Year |
Citation |
Score |
2017 |
Li Q, Sandhu R, Zhang X, Xu M. Mandatory Content Access Control for Privacy Protection in Information Centric Networks Ieee Transactions On Dependable and Secure Computing. 14: 494-506. DOI: 10.1109/Tdsc.2015.2494049 |
0.54 |
|
2016 |
Gu Y, Li Q, Zhang H, Su P, Zhang X, Feng D. Direct Resource Hijacking in Android Ieee Internet Computing. 20: 46-56. DOI: 10.1109/Mic.2015.138 |
0.367 |
|
2015 |
Li Q, Zhang X, Zheng Q, Sandhu R, Fu X. LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking Ieee Transactions On Information Forensics and Security. 10: 308-320. DOI: 10.1109/Tifs.2014.2365742 |
0.545 |
|
2015 |
Mohaisen A, Mekky H, Zhang X, Xie H, Kim Y. Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures Ieee Transactions On Dependable and Secure Computing. 12: 675-687. DOI: 10.1109/Tdsc.2014.2382592 |
0.353 |
|
2015 |
Zhang X, Li Q, Su P. Invalidating idealized BGP security proposals and countermeasures Ieee Transactions On Dependable and Secure Computing. 12: 298-311. DOI: 10.1109/Tdsc.2014.2345381 |
0.333 |
|
2014 |
Zhang X, Seifert J, Aciicmez O. Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms Ieee Transactions On Mobile Computing. 13: 188-201. DOI: 10.1109/Tmc.2012.232 |
0.39 |
|
2013 |
Jin H, Cheng G, Zou D, Zhang X. Cherub: Fine-grained application protection with on-demand virtualization Computers & Mathematics With Applications. 65: 1326-1338. DOI: 10.1016/J.Camwa.2012.02.001 |
0.313 |
|
2013 |
Alam M, Zhang X, Nauman M, Ali T, Ali M, Anwar S, Alam Q. Behavioral Attestation for Web Services using access policies Multimedia Tools and Applications. 66: 283-302. DOI: 10.1007/S11042-011-0770-9 |
0.327 |
|
2012 |
Li Q, Xu M, Wu J, Zhang X, Lee PPC, Xu K. Enhancing the Trust of Internet Routing With Lightweight Route Attestation Ieee Transactions On Information Forensics and Security. 7: 691-703. DOI: 10.1109/Tifs.2011.2177822 |
0.379 |
|
2012 |
Xu W, Zhang X, Hu H, Ahn G, Seifert J. Remote Attestation with Domain-Based Integrity Model and Policy Analysis Ieee Transactions On Dependable and Secure Computing. 9: 429-442. DOI: 10.1109/Tdsc.2011.61 |
0.341 |
|
2011 |
Xu M, Wijesekera D, Zhang X. Runtime administration of an RBAC profile for XACML Ieee Transactions On Services Computing. 4: 286-299. DOI: 10.1109/Tsc.2010.27 |
0.351 |
|
2011 |
Jin J, Ahn GJ, Hu H, Covington MJ, Zhang X. Patient-centric authorization framework for electronic healthcare services Computers and Security. 30: 116-127. DOI: 10.1016/J.Cose.2010.09.001 |
0.546 |
|
2011 |
Zhang X, Kunjithapatham A, Jeong S, Gibbs S. Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing Mobile Networks and Applications. 16: 270-284. DOI: 10.1007/S11036-011-0305-7 |
0.336 |
|
2010 |
Cheng G, Jin H, Zou D, Zhang X. Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing Concurrency and Computation: Practice and Experience. 22: 1893-1910. DOI: 10.1002/Cpe.V22:13 |
0.303 |
|
2009 |
Li Q, Zhang X, Xu M, Wu J. Towards secure dynamic collaborations with group-based RBAC model Computers & Security. 28: 260-275. DOI: 10.1016/J.Cose.2008.12.004 |
0.339 |
|
2009 |
Katt B, Zhang X, Hafner M. Towards a Usage Control Policy Specification with Petri Nets Lecture Notes in Computer Science. 5871: 905-912. DOI: 10.1007/978-3-642-05151-7_11 |
0.397 |
|
2008 |
Zhang X, Nakae M, Covington MJ, Sandhu R. Toward a usage-based security framework for collaborative computing systems Acm Transactions On Information and System Security. 11. DOI: 10.1145/1330295.1330298 |
0.552 |
|
2006 |
Oh S, Sandhu R, Zhang X. An effective role administration model using organization structure Acm Transactions On Information and System Security. 9: 113-137. DOI: 10.1145/1151414.1151415 |
0.525 |
|
2005 |
Zhang X, Parisi-Presicce F, Sandhu R, Park J. Formal model and policy specification of usage control Acm Transactions On Information and System Security. 8: 351-387. DOI: 10.1145/1108906.1108908 |
0.513 |
|
2005 |
Zhang X, Chen S, Sandhu R. Enhancing data authenticity and integrity in P2P systems Ieee Internet Computing. 9: 42-49. DOI: 10.1109/Mic.2005.124 |
0.528 |
|
Show low-probability matches. |