Yue Zhang

Affiliations:
  • University of Pittsburgh, PA, USA


According to our database1, Yue Zhang authored at least 20 papers between 2007 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Temporal Access Control.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Role-Based Access Control.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

GEO-RBAC Model.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

ANSI/INCITS RBAC Standard.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Administration Model for RBAC.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

2010
Understanding Access Control Challenges in Loosely-Coupled Multidomain Environments.
Proceedings of the ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 3, ISAS, Funchal, Madeira, Portugal, June 8, 2010

Role-based domain discovery in decentralized secure interoperations.
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010

2009
Temporal Access Control.
Proceedings of the Encyclopedia of Database Systems, 2009

Role Based Access Control.
Proceedings of the Encyclopedia of Database Systems, 2009

GEO-RBAC Model.
Proceedings of the Encyclopedia of Database Systems, 2009

ANSI/INCITS RBAC Standard.
Proceedings of the Encyclopedia of Database Systems, 2009

Administration Model for RBAC.
Proceedings of the Encyclopedia of Database Systems, 2009

2008
Formal foundations for hybrid hierarchies in GTRBAC.
ACM Trans. Inf. Syst. Secur., 2008

UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Cantina: a content-based approach to detecting phishing web sites.
Proceedings of the 16th International Conference on World Wide Web, 2007

Phinding Phish: An Evaluation of Anti-Phishing Toolbars.
Proceedings of the Network and Distributed System Security Symposium, 2007

ARBAC07: A Role-based Administration Model for RBAC with Hybrid Hierarchy.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007

A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007


  Loading...