Jinwei Hu

According to our database1, Jinwei Hu authored at least 29 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Explainable Global Wildfire Prediction Models using Graph Neural Networks.
CoRR, 2024

Building Guardrails for Large Language Models.
CoRR, 2024

2021
Longitudinal K-means approaches to clustering and analyzing EHR opioid use trajectories for clinical subtypes.
J. Biomed. Informatics, 2021

Defining Data Migration Across Multidisciplinary Ambulatory Clinics Using Participatory Design.
Appl. Clin. Inform., 2021

2019
Adverse Events Monitoring for Medication Assisted Treatment of Opioid Use Disorder: Using Healthcare Data Interoperability to Inform Practice.
Proceedings of the AMIA 2019, 2019

Multisource Feedback Driven Intervention Improves Physician Leadership and Teamwork.
Proceedings of the AMIA 2019, 2019

2017
Role updating in information systems using model checking.
Knowl. Inf. Syst., 2017

Towards Accelerated Usage Control Based on Access Correlations.
Proceedings of the Secure IT Systems, 2017

Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

2015
Enforcing Usage Constraints on Credentials for Web Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Context Awareness through Reasoning on Private Analysis for Android Application.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement.
Proceedings of the Information Systems Security - 10th International Conference, 2014

2012
Safety and Availability Checking for User Authorization Queries in RBAC.
Int. J. Comput. Intell. Syst., 2012

Static Enforcement of Static Separation-of-Duty Policies in Usage Control Authorization Models.
IEICE Trans. Commun., 2012

Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems.
Proceedings of the Information Security - 15th International Conference, 2012

Tracking and Constraining Authorization Provenance.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

Constraint-enhanced role engineering via answer set programming.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
RAR: A role-and-risk based flexible framework for secure collaboration.
Future Gener. Comput. Syst., 2011

Inconsistency resolving of safety and utility in access control.
EURASIP J. Wirel. Commun. Netw., 2011

2010
Expressiveness of a Provenance-Enabled Authorization Logic
CoRR, 2010

Role updating for assignments.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Towards Automatic Update of Access Control Policy.
Proceedings of the Uncovering the Secrets of System Administration: Proceedings of the 24th Large Installation System Administration Conference, 2010

A logic for authorization provenance.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
On Role Mappings for RBAC-Based Secure Interoperation.
Proceedings of the Third International Conference on Network and System Security, 2009

Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control.
Proceedings of the Information Security, 12th International Conference, 2009

Managing Authorization Provenance: A Modal Logic Based Approach.
Proceedings of the ICTAI 2009, 2009

RBAC-Based Secure Interoperation Using Constraint Logic Programming.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Request-driven role mapping framework for secure interoperation in multi-domain environments.
Comput. Syst. Sci. Eng., 2008

2007
Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments.
Proceedings of the Information Security and Cryptology, 2007


  Loading...