Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Ninghui
    Last name: Li
    DBLP: l/NinghuiLi
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 100 of 156  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Min Lyu, Dong Su, Ninghui Li.
    Understanding the Sparse Vector Technique for Differential Privacy.
    PVLDB 2016, Volume 10 (0) 2017
    Conference paper
    Warut Khern-am-nuai, Weining Yang, Ninghui Li.
    Using Context-Based Password Strength Meter to Nudge Users' Password Generating Behavior: A Randomized Experiment.
    50th Hawaii International Conference on System Sciences, HICSS 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017 2017 (0) 2017
    Conference paper
    Ruowen Wang, Ahmed M. Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen, Wenbo Shen, Yueqiang Cheng.
    SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
    Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017 2017 (0) 2017
    Conference paper
    Weining Yang, Aiping Xiong, Jing Chen, Robert W. Proctor, Ninghui Li.
    Use of Phishing Training to Improve Security Warning Compliance: Evidence from a Field Experiment.
    Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, Hanover, MD, USA, April 4-5, 2017 2017 (0) 2017
    Conference paper
    Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin.
    Differentially Private K-Means Clustering.
    Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, CODASPY 2016, New Orleans, LA, USA, March 9-11, 2016 2016 (0) 2016
    Journal article
    Min Lyu, Dong Su, Ninghui Li.
    Understanding the Sparse Vector Technique for Differential Privacy.
    CoRR 2016, Volume 0 (0) 2016
    Conference paper
    Haining Chen, Omar Chowdhury, Ninghui Li, Warut Khern-am-nuai, Suresh Chari, Ian Molloy, Youngja Park.
    Tri-Modularization of Firewall Policies.
    Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, SACMAT 2016, Shanghai, China, June 5-8, 2016 2016 (0) 2016
    Conference paper
    Wei-Yen Day, Ninghui Li, Min Lyu.
    Publishing Graph Degree Distribution with Node Differential Privacy.
    Proceedings of the 2016 International Conference on Management of Data, SIGMOD Conference 2016, San Francisco, CA, USA, June 26 - July 01, 2016 2016 (0) 2016
    Conference paper
    Weining Yang, Ninghui Li, Ian Molloy, Youngja Park, Suresh Chari.
    Comparing Password Ranking Algorithms on Real-World Password Datasets.
    Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I 2016 (0) 2016
    Conference paper
    Tianhao Wang, Huangyi Ge, Omar Chowdhury, Hemanta K. Maji, Ninghui Li.
    On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols.
    Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 2016 (0) 2016
    Conference paper
    Weining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, Robert W. Proctor.
    An Empirical Study of Mnemonic Sentence-based Password Generation Strategies.
    Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016 2016 (0) 2016
    Conference paper
    Zach Jorgensen, Jing Chen, Christopher S. Gates, Ninghui Li, Robert W. Proctor, Ting Yu.
    Dimensions of Risk in Mobile Applications: A User Study.
    Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015, San Antonio, TX, USA, March 2-4, 2015 2015 (0) 2015
    Journal article
    Dong Su, Jianneng Cao, Ninghui Li, Elisa Bertino, Hongxia Jin.
    Differentially Private $k$-Means Clustering.
    CoRR 2015, Volume 0 (0) 2015
    Journal article
    Dong Su, Jianneng Cao, Ninghui Li.
    Differentially Private Projected Histograms of Multi-Attribute Data for Classification.
    CoRR 2015, Volume 0 (0) 2015
    Conference paper
    Haining Chen, Omar Chowdhury, Jing Chen, Ninghui Li, Robert Proctor.
    Towards quantification of firewall policy complexity.
    Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015 2015 (0) 2015
    Conference paper
    Weining Yang, Jing Chen, Aiping Xiong, Robert W. Proctor, Ninghui Li.
    Effectiveness of a phishing warning in field settings.
    Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015, Urbana, IL, USA, April 21-22, 2015 2015 (0) 2015
    Conference paper
    Wei-Yen Day, Ninghui Li.
    Differentially Private Publishing of High-dimensional Data Using Sensitivity Control.
    Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015 2015 (0) 2015
    Conference paper
    Lei Cen, Christopher S. Gates, Luo Si, Ninghui Li.
    A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code.
    IEEE Trans. Dependable Sec. Comput. 2015, Volume 12 (0) 2015
    Conference paper
    Youngja Park, Ian Molloy, Suresh Chari, Zenglin Xu, Christopher S. Gates, Ninghui Li.
    Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users.
    Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II 2015 (0) 2015
    Conference paper
    Christopher S. Gates, Jing Chen, Ninghui Li, Robert W. Proctor.
    Effective Risk Communication for Android Apps.
    IEEE Trans. Dependable Sec. Comput. 2014, Volume 11 (0) 2014
    Conference paper
    Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Pratim Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy.
    Generating Summary Risk Scores for Mobile Applications.
    IEEE Trans. Dependable Sec. Comput. 2014, Volume 11 (0) 2014
    Conference paper
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    PriView: practical differentially private release of marginal contingency tables.
    International Conference on Management of Data, SIGMOD 2014, Snowbird, UT, USA, June 22-27, 2014 2014 (0) 2014
    Conference paper
    Christopher S. Gates, Ninghui Li, Zenglin Xu, Suresh Chari, Ian Molloy, Youngja Park.
    Detecting Insider Information Theft Using Features from File Access Logs.
    Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II 2014 (0) 2014
    Conference paper
    Lei Cen, Luo Si, Ninghui Li, Hongxia Jin.
    User Comment Analysis for Android apps and CSPI Detection with Comment Expansion.
    Proceeding of the 1st International Workshop on Privacy-Preserving IR: When Information Retrieval Meets Privacy and Security co-located with 37th Annual International ACM SIGIR conference, PIR@SIGIR 2014, Gold Coast, Australia, July 11, 2014. 2014 (0) 2014
    Conference paper
    Jerry Ma, Weining Yang, Min Luo, Ninghui Li.
    A Study of Probabilistic Password Models.
    2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014 2014 (0) 2014
    Journal article
    Mahesh Tripunitara, Ninghui Li.
    The Foundational Work of Harrison-Ruzzo-Ullman Revisited.
    IEEE Trans. Dependable Sec. Comput. 2013, Volume 10 (0) 2013
    Conference paper
    Jianneng Cao, Qian Xiao, Gabriel Ghinita, Ninghui Li, Elisa Bertino, Kian-Lee Tan.
    Efficient and accurate strategies for differentially-private sliding window queries.
    Joint 2013 EDBT/ICDT Conferences, EDBT '13 Proceedings, Genoa, Italy, March 18-22, 2013 2013 (0) 2013
    Conference paper
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    Differentially private grids for geospatial data.
    29th IEEE International Conference on Data Engineering, ICDE 2013, Brisbane, Australia, April 8-12, 2013 2013 (0) 2013
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su, Yi Wu, Weining Yang.
    Membership privacy: a unifying framework for privacy definitions.
    2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013 2013 (0) 2013
    Conference paper
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    Understanding Hierarchical Methods for Differentially Private Histograms.
    PVLDB 2012, Volume 6 (0) 2013
    Conference paper
    Tiancheng Li, Ninghui Li, Jian Zhang 0003, Ian Molloy.
    Slicing: A New Approach for Privacy Preserving Data Publishing.
    IEEE Trans. Knowl. Data Eng. 2012, Volume 24 (0) 2012
    Conference paper
    Ninghui Li, Haining Chen, Elisa Bertino.
    On practical specification and enforcement of obligations.
    Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012 2012 (0) 2012
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su, Jianneng Cao.
    PrivBasis: Frequent Itemset Mining with Differential Privacy.
    PVLDB 2011, Volume 5 (0) 2012
    Conference paper
    Wahbeh H. Qardaji, Ninghui Li.
    Anonymizing Network Traces with Temporal Pseudonym Consistency.
    32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), Macau, China, June 18-21, 2012 2012 (0) 2012
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su, Jianneng Cao.
    PrivBasis: Frequent Itemset Mining with Differential Privacy
    CoRR 2012, Volume 0 (0) 2012
    Journal article
    Wahbeh H. Qardaji, Weining Yang, Ninghui Li.
    Differentially Private Grids for Geospatial Data
    CoRR 2012, Volume 0 (0) 2012
    Conference paper
    Bhaskar Pratim Sarma, Ninghui Li, Christopher S. Gates, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy.
    Android permissions: a perspective combining risks and benefits.
    17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, Newark, NJ, USA - June 20 - 22, 2012 2012 (0) 2012
    Conference paper
    Hao Peng, Christopher S. Gates, Bhaskar Pratim Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy.
    Using probabilistic generative models for ranking risks of Android apps.
    the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012 2012 (0) 2012
    Conference paper
    Weining Yang, Ninghui Li, Yuan Qi, Wahbeh H. Qardaji, Stephen E. McLaughlin, Patrick D. McDaniel.
    Minimizing private data disclosures in the smart grid.
    the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012 2012 (0) 2012
    Conference paper
    Ninghui Li, Wahbeh H. Qardaji, Dong Su.
    On sampling, anonymization, and differential privacy or,
    7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012 2012 (0) 2012
    Conference paper
    Wahbeh H. Qardaji, Ninghui Li.
    Recursive partitioning and summarization: a practical framework for differentially private data publishing.
    7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012 2012 (0) 2012
    Conference paper
    Christopher S. Gates, Ninghui Li, Jing Chen, Robert W. Proctor.
    CodeShield: towards personalized application whitelisting.
    28th Annual Computer Security Applications Conference, ACSAC 2012, Orlando, FL, USA, 3-7 December 2012 2012 (0) 2012
    Conference paper
    Omar Chowdhury, Haining Chen, Jianwei Niu, Ninghui Li, Elisa Bertino.
    On XACML's Adequacy to Specify and to Enforce HIPAA.
    3rd USENIX Workshop on Health Security and Privacy, HealthSec'12, Bellevue, WA, USA, August 6-7, 2012 2012 (0) 2012
    Journal article
    Ninghui Li, Wahbeh H. Qardaji, Dong Su.
    Provably Private Data Anonymization: Or, k-Anonymity Meets Differential Privacy
    CoRR 2011, Volume 0 (0) 2011
    Journal article
    Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo.
    Fine-grained integration of access control policies.
    Computers Security 2011, Volume 30 (0) 2011
    Journal article
    Ninghui Li.
    Introduction to special section SACMAT'08.
    ACM Trans. Inf. Syst. Secur. 2011, Volume 14 (0) 2011
    Conference paper
    Yuqing Sun, Qihua Wang, Ninghui Li, Elisa Bertino, Mikhail J. Atallah.
    On the Complexity of Authorization in RBAC under Qualification and Security Constraints.
    IEEE Trans. Dependable Sec. Comput. 2011, Volume 8 (0) 2011
    Book chapter
    Ninghui Li.
    Trust Management.
    Encyclopedia of Cryptography and Security, 2nd Ed. 2011 (0) 2011
    Book chapter
    Ninghui Li.
    Discretionary Access Control.
    Encyclopedia of Cryptography and Security, 2nd Ed. 2011 (0) 2011
    Conference paper
    Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp.
    Security Risk Management Using Incentives.
    IEEE Security Privacy 2011, Volume 9 (0) 2011
    Conference paper
    Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang.
    Combining Discretionary Policy with Mandatory Information Flow in Operating Systems.
    ACM Trans. Inf. Syst. Secur. 2011, Volume 14 (0) 2011
    Conference paper
    Ian Molloy, Ninghui Li.
    Attack on the GridCode one-time password.
    Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, Hong Kong, China, March 22-24, 2011 2011 (0) 2011
    Conference paper
    Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp.
    Beyond Risk-Based Access Control: Towards Incentive-Based Access Control.
    Financial Cryptography and Data Security - 15th International Conference, FC 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers 2012 (0) 2011
    Conference paper
    Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian.
    Closeness: A New Privacy Measure for Data Publishing.
    IEEE Trans. Knowl. Data Eng. 2010, Volume 22 (0) 2010
    Conference paper
    Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo, Luke Dickens.
    Mining roles with noisy data.
    15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings 2010 (0) 2010
    Conference paper
    Hong Chen, Ninghui Li, Christopher S. Gates, Ziqing Mao.
    Towards analyzing complex operating system access control configurations.
    15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings 2010 (0) 2010
    Journal article
    Graham Cormode, Ninghui Li, Tiancheng Li, Divesh Srivastava.
    Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data.
    PVLDB 2010, Volume 3 (0) 2010
    Conference paper
    Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo.
    EXAM: a comprehensive environment for the analysis of access control policies.
    Int. J. Inf. Sec. 2010, Volume 9 (0) 2010
    Conference paper
    Qihua Wang, Ninghui Li.
    Satisfiability and Resiliency in Workflow Authorization Systems.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2010
    Conference paper
    Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo.
    Mining Roles with Multiple Objectives.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2010
    Journal article
    Nan Ding, Yuan (Alan) Qi, Rongjing Xiang, Ian Molloy, Ninghui Li.
    Nonparametric Bayesian Matrix Factorization by Power-EP.
    Journal of Machine Learning Research - Proceedings Track 2010, Volume 9 (0) 2010
    Conference paper
    Timothy W. Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford, Bhavani M. Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan, Jiawei Han, ChengXiang Zhai, Ravi S. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic.
    Assured Information Sharing Life Cycle.
    IEEE International Conference on Intelligence and Security Informatics, ISI 2009, Dallas, Texas, USA, June 8-11, 2009, Proceedings 2009 (0) 2009
    Journal article
    John Karat, Clare-Marie Karat, Elisa Bertino, Ninghui Li, Qun Ni, Carolyn Brodie, Jorge Lobo, Seraphin B. Calo, Lorrie Faith Cranor, Ponnurangam Kumaraguru, Robert W. Reeder.
    Policy framework for security and privacy management.
    IBM Journal of Research and Development 2009, Volume 53 (0) 2009
    Journal article
    Elisa Bertino, Carolyn Brodie, Seraphin B. Calo, Lorrie Faith Cranor, Clare-Marie Karat, John Karat, Ninghui Li, Dan Lin, Jorge Lobo, Qun Ni, Prathima Rao, Xiping Wang.
    Analysis of privacy and security policies.
    IBM Journal of Research and Development 2009, Volume 53 (0) 2009
    Conference paper
    Tiancheng Li, Xiaonan Ma, Ninghui Li.
    WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance.
    Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Qihua Wang, Hongxia Jin, Ninghui Li.
    Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging.
    Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Ziqing Mao, Ninghui Li, Ian Molloy.
    Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection.
    Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers 2009 (0) 2009
    Conference paper
    Tiancheng Li, Ninghui Li, Jian Zhang.
    Modeling and Integrating Background Knowledge in Data Anonymization.
    Proceedings of the 25th International Conference on Data Engineering, ICDE 2009, March 29 2009 - April 2 2009, Shanghai, China 2009 (0) 2009
    Conference paper
    Tiancheng Li, Ninghui Li.
    On the tradeoff between privacy and utility in data publishing.
    Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009 2009 (0) 2009
    Conference paper
    Hong Chen, Ninghui Li, Ziqing Mao.
    Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems.
    Proceedings of the Network and Distributed System Security Symposium, NDSS 2009, San Diego, California, USA, 8th February - 11th February 2009 2009 (0) 2009
    Conference paper
    Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo.
    An algebra for fine-grained integration of XACML policies.
    14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, Qihua Wang, Jorge Lobo.
    Evaluating role mining algorithms.
    14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Guneshi T. Wickramaarachchi, Wahbeh H. Qardaji, Ninghui Li.
    An efficient framework for user authorization queries in RBAC systems.
    14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang.
    Trojan horse resistant discretionary access control.
    14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo, Dan Lin.
    Access control policy combining: theory meets practice.
    14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Tiancheng Li, Ninghui Li, Jian Zhang, Ian Molloy.
    Slicing: A New Approach to Privacy Preserving Data Publishing
    CoRR 2009, Volume 0 (0) 2009
    Conference paper
    Jiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu.
    Denial of service attacks and defenses in decentralized trust management.
    Int. J. Inf. Sec. 2009, Volume 8 (0) 2009
    Conference paper
    Ji-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, Yonglak Sohn.
    Privacy-preserving incremental data dissemination.
    Journal of Computer Security 2009, Volume 17 (0) 2009
    Conference paper
    Ninghui Li, Qihua Wang, Mahesh Tripunitara.
    Resiliency Policies in Access Control.
    ACM Trans. Inf. Syst. Secur. 2008, Volume 12 (0) 2009
    Conference paper
    Chenyun Dai, Gabriel Ghinita, Elisa Bertino, Ji-Won Byun, Ninghui Li.
    TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques.
    PVLDB 2009, Volume 2 (0) 2009
    Book chapter
    Ninghui Li.
    Asymmetric Encryption.
    Encyclopedia of Database Systems 2009 (0) 2009
    Book chapter
    Ninghui Li.
    Data Encryption.
    Encyclopedia of Database Systems 2009 (0) 2009
    Book chapter
    Ninghui Li.
    Homomorphic Encryption.
    Encyclopedia of Database Systems 2009 (0) 2009
    Book chapter
    Ninghui Li.
    Symmetric Encryption.
    Encyclopedia of Database Systems 2009 (0) 2009
    Conference paper
    Ian Molloy, Ninghui Li, Tiancheng Li.
    On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining.
    ICDM 2009, The Ninth IEEE International Conference on Data Mining, Miami, Florida, USA, 6-9 December 2009 2009 (0) 2009
    Journal article
    Jiangtao Li, Ninghui Li, William H. Winsborough.
    Automated trust negotiation using cryptographic credentials.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2009
    Conference paper
    Qihua Wang, Ninghui Li, Hong Chen.
    On the Security of Delegation in Access Control Systems.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Hong Chen, Xiaonan Ma, Windsor W. Hsu, Ninghui Li, Qihua Wang.
    Access Control Friendly Query Verification for Outsourced Data Publishing.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Tiancheng Li, Ninghui Li.
    Injector: Mining Background Knowledge for Data Anonymization.
    Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, México 2008 (0) 2008
    Conference paper
    Ninghui Li.
    How to make Discretionary Access Control secure against trojan horses.
    22nd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, Miami, Florida USA, April 14-18, 2008 2008 (0) 2008
    Conference paper
    XiaoFeng Wang, Zhuowei Li, Ninghui Li, Jong Youl Choi.
    PRECIP: Towards Practical and Retrofittable Confidential Information Protection.
    Proceedings of the Network and Distributed System Security Symposium, NDSS 2008, San Diego, California, USA, 10th February - 13th February 2008 2008 (0) 2008
    Conference paper
    Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo.
    EXAM: An Environment for Access Control Policy Analysis and Management.
    9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA 2008 (0) 2008
    Conference paper
    Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo.
    Policy decomposition for collaborative access control.
    13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo.
    Mining roles with semantic meanings.
    13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Tiancheng Li, Ninghui Li.
    Towards optimal k-anonymization.
    Data Knowl. Eng. 2008, Volume 65 (0) 2008
    Conference paper
    Ninghui Li, Qihua Wang.
    Beyond separation of duty: An algebra for specifying high-level security policies.
    J. ACM 2008, Volume 55 (0) 2008
    Conference paper
    Rui Xue, Ninghui Li, Jiangtao Li.
    Algebraic Construction for Zero-Knowledge Sets.
    J. Comput. Sci. Technol. 2008, Volume 23 (0) 2008
    Conference paper
    S. Jha, Ninghui Li, Mahesh Tripunitara, Qihua Wang, William H. Winsborough.
    Towards Formal Verification of Role-Based Access Control Policies.
    IEEE Trans. Dependable Sec. Comput. 2008, Volume 5 (0) 2008
    Conference paper
    Ji-Won Byun, Ninghui Li.
    Purpose based access control for privacy protection in relational database systems.
    VLDB J. 2008, Volume 17 (0) 2008
    Conference paper
    Jiangtao Li, Ninghui Li, Rui Xue.
    Universal Accumulators with Efficient Nonmembership Proofs.
    Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings 2007 (0) 2007
    Show item 1 to 100 of 156  

    Your query returned 156 matches in the database.