Yun Bai

Affiliations:
  • University of Western Sydney, Australia


According to our database1, Yun Bai authored at least 30 papers between 1997 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Loop Restricted Existential Rules and First-Order Rewritability for Query Answering.
Proceedings of the Principles of Knowledge Representation and Reasoning: Proceedings of the Sixteenth International Conference, 2018

2017
Role updating in information systems using model checking.
Knowl. Inf. Syst., 2017

2015
Reasoning About the State Change of Authorization Policies.
Proceedings of the Current Approaches in Applied Artificial Intelligence, 2015

2013
Automatic verification of health regulatory compliance in cloud computing.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

2012
Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems.
Proceedings of the Information Security - 15th International Conference, 2012

Tracking and Constraining Authorization Provenance.
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012

Constraint-enhanced role engineering via answer set programming.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Ell Secure Information System Using Modal Logic Technique.
Int. J. Secur. Softw. Eng., 2011

An Implementation of $\mathcal{A}^{xml(T)}$ : An Answer Set Programming Based Formal Language of Authorisation for XML Documents.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2011

On Cloud Computing Security.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2011

A Modal Logic for Information System Security.
Proceedings of the Ninth Australasian Information Security Conference, 2011

2009
A Knowledge Based Formal Language for Securing Information Systems.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2009

2008
Reasoning for Incomplete Authorizations.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

Access Control for XML Document.
Proceedings of the New Frontiers in Applied Artificial Intelligence, 2008

2005
On the sequence of authorization policy transformations.
Int. J. Inf. Sec., 2005

A New Approach for Conflict Resolution of Authorization.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

2004
Artificial Intelligence In Database Security.
Int. J. Pattern Recognit. Artif. Intell., 2004

2003
On transformation of authorization policies.
Data Knowl. Eng., 2003

The Characterization on the Uniqueness of Answer Set for Prioritized Logic Programs.
Proceedings of the Foundations of Intelligent Systems, 14th International Symposium, 2003

2002
Object Oriented Database with Authorization Policies.
Fundam. Informaticae, 2002

2001
Implementing prioritized logic programming.
AI Commun., 2001

On the Computational Aspect of Rule Based Database Updates.
Proceedings of the Engineering of Intelligent Systems, 2001

1999
On Formal Languages for Sequences of Authorization Transformations.
Proceedings of the Computer Safety, 1999

A Logical Formalization for Specifying Authorizations in Object-Oriented Databases.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

Authorization in Object Oriented Databases.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
A High Level Language for Conventional Access Control Models.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
A Formal Security Design Approach for Transformation of Authorizations in Information Systems.
Proceedings of the Third Pacific Asia Conference on Information Systems, 1997

A language for specifying sequences of authorization transformations and its applications.
Proceedings of the Information and Communication Security, First International Conference, 1997

A Logic For State Transformations in Authorization Policies.
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997

Analysis and Implementation of a Formal Authorisation Policy Design Approach.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997


  Loading...