Julian Jang

According to our database1, Julian Jang authored at least 38 papers between 2003 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Scalable Big Data Privacy with MapReduce.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Measuring Human Resilience in the Face of the Global Epidemiology of Cyber Attacks.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Privacy Issues in Big Data Mining Infrastructure, Platforms, and Applications.
Security and Communication Networks, 2018

Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Deployment issues for integrated open-source - Based indoor air quality school Monitoring Box (SKOMOBO).
Proceedings of the 2018 IEEE Sensors Applications Symposium, 2018

Large Scale Behavioral Analysis of Ransomware Attacks.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Comprehensive Security Assessment of Combined MTD Techniques for the Cloud.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018

2017
Anonymizing k-NN Classification on MapReduce.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile Devices.
Proceedings of the Information Security Practice and Experience, 2017

A Privacy Preserving Platform for MapReduce.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
WebRTC-based video conferencing service for telehealth.
Computing, 2016

Towards privacy-preserving classification in neural networks.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

2014
A survey of emerging threats in cybersecurity.
J. Comput. Syst. Sci., 2014

2013
Data architecture for telehealth services research: A case study of home tele-monitoring.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Security analysis of mobile applications: A case study of a collaboration tool in healthcare.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2012
Hardware Security Device Facilitated Trusted Energy Services.
MONET, 2012

A New Cloud Architecture of Virtual Trusted Platform Modules.
IEICE Transactions, 2012

Portable key management service for cloud storage.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

2011
A mobile and portable trusted computing platform.
EURASIP J. Wireless Comm. and Networking, 2011

Biometric Enabled Portable Trusted Computing Platform.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
User Authentication for Online Applications Using a USB-Based Trust Device.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

Trusted Computing Platform in Your Pocket.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

A Cloud Architecture of Virtual Trusted Platform Modules.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Hardware security device facilitated trusted residential energy services.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
Implementing Isolation for Service-Based Applications.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

2008
Trusted Email protocol: Dealing with privacy concerns from malicious email intermediaries.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2007
Anitya: An Ephemeral Data Management Service and Secure Data Access Protocols for Dynamic Collaborations.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

A Policy Based Approach to Managing Shared Data in Dynamic Collaborations.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

Delivering Promises for Web Services Applications.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Isolation Support for Service-based Applications: A Position Paper.
Proceedings of the CIDR 2007, 2007

2006
Establishing a Trust Relationship in Cooperative Information Systems.
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006

An Event-Driven Workflow Engine for Service-based Business Systems.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

2005
A Service-Oriented Workflow Language for Robust Interacting Applications.
Proceedings of the On the Move to Meaningful Internet Systems 2005: CoopIS, 2005

2003
Expressiveness of Workflow Description Languages.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003

Compensation is Not Enough.
Proceedings of the 7th International Enterprise Distributed Object Computing Conference (EDOC 2003), 2003

Just What Could Possibly Go Wrong In B2B Integration?
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

Transactions in Loosely Coupled Distributed Systems.
Proceedings of the Database Technologies 2003, 2003


  Loading...