Xinwen Zhang, Ph.D. - Publications

Affiliations: 
2006 George Mason University, Washington, DC 
Area:
Computer Science

20 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 Li Q, Sandhu R, Zhang X, Xu M. Mandatory Content Access Control for Privacy Protection in Information Centric Networks Ieee Transactions On Dependable and Secure Computing. 14: 494-506. DOI: 10.1109/Tdsc.2015.2494049  0.54
2016 Gu Y, Li Q, Zhang H, Su P, Zhang X, Feng D. Direct Resource Hijacking in Android Ieee Internet Computing. 20: 46-56. DOI: 10.1109/Mic.2015.138  0.367
2015 Li Q, Zhang X, Zheng Q, Sandhu R, Fu X. LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking Ieee Transactions On Information Forensics and Security. 10: 308-320. DOI: 10.1109/Tifs.2014.2365742  0.545
2015 Mohaisen A, Mekky H, Zhang X, Xie H, Kim Y. Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures Ieee Transactions On Dependable and Secure Computing. 12: 675-687. DOI: 10.1109/Tdsc.2014.2382592  0.353
2015 Zhang X, Li Q, Su P. Invalidating idealized BGP security proposals and countermeasures Ieee Transactions On Dependable and Secure Computing. 12: 298-311. DOI: 10.1109/Tdsc.2014.2345381  0.333
2014 Zhang X, Seifert J, Aciicmez O. Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms Ieee Transactions On Mobile Computing. 13: 188-201. DOI: 10.1109/Tmc.2012.232  0.39
2013 Jin H, Cheng G, Zou D, Zhang X. Cherub: Fine-grained application protection with on-demand virtualization Computers & Mathematics With Applications. 65: 1326-1338. DOI: 10.1016/J.Camwa.2012.02.001  0.313
2013 Alam M, Zhang X, Nauman M, Ali T, Ali M, Anwar S, Alam Q. Behavioral Attestation for Web Services using access policies Multimedia Tools and Applications. 66: 283-302. DOI: 10.1007/S11042-011-0770-9  0.327
2012 Li Q, Xu M, Wu J, Zhang X, Lee PPC, Xu K. Enhancing the Trust of Internet Routing With Lightweight Route Attestation Ieee Transactions On Information Forensics and Security. 7: 691-703. DOI: 10.1109/Tifs.2011.2177822  0.379
2012 Xu W, Zhang X, Hu H, Ahn G, Seifert J. Remote Attestation with Domain-Based Integrity Model and Policy Analysis Ieee Transactions On Dependable and Secure Computing. 9: 429-442. DOI: 10.1109/Tdsc.2011.61  0.341
2011 Xu M, Wijesekera D, Zhang X. Runtime administration of an RBAC profile for XACML Ieee Transactions On Services Computing. 4: 286-299. DOI: 10.1109/Tsc.2010.27  0.351
2011 Jin J, Ahn GJ, Hu H, Covington MJ, Zhang X. Patient-centric authorization framework for electronic healthcare services Computers and Security. 30: 116-127. DOI: 10.1016/J.Cose.2010.09.001  0.546
2011 Zhang X, Kunjithapatham A, Jeong S, Gibbs S. Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing Mobile Networks and Applications. 16: 270-284. DOI: 10.1007/S11036-011-0305-7  0.336
2010 Cheng G, Jin H, Zou D, Zhang X. Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing Concurrency and Computation: Practice and Experience. 22: 1893-1910. DOI: 10.1002/Cpe.V22:13  0.303
2009 Li Q, Zhang X, Xu M, Wu J. Towards secure dynamic collaborations with group-based RBAC model Computers & Security. 28: 260-275. DOI: 10.1016/J.Cose.2008.12.004  0.339
2009 Katt B, Zhang X, Hafner M. Towards a Usage Control Policy Specification with Petri Nets Lecture Notes in Computer Science. 5871: 905-912. DOI: 10.1007/978-3-642-05151-7_11  0.397
2008 Zhang X, Nakae M, Covington MJ, Sandhu R. Toward a usage-based security framework for collaborative computing systems Acm Transactions On Information and System Security. 11. DOI: 10.1145/1330295.1330298  0.552
2006 Oh S, Sandhu R, Zhang X. An effective role administration model using organization structure Acm Transactions On Information and System Security. 9: 113-137. DOI: 10.1145/1151414.1151415  0.525
2005 Zhang X, Parisi-Presicce F, Sandhu R, Park J. Formal model and policy specification of usage control Acm Transactions On Information and System Security. 8: 351-387. DOI: 10.1145/1108906.1108908  0.513
2005 Zhang X, Chen S, Sandhu R. Enhancing data authenticity and integrity in P2P systems Ieee Internet Computing. 9: 42-49. DOI: 10.1109/Mic.2005.124  0.528
Show low-probability matches.