Vincent C. Hu
According to our database1, Vincent C. Hu authored at least 33 papers between 2000 and 2020.
Legend:Book In proceedings Article PhD thesis Other
Apply Quantum Search to the Safety Check for Mono Operational Attribute Based Protection Systems.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018
Access Control for Distributed Processing Systems: Use Cases and General Considerations.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016
Proceedings of the Ninth IEEE International Conference on Software Testing, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC).
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016
Evaluating the capability and performance of access control policy verification tools.
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015
Int. J. Inf. Sec., 2014
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Int. J. Softw. Eng. Knowl. Eng., 2011
Proceedings of the POLICY 2010, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Specification of attribute relations for access control policies and constraints using Policy Machine.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007
The Computational Complexity of Enforceability Validation for Generic Access Control Rules.
Proceedings of the IEEE International Conference on Sensor Networks, 2006
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
Proceedings of the Computational Science - ICCS 2001, 2001
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000