According to our database1, Jinwei Hu
Legend:Book In proceedings Article PhD thesis Other
Role updating in information systems using model checking.
Knowl. Inf. Syst., 2017
Towards Accelerated Usage Control Based on Access Correlations.
Proceedings of the Secure IT Systems, 2017
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
Enforcing Usage Constraints on Credentials for Web Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Context Awareness through Reasoning on Private Analysis for Android Application.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement.
Proceedings of the Information Systems Security - 10th International Conference, 2014
Safety and Availability Checking for User Authorization Queries in RBAC.
Int. J. Computational Intelligence Systems, 2012
Static Enforcement of Static Separation-of-Duty Policies in Usage Control Authorization Models.
IEICE Transactions, 2012
Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems.
Proceedings of the Information Security - 15th International Conference, 2012
Tracking and Constraining Authorization Provenance.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012
Constraint-enhanced role engineering via answer set programming.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
RAR: A role-and-risk based flexible framework for secure collaboration.
Future Generation Comp. Syst., 2011
Inconsistency resolving of safety and utility in access control.
EURASIP J. Wireless Comm. and Networking, 2011
Expressiveness of a Provenance-Enabled Authorization Logic
Role updating for assignments.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Towards Automatic Update of Access Control Policy.
Proceedings of the Uncovering the Secrets of System Administration: Proceedings of the 24th Large Installation System Administration Conference, 2010
A logic for authorization provenance.
Proceedings of the 5th ACM Symposium on Information, 2010
On Role Mappings for RBAC-Based Secure Interoperation.
Proceedings of the Third International Conference on Network and System Security, 2009
Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control.
Proceedings of the Information Security, 12th International Conference, 2009
Managing Authorization Provenance: A Modal Logic Based Approach.
Proceedings of the ICTAI 2009, 2009
RBAC-Based Secure Interoperation Using Constraint Logic Programming.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Request-driven role mapping framework for secure interoperation in multi-domain environments.
Comput. Syst. Sci. Eng., 2008
Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments.
Proceedings of the Information Security and Cryptology, 2007