Changbo Ke

Orcid: 0000-0002-9273-4428

According to our database1, Changbo Ke authored at least 27 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Group-Vehicles Oriented Reputation Assessment Scheme for Edge VANETs.
IEEE Trans. Cloud Comput., 2024

A model transformation based security policy automatic management framework for software-defined networking.
Comput. Secur., 2024

2023
A Practical Runtime Security Policy Transformation Framework for Software Defined Networks.
CoRR, 2023

2022
Ontology-Based Privacy Data Chain Disclosure Discovery Method for Big Data.
IEEE Trans. Serv. Comput., 2022

A Privacy Risk Assessment Scheme for Fog Nodes in Access Control System.
IEEE Trans. Reliab., 2022

SDN-Based Privacy and Functional Authentication Scheme for Fog Nodes of Smart Healthcare.
IEEE Internet Things J., 2022

A user requirements-oriented privacy policy self-adaption scheme in cloud computing.
Frontiers Comput. Sci., 2022

2021
SDN-based Runtime Security Enforcement Approach for Privacy Preservation of Dynamic Web Service Composition.
CoRR, 2021

A security policy model transformation and verification approach for software defined networking.
Comput. Secur., 2021

2020
SDN-Based Security Enforcement Framework for Data Sharing Systems of Smart Healthcare.
IEEE Trans. Netw. Serv. Manag., 2020

A topology and risk-aware access control framework for cyber-physical space.
Frontiers Comput. Sci., 2020

SOM-based DDoS Defense Mechanism using SDN for the Internet of Things.
CoRR, 2020

2019
面向大数据的隐私发布暴露检测方法 (Big Data Oriented Privacy Disclosure Detection Method for Information Release).
计算机科学, 2019

Behavior-aware Service Access Control Mechanism using Security Policy Monitoring for SOA Systems.
CoRR, 2019

A topology-aware access control model for collaborative cyber-physical spaces: Specification and verification.
Comput. Secur., 2019

Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

2018
Privacy-aware cloud service selection approach based on P-Spec policy models and privacy sensitivities.
Future Gener. Comput. Syst., 2018

2017
Numerical simulations of migration and coalescence behavior of microvoids driven by diffusion and electric field in solder interconnects.
Microelectron. Reliab., 2017

基于本体概念相似度的软件构件检索方法 (Software Component Retrieval Method Based on Ontology Concept Similarity).
计算机科学, 2017

Privacy Disclosure Checking Method Applied on Collaboration Interactions Among SaaS Services.
IEEE Access, 2017

2015
Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing.
J. Commun., 2015

2014
Using Game Theory to Analyze Strategic Choices of Service Providers and Service Requesters.
J. Softw., 2014

Verification of Behavior-aware Privacy Requirements in Web Services Composition.
J. Softw., 2014

The Application of SWRL Based Ontology Inference for Privacy Protection.
J. Softw., 2014

Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing.
J. Appl. Math., 2014

2013
Supporting negotiation mechanism privacy authority method in cloud computing.
Knowl. Based Syst., 2013

2012
Self-adaptive semantic web service matching method.
Knowl. Based Syst., 2012


  Loading...