao, Ninghui Li, William H. Winsborough.
    Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper).
    Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings 2006 (0) 2006
    Conference paper
    Hong Chen, Ninghui Li.
    Constraint generation for separation of duty.
    SACMAT 2006,11th ACM Symposium on Access Control Models and Technologies, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings 2006 (0) 2006
    Show item 1 to 100 of 136  

    Your query returned 136 matches in the database.