Qun Ni

According to our database1, Qun Ni authored at least 18 papers between 2005 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
xfACL: an extensible functional language for access control.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

2010
Privacy-aware role-based access control.
ACM Trans. Inf. Syst. Secur., 2010

Credibility-enhanced curated database: Improving the value of curated databases.
Proceedings of the 26th International Conference on Data Engineering, 2010

Risk-based access control systems built on fuzzy inferences.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Privacy-Aware Role-Based Access Control.
IEEE Secur. Priv., 2009

Policy framework for security and privacy management.
IBM J. Res. Dev., 2009

Analysis of privacy and security policies.
IBM J. Res. Dev., 2009

An Access Control Language for a General Provenance Model.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

Automating role-based provisioning by learning from examples.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Apply Measurable Risk to Strengthen Security of a Role-Based Delegation Supporting Workflow System.
Proceedings of the POLICY 2009, 2009

A Characterization of the problem of secure provenance management.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Aggregating uncertain access risk estimations from different sources invited paper.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

D-algebra for composing access control policy decisions.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
An obligation model bridging access control policies and privacy policies.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Multi-domain and privacy-aware role based access control in eHealth.
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008

2007
Privacy-aware role based access control.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Conditional Privacy-Aware Role Based Access Control.
Proceedings of the Computer Security, 2007

2005
An Ontology-enabled Service Oriented Architecture for Pervasive Computing.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005


  Loading...