Vincent C. Hu

Orcid: 0000-0002-1646-0584

According to our database1, Vincent C. Hu authored at least 34 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Model Checking Access Control Policies: A Case Study using Google Cloud IAM.
CoRR, 2023

2020
Apply Quantum Search to the Safety Check for Mono Operational Attribute Based Protection Systems.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

2018
Access Control for Emerging Distributed Systems.
Computer, 2018

Pseudo-Exhaustive Verification of Rule Based Systems.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

2017
Access Control for Distributed Processing Systems: Use Cases and General Considerations.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Verification of Resilience Policies that Assist Attribute Based Access Control.
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017

2016
Access Control Policy Verification.
Computer, 2016

General Methods for Access Control Policy Verification (Application Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Pseudo-Exhaustive Testing of Attribute Based Access Control Rules.
Proceedings of the Ninth IEEE International Conference on Software Testing, 2016

Differentiating Non-Isomorphic Graphlets for Graph Analytics.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC).
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016

2015
Attribute-Based Access Control.
Computer, 2015

Evaluating the capability and performance of access control policy verification tools.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Implementing and Managing Policy Rules in Attribute Based Access Control.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

2014
Security policy verification for multi-domains in cloud systems.
Int. J. Inf. Sec., 2014

An Access Control scheme for Big Data processing.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

2013
Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

2012
Paradigm in Verification of Access Control.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

2011
Model Checking for Verification of Mandatory Access Control Models and Properties.
Int. J. Softw. Eng. Knowl. Eng., 2011

2010
Policy-Based Testing.
Proceedings of the Encyclopedia of Software Engineering, 2010

ACPT: A Tool for Modeling and Verifying Access Control Policies.
Proceedings of the POLICY 2010, 2010

Mining Likely Properties of Access Control Policies via Association Rule Mining.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Specification of attribute relations for access control policies and constraints using Policy Machine.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Detection of Multiple-Duty-Related Security Leakage in Access Control Policies.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

2008
Property Verification for Generic Access Control Models.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Assessing Quality of Policy Properties in Verification of Access Control Policies.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
A trust domain management schema for multiple grid environments.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Conformance Checking of Access Control Policies Specified in XACML.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

Access Control Policy Combinations for the Grid Using the Policy Machine.
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007

2006
The Computational Complexity of Enforceability Validation for Generic Access Control Rules.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

2005
Composing and combining policies under the policy machine.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

2001
The Policy Machine for Security Policy Management.
Proceedings of the Computational Science - ICCS 2001, 2001

2000
Policy Mediation for Multi-Enterprise Environments.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000


  Loading...