Ninghui Li
Ninghui Li
Professor of Computer Science, Purdue University
Email verificata su cs.purdue.edu - Home page
TitoloCitata daAnno
t-closeness: Privacy beyond k-anonymity and l-diversity
N Li, T Li, S Venkatasubramanian
2007 IEEE 23rd International Conference on Data Engineering, 106-115, 2007
26522007
Design of a role-based trust-management framework
N Li, JC Mitchell, WH Winsborough
IEEE Symposium on Security and Privacy, 114-130, 2002
10182002
Delegation logic: A logic-based approach to distributed authorization
N Li, BN Grosof, J Feigenbaum
ACM Transactions on Information and System Security (TISSEC) 6 (1), 128-171, 2003
5362003
Distributed credential chain discovery in trust management
N Li, WH Winsborough, JC Mitchell
Journal of Computer Security 11 (1), 35-86, 2003
5362003
Using probabilistic generative models for ranking risks of android apps
H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3742012
Purpose based access control of complex data for privacy protection
JW Byun, E Bertino, N Li
Proceedings of the tenth ACM symposium on Access control models and …, 2005
3632005
Efficient k-anonymization using clustering techniques
JW Byun, A Kamra, E Bertino, N Li
International Conference on Database Systems for Advanced Applications, 188-200, 2007
3552007
RT: A role-based trust-management framework
N Li, JC Mitchell
Proceedings DARPA Information Survivability Conference and Exposition 1, 201-212, 2003
3452003
Towards practical automated trust negotiation
WH Winsborough, N Li
Proceedings Third International Workshop on Policies for Distributed Systems …, 2002
3362002
Datalog with Constraints: A Foundation for Trust Management Languages
N Li, JC Mitchell
International Symposium on Practical Aspects of Declarative Languages, 58-73, 2003
3082003
Android permissions: a perspective combining risks and benefits
BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
2932012
Slicing: A new approach for privacy preserving data publishing
T Li, N Li, J Zhang, I Molloy
IEEE transactions on knowledge and data engineering 24 (3), 561-574, 2010
2592010
Security analysis in role-based access control
N Li, MV Tripunitara
ACM Transactions on Information and System Security (TISSEC) 9 (4), 391-420, 2006
2592006
Purpose based access control for privacy protection in relational database systems
JW Byun, N Li
The VLDB Journal—The International Journal on Very Large Data Bases 17 (4 …, 2008
2492008
On the tradeoff between privacy and utility in data publishing
T Li, N Li
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
2472009
Secure anonymization for incremental datasets
JW Byun, Y Sohn, E Bertino, N Li
Workshop on Secure Data Management, 48-63, 2006
2282006
On mutually exclusive roles and separation-of-duty
N Li, MV Tripunitara, Z Bizri
ACM Transactions on Information and System Security (TISSEC) 10 (2), 5, 2007
2002007
Oblivious signature-based envelope
N Li, W Du, D Boneh
Distributed Computing 17 (4), 293-302, 2005
1952005
Beyond proof-of-compliance: security analysis in trust management
N Li, JC Mitchell, WH Winsborough
Journal of the ACM (JACM) 52 (3), 474-514, 2005
1802005
Automated trust negotiation using cryptographic credentials
J Li, N Li, WH Winsborough
Proceedings of the 12th ACM conference on Computer and communications …, 2005
1792005
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20