Relationship-based access control for online social networks: Beyond user-to-user relationships Y Cheng, J Park, R Sandhu 2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012 | 137 | 2012 |
A user-to-user relationship-based access control model for online social networks Y Cheng, J Park, R Sandhu Data and Applications Security and Privacy XXVI, 8-24, 2012 | 123 | 2012 |
An access control model for online social networks using user-to-user relationships Y Cheng, J Park, R Sandhu IEEE transactions on dependable and secure computing 13 (4), 424-436, 2015 | 72 | 2015 |
Preserving user privacy from third-party applications in online social networks Y Cheng, J Park, R Sandhu Proceedings of the 22nd international conference on world wide web, 723-728, 2013 | 64 | 2013 |
A User-Activity-Centric Framework for Access Control in Online Social Networks J Park, R Sandhu, Y Cheng Internet Computing, IEEE 15 (5), 62-65, 2011 | 64 | 2011 |
Attribute-aware relationship-based access control for online social networks Y Cheng, J Park, R Sandhu Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 …, 2014 | 56 | 2014 |
Relationship based information sharing control system and method of use JH Park, RS Sandhu, Y Cheng US Patent App. 14/328,682, 2015 | 41 | 2015 |
ACON: Activity-Centric Access Control for Social Computing J Park, R Sandhu, Y Cheng Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011 | 37 | 2011 |
A performance comparison of WireGuard and OpenVPN S Mackey, I Mihov, A Nosenko, F Vega, Y Cheng Proceedings of the Tenth ACM Conference on data and application security and …, 2020 | 33 | 2020 |
A modern implementation of system call sequence based host-based intrusion detection systems J Byrnes, T Hoang, NN Mehta, Y Cheng 2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020 | 16 | 2020 |
Extended ReBAC administrative models with cascading revocation and provenance support Y Cheng, K Bijon, R Sandhu Proceedings of the 21st ACM on Symposium on Access Control Models and …, 2016 | 16 | 2016 |
An empirical analysis on the usability and security of passwords KS Walia, S Shenoy, Y Cheng 21st IEEE International Conference on Information Reuse and Integration for …, 2020 | 15 | 2020 |
A performance study on cryptographic algorithms for IoT devices E Anaya, J Patel, P Shah, V Shah, Y Cheng Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 7 | 2020 |
Password and passphrase guessing with recurrent neural networks A Nosenko, Y Cheng, H Chen Information Systems Frontiers 25 (2), 549-565, 2023 | 6 | 2023 |
Learning password modification patterns with recurrent neural networks A Nosenko, Y Cheng, H Chen International conference on secure knowledge management in artificial …, 2021 | 4 | 2021 |
Towards provenance and risk-awareness in social computing Y Cheng, D Nguyen, K Bijon, R Krishnan, J Park, R Sandhu Proceedings of the first international workshop on secure and resilient …, 2012 | 4 | 2012 |
Towards a framework for cyber social status based trusted open collaboration J Park, Y Cheng, R Sandhu 6th International Conference on Collaborative Computing: Networking …, 2010 | 3 | 2010 |
A Literature Survey of Phishing and Its Countermeasures J Vega, D Shevchyk, Y Cheng 2022 Computer Science Conference for CSU Undergraduates, 2022 | 2 | 2022 |
What to do first: Ranking the mission impact graph for effective mission assurance P Appana, X Sun, Y Cheng 2019 International Conference on Computing, Networking and Communications …, 2019 | 2 | 2019 |
Access control for online social networks using relationship type patterns Y Cheng The University of Texas at San Antonio, 2014 | 2 | 2014 |