Jianwei Niu

According to our database1, Jianwei Niu authored at least 42 papers between 2002 and 2018.

Collaborative distances:



In proceedings 
PhD thesis 



On csauthors.net:


Inferring Ontology Fragments from Semantic Role Typing of Lexical Variants.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2018

GUILeak: tracing privacy policy claims on user input data for Android applications.
Proceedings of the 40th International Conference on Software Engineering, 2018

Extracting Information Types from Android Layout Code Using Sequence to Sequence Learning.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Sequence Diagram Aided Privacy Policy Specification.
IEEE Trans. Dependable Sec. Comput., 2016

Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

PVDetector: a detector of privacy-policy violations for Android apps.
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016

Toward a framework for detecting privacy policy violations in android application code.
Proceedings of the 38th International Conference on Software Engineering, 2016

Lexical Similarity of Information Type Hypernyms, Meronyms and Synonyms in Privacy Policies.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016

Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Formal verification of security properties in trust management policy.
Journal of Computer Security, 2014

Managing security requirements patterns using feature diagram hierarchies.
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014

Less is more?: investigating the role of examples in security studies using analogical transfer.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

On XACML's Adequacy to Specify and to Enforce HIPAA.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

Ensuring authorization privileges for cascading user obligations.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Monitoring Dense-Time, Continuous-Semantics, Metric Temporal Logic.
Proceedings of the Runtime Verification, Third International Conference, 2012

Characterizations and boundaries of security requirements patterns.
Proceedings of the Second IEEE International Workshop on Requirements Patterns, 2012

Formal Analysis of Sequence Diagram with Combined Fragments.
Proceedings of the ICSOFT 2012 - Proceedings of the 7th International Conference on Software Paradigm Trends, Rome, Italy, 24, 2012

Refinement-based design of a group-centric secure information sharing model.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Group-Centric Secure Information-Sharing Models for Isolated Groups.
ACM Trans. Inf. Syst. Secur., 2011

GitBAC: Flexible access control for non-modular concerns.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

Collective Specification and Verification of Behavior Models and Object-oriented Implementations.
Proceedings of the ICSOFT 2011, 2011

Deconstructing the semantics of big-step modelling languages.
Requir. Eng., 2010

Group-Centric Models for Secure and Agile Information Sharing.
Proceedings of the Computer Network Security, 2010

Foundations for group-centric secure information sharing models.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Semantic Criteria for Choosing a Language for Big-Step Models.
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009

Towards a framework for group-centric secure collaboration.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

Toward practical analysis for trust management policy.
Proceedings of the 2009 ACM Symposium on Information, 2009

A conceptual framework for Group-Centric secure information sharing.
Proceedings of the 2009 ACM Symposium on Information, 2009

ROWLBAC: representing role based access control in OWL.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Role Based Access Control and OWL.
Proceedings of the Fourth OWLED Workshop on OWL: Experiences and Directions, 2008

Role-based trust management security policy analysis and correction environment (RT-SPACE).
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

Formalize UML 2 Sequence Diagrams.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Stale-safe security properties for group-based secure information sharing.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008

Engineering Trust Management into Software Models.
Proceedings of the International Workshop on Modeling in Software Engineering, 2007

Apply Model Checking to Security Analysis in Trust Management.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Mapping Template Semantics to SMV.
Proceedings of the 19th IEEE International Conference on Automated Software Engineering (ASE 2004), 2004

Template Semantics for Model-Based Notations.
IEEE Trans. Software Eng., 2003

Understanding and Comparing Model-Based Specification Notations.
Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003), 2003

Composable semantics for model-based notations.
Proceedings of the Tenth ACM SIGSOFT Symposium on Foundations of Software Engineering 2002, 2002