Xinwen Zhang

According to our database1, Xinwen Zhang authored at least 121 papers between 2003 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Towards Virus Scanning as a Service in Mobile Cloud Computing: Energy-Efficient Dispatching Policy Under N-Version Protection.
IEEE Trans. Emerging Topics Comput., 2018

How to Find a Perfect Data Scientist: A Distance-Metric Learning Approach.
IEEE Access, 2018

ResumeNet: A Learning-Based Framework for Automatic Resume Quality Assessment.
Proceedings of the IEEE International Conference on Data Mining, 2018

2017
Mandatory Content Access Control for Privacy Protection in Information Centric Networks.
IEEE Trans. Dependable Sec. Comput., 2017

2016
Direct Resource Hijacking in Android.
IEEE Internet Computing, 2016

LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Demonstration of Encrypted Logistics Information System.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking.
IEEE Trans. Information Forensics and Security, 2015

Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures.
IEEE Trans. Dependable Sec. Comput., 2015

Invalidating Idealized BGP Security Proposals and Countermeasures.
IEEE Trans. Dependable Sec. Comput., 2015

Measuring and visualizing the contributions of Chinese and American LIS research institutions to emerging themes and salient themes.
Scientometrics, 2015

EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning.
Proceedings of the 24th USENIX Security Symposium, 2015

Assessing Attack Surface with Component-Based Package Dependency.
Proceedings of the Network and System Security - 9th International Conference, 2015

ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms.
IEEE Trans. Mob. Comput., 2014

A Host-Based Approach for Unknown Fast-Spreading Worm Detection and Containment.
TAAS, 2014

Improved anonymous proxy re-encryption with CCA security.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Behavioral Attestation for Web Services using access policies.
Multimedia Tools Appl., 2013

Cherub: Fine-grained application protection with on-demand virtualization.
Computers & Mathematics with Applications, 2013

A Distortion-Based Approach to Privacy-Preserving Metering in Smart Grids.
IEEE Access, 2013

ACaaS: Access Control as a Service for IaaS Cloud.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Contextualized information-centric home network.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

Lattice-Based Multi-party Concurrent Signatures Scheme.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Information-centric networking based homenet.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

CloudSafe: Securing data processing within vulnerable virtualization environments in the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Towards software defined ICN based edge-cloud services.
Proceedings of the IEEE 2nd International Conference on Cloud Networking, 2013

AppInk: watermarking android apps for repackaging deterrence.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Protecting access privacy of cached contents in information centric networks.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Remote Attestation with Domain-Based Integrity Model and Policy Analysis.
IEEE Trans. Dependable Sec. Comput., 2012

An Android runtime security policy enforcement framework.
Personal and Ubiquitous Computing, 2012

White organic light-emitting devices with a solution-processed small molecular emission layer.
Displays, 2012

VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

On-demand security service.
Proceedings of the 5th International Conference on PErvasive Technologies Related to Assistive Environments, 2012

Chrome Extensions: Threat Analysis and Countermeasures.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Supporting seamless mobility in named data networking.
Proceedings of IEEE International Conference on Communications, 2012

Towards end-to-end secure content storage and delivery with public cloud.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Architectural support of multiple hypervisors over single platform for enhancing cloud computing security.
Proceedings of the Computing Frontiers Conference, CF'12, 2012

STC 2012: the seventh ACM workshop on scalable trusted computing.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Protecting access privacy of cached contents in information centric networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Supporting dual-mode forwarding in content-centric network.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2012

2011
Runtime Administration of an RBAC Profile for XACML.
IEEE Trans. Services Computing, 2011

Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing.
MONET, 2011

Patient-centric authorization framework for electronic healthcare services.
Computers & Security, 2011

Taming Information-Stealing Smartphone Applications (on Android).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Botnet with Browser Extensions.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

TGIS: Booting Trust for Secure Information Sharing in Dynamic Group Collaborations.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services.
Proceedings of the Security and Privacy in Communication Networks, 2011

xDAuth: a scalable and lightweight framework for cross domain access control and delegation.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Towards name-based trust and security for content-centric network.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Enhancing the trust of internet routing with lightweight route attestation.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Towards Secure Mobile Virtual Group in information-centric network.
Proceedings of the Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks, 2011

2010
Behavioral Attestation for Web Services Based Business Processes.
Int. J. Web Service Res., 2010

Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing.
Concurrency and Computation: Practice and Experience, 2010

pBMDS: a behavior-based malware detection system for cellphone devices.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

VMDriver: A Driver-Based Monitoring Mechanism for Virtualization.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication.
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010

MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services.
Proceedings of the 6th World Congress on Services, 2010

DAuth: Fine-Grained Authorization Delegation for Distributed Web Application Consumers.
Proceedings of the POLICY 2010, 2010

Towards an Elastic Application Model for Augmenting Computing Capabilities of Mobile Platforms.
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications - Third International Conference, Mobilware 2010, Chicago, IL, USA, June 30, 2010

Elastic HTML5: Workload Offloading Using Cloud-Based Web Workers and Storages for Mobile Devices.
Proceedings of the Mobile Computing, Applications, and Services, 2010

On Leveraging Stochastic Models for Remote Attestation.
Proceedings of the Trusted Systems - Second International Conference, 2010

SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

DR@FT: Efficient Remote Attestation Framework for Dynamic Systems.
Proceedings of the Computer Security, 2010

Apex: extending Android permission model and enforcement with user-defined runtime constraints.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Towards secure dynamic collaborations with group-based RBAC model.
Computers & Security, 2009

Remote Attestation of Attribute Updates and Information Flows in a UCON System.
Proceedings of the Trusted Computing, 2009

Designing System-Level Defenses against Cellphone Malware.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009

Patient-centric authorization framework for sharing electronic health records.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

VirusMeter: Preventing Your Cellphone from Spies.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Towards Session-Aware RBAC Administration and Enforcement with XACML.
Proceedings of the POLICY 2009, 2009

Towards a Usage Control Policy Specification with Petri Nets.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Behavioral Attestation for Business Processes.
Proceedings of the IEEE International Conference on Web Services, 2009

Building dynamic integrity protection for multiple independent authorities in virtualization-based infrastructure.
Proceedings of the 2009 10th IEEE/ACM International Conference on Grid Computing, 2009

Towards System Integrity Protection with Graph-Based Policy Analysis.
Proceedings of the Data and Applications Security XXIII, 2009

A usage control policy specification with Petri nets.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

Building a stateful reference monitor with coloured petri nets.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

Securing elastic applications on mobile devices for cloud computing.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

Exploitation and threat analysis of open mobile devices.
Proceedings of the 2009 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2009

2008
Toward a Usage-Based Security Framework for Collaborative Computing Systems.
ACM Trans. Inf. Syst. Secur., 2008

Behavioral attestation for web services (BA4WS).
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Security Enforcement Model for Distributed Usage Control.
Proceedings of the IEEE International Conference on Sensor Networks, 2008

A general obligation model and continuity: enhanced policy enforcement engine for usage control.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Model-based behavioral attestation.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Systematic Policy Analysis for High-Assurance Services in SELinux.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Access control in Group Communication Systems.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Towards a Group-Based RBAC Model and Decentralized User-Role Administration.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Access Control Model for Sharing Composite Electronic Health Records.
Proceedings of the Collaborative Computing: Networking, 2008

Usage control platformization via trustworthy SELinux.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
A technical architecture for enforcing usage control requirements in service-oriented architectures.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

Towards a VMM-based usage control framework for OS kernel integrity protection.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Flexible Authorization with Decentralized Access Control Model for Grid Computing.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

A Model-Driven Framework for Trusted Computing Based Systems.
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007

Towards a Times-Based Usage Control Model.
Proceedings of the Data and Applications Security XXI, 2007

SecureBus: towards application-transparent trusted computing with mandatory access control.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

A trusted mobile phone reference architecturevia secure kernel.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007

2006
An effective role administration model using organization structure.
ACM Trans. Inf. Syst. Secur., 2006

Client-side access control enforcement using trusted computing and PEI models.
J. High Speed Networks, 2006

A usage-based authorization framework for collaborative computing systems.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing.
Proceedings of the Advances in Information and Computer Security, 2006

ROBAC: Scalable Role and Organization Based Access Control Models.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

Supporting Ad-hoc Collaboration with Group-based RBAC Model.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

Safety analysis of usage control authorization models.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Secure information sharing enabled by Trusted Computing and PEI models.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

A general design towards secure ad-hoc collaboration.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

WormTerminator: an effective containment of unknown and polymorphic fast spreading worms.
Proceedings of the 2006 ACM/IEEE Symposium on Architecture for Networking and Communications Systems, 2006

2005
Formal model and policy specification of usage control.
ACM Trans. Inf. Syst. Secur., 2005

Enhancing Data Authenticity and Integrity in P2P Systems.
IEEE Internet Computing, 2005

Securing credit card transactions with one-time payment scheme.
Electronic Commerce Research and Applications, 2005

Peer-to-peer access control architecture using trusted computing technology.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

An attribute-based access matrix model.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

2004
A logical specification for usage control.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

A Security-Enhanced One-Time Payment Scheme for Credit Card.
Proceedings of the 14th International Workshop on Research Issues in Data Engineering (RIDE-WS-ECEG 2004), 2004

Attribute Mutability in Usage Control.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
PBDM: a flexible delegation model in RBAC.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

Schema Based XML Security: RBAC Approach.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003


  Loading...