Xiaopu Ma

According to our database1, Xiaopu Ma
  • authored at least 12 papers between 2009 and 2015.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2015
Role mining based on permission cardinality constraint and user cardinality constraint.
Security and Communication Networks, 2015

Role mining based on cardinality constraints.
Concurrency and Computation: Practice and Experience, 2015

2013
RMiner: a tool set for role mining.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

2012
Mining constraints in role-based access control.
Mathematical and Computer Modelling, 2012

2011
RAR: A role-and-risk based flexible framework for secure collaboration.
Future Generation Comp. Syst., 2011

Specifying and enforcing the principle of least privilege in role-based access control.
Concurrency and Computation: Practice and Experience, 2011

SMEF: An Entropy-Based Security Framework for Cloud-Oriented Service Mashup.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
Consistency Checking of Safety and Availability in Access Control.
IEICE Transactions, 2010

Role mining based on weights.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

SecTag: a multi-policy supported secure web tag framework.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Secure Interoperation in Multidomain Environments Employing UCON Policies.
Proceedings of the Information Security, 12th International Conference, 2009

Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control.
Proceedings of the Information Security, 12th International Conference, 2009


  Loading...