Jinwei Hu

According to our database1, Jinwei Hu authored at least 23 papers between 2007 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Role updating in information systems using model checking.
Knowl. Inf. Syst., 2017

Towards Accelerated Usage Control Based on Access Correlations.
Proceedings of the Secure IT Systems, 2017

Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

2015
Enforcing Usage Constraints on Credentials for Web Applications.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Context Awareness through Reasoning on Private Analysis for Android Application.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement.
Proceedings of the Information Systems Security - 10th International Conference, 2014

2012
Safety and Availability Checking for User Authorization Queries in RBAC.
Int. J. Comput. Intell. Syst., 2012

Static Enforcement of Static Separation-of-Duty Policies in Usage Control Authorization Models.
IEICE Transactions, 2012

Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems.
Proceedings of the Information Security - 15th International Conference, 2012

Tracking and Constraining Authorization Provenance.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

Constraint-enhanced role engineering via answer set programming.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
RAR: A role-and-risk based flexible framework for secure collaboration.
Future Generation Comp. Syst., 2011

Inconsistency resolving of safety and utility in access control.
EURASIP J. Wireless Comm. and Networking, 2011

2010
Expressiveness of a Provenance-Enabled Authorization Logic
CoRR, 2010

Role updating for assignments.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Towards Automatic Update of Access Control Policy.
Proceedings of the Uncovering the Secrets of System Administration: Proceedings of the 24th Large Installation System Administration Conference, 2010

A logic for authorization provenance.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
On Role Mappings for RBAC-Based Secure Interoperation.
Proceedings of the Third International Conference on Network and System Security, 2009

Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control.
Proceedings of the Information Security, 12th International Conference, 2009

Managing Authorization Provenance: A Modal Logic Based Approach.
Proceedings of the ICTAI 2009, 2009

RBAC-Based Secure Interoperation Using Constraint Logic Programming.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Request-driven role mapping framework for secure interoperation in multi-domain environments.
Comput. Syst. Sci. Eng., 2008

2007
Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments.
Proceedings of the Information Security and Cryptology, 2007


  Loading...