Xiaopu Ma

Orcid: 0000-0003-3017-993X

According to our database1, Xiaopu Ma authored at least 15 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Application of an Improved Graph Neural Network for Drug Property Prediction.
IEEE Access, 2024

2023
Design of Permutation Index DCSK With Noise Reduction for Short-Range IoT Communications.
IEEE Access, 2023

2015
Role mining based on permission cardinality constraint and user cardinality constraint.
Secur. Commun. Networks, 2015

乳腺辅助诊断系统中可疑肿块分割方法研究 (Research on Segmentation Methods in Breast Computer-aided Detection).
计算机科学, 2015

Role mining based on cardinality constraints.
Concurr. Comput. Pract. Exp., 2015

2013
RMiner: a tool set for role mining.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

2012
Mining constraints in role-based access control.
Math. Comput. Model., 2012

2011
RAR: A role-and-risk based flexible framework for secure collaboration.
Future Gener. Comput. Syst., 2011

Specifying and enforcing the principle of least privilege in role-based access control.
Concurr. Comput. Pract. Exp., 2011

SMEF: An Entropy-Based Security Framework for Cloud-Oriented Service Mashup.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
Consistency Checking of Safety and Availability in Access Control.
IEICE Trans. Inf. Syst., 2010

Role mining based on weights.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

SecTag: a multi-policy supported secure web tag framework.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Secure Interoperation in Multidomain Environments Employing UCON Policies.
Proceedings of the Information Security, 12th International Conference, 2009

Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control.
Proceedings of the Information Security, 12th International Conference, 2009


  Loading...