Hongxin Hu

Orcid: 0000-0001-8710-247X

According to our database1, Hongxin Hu authored at least 188 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
End-Users Know Best: Identifying Undesired Behavior of Alexa Skills Through User Review Analysis.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., August, 2024

Dual-Level Knowledge Distillation via Knowledge Alignment and Correlation.
IEEE Trans. Neural Networks Learn. Syst., February, 2024

IMap: Toward a Fast, Scalable and Reconfigurable In-Network Scanner With Programmable Switches.
IEEE Trans. Inf. Forensics Secur., 2024

Penetralium: Privacy-preserving and memory-efficient neural network inference at the edge.
Future Gener. Comput. Syst., 2024

Automated Software Vulnerability Patching using Large Language Models.
CoRR, 2024

AI-Cybersecurity Education Through Designing AI-based Cyberharassment Detection Lab.
CoRR, 2024

Moderating Embodied Cyber Threats Using Generative AI.
CoRR, 2024

Chain-of-Thought Prompting of Large Language Models for Discovering and Fixing Software Vulnerabilities.
CoRR, 2024

Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems.
CoRR, 2024

Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European Marketplaces.
Proceedings of the ACM on Web Conference 2024, 2024

SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024

Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models.
Proceedings of the 33rd USENIX Security Symposium, 2024

Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Is the Canary Dead? On the Effectiveness of Stack Canaries on Microcontroller Systems.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

Hairpin: Rethinking Packet Loss Recovery in Edge-based Interactive Video Streaming.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024

A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack Against Split Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Understanding and Mitigating New Harms in Immersive and Embodied Virtual Spaces: A Speculative Dystopian Design Fiction Approach.
Proceedings of the Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing, 2024

A First Look at Security and Privacy Risks in the RapidAPI Ecosystem.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
COVID-19 and Sinophobia: Detecting Warning Signs of Radicalization on Twitter and Reddit.
Cyberpsychology Behav. Soc. Netw., July, 2023

SysFlow: Toward a Programmable Zero Trust Framework for System Security.
IEEE Trans. Inf. Forensics Secur., 2023

SvTPM: SGX-Based Virtual Trusted Platform Modules for Cloud Computing.
IEEE Trans. Cloud Comput., 2023

A Zero-Trust Architecture for Connected and Autonomous Vehicles.
IEEE Internet Comput., 2023

xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses.
Proceedings of the 32nd USENIX Security Symposium, 2023

Exploring Vulnerabilities in Voice Command Skills for Connected Vehicles.
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023

Enabling High Quality Real-Time Communications with Adaptive Frame-Rate.
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023

GAN You See Me? Enhanced Data Reconstruction Attacks against Split Inference.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Analysis of COVID-19 Offensive Tweets and Their Targets.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

An Investigation of Large Language Models for Real-World Hate Speech Detection.
Proceedings of the International Conference on Machine Learning and Applications, 2023

Return-to-Non-Secure Vulnerabilities on ARM Cortex-M TrustZone: Attack and Defense.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Understanding and Analyzing COVID-19-related Online Hate Propagation Through Hateful Memes Shared on Twitter.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023

2022
S-Blocks: Lightweight and Trusted Virtual Security Function With SGX.
IEEE Trans. Cloud Comput., 2022

SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild.
Proceedings of the 31st USENIX Security Symposium, 2022

IMap: Fast and Scalable In-Network Scanning with Programmable Switches.
Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022

Measuring Data Reconstruction Defenses in Collaborative Inference Systems.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

BYOZ: Protecting BYOD Through Zero Trust Network Security.
Proceedings of the IEEE International Conference on Networking, Architecture and Storage, 2022

Multi-level Distillation of Semantic Knowledge for Pre-training Multilingual Language Model.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Understanding and Detecting Remote Infection on Linux-based IoT Devices.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Octans: Optimal Placement of Service Function Chains in Many-Core Systems.
IEEE Trans. Parallel Distributed Syst., 2021

Practically Deploying Heavyweight Adaptive Bitrate Algorithms With Teacher-Student Learning.
IEEE/ACM Trans. Netw., 2021

Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches.
IEEE/ACM Trans. Netw., 2021

IoT-Praetor: Undesired Behaviors Detection for IoT Devices.
IEEE Internet Things J., 2021

Context-Rich Privacy Leakage Analysis Through Inferring Apps in Smart Home IoT.
IEEE Internet Things J., 2021

Problematic Privacy Policies of Voice Assistant Applications.
IEEE Secur. Priv., 2021

Paving the Way for NFV Acceleration: A Taxonomy, Survey and Future Directions.
ACM Comput. Surv., 2021

Understanding and Measuring Robustness of Multimodal Learning.
CoRR, 2021

Rallying Adversarial Techniques against Deep Learning for Network Security.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2021

Towards Understanding and Detecting Cyberbullying in Real-world Images.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

HierTopo: Towards High-Performance and Efficient Topology Optimization for Dynamic Networks.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

COVID-HateBERT: a Pre-trained Language Model for COVID-19 related Hate Speech Detection.
Proceedings of the 20th IEEE International Conference on Machine Learning and Applications, 2021

CARTL: Cooperative Adversarially-Robust Transfer Learning.
Proceedings of the 38th International Conference on Machine Learning, 2021

Switches are Scanners Too!: A Fast and Scalable In-Network Scanner with Programmable Switches.
Proceedings of the HotNets '21: The 20th ACM Workshop on Hot Topics in Networks, 2021

2020
Multi-level Knowledge Distillation.
CoRR, 2020

Interpreting Deep Learning-Based Networking Systems.
Proceedings of the SIGCOMM '20: Proceedings of the 2020 Annual conference of the ACM Special Interest Group on Data Communication on the applications, 2020

FastFE: Accelerating ML-based Traffic Analysis with Programmable Switches.
Proceedings of the 2020 ACM SIGCOMM 2020 Workshop on Secure Programmable Network Infrastructure, 2020

Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Martini: Bridging the Gap between Network Measurement and Control Using Switching ASICs.
Proceedings of the 28th IEEE International Conference on Network Protocols, 2020

SmartChain: Enabling High-Performance Service Chain Partition between SmartNIC and CPU.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Towards A Taxonomy of Content Sensitivity and Sharing Preferences for Photos.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

DeepPower: Non-intrusive and Deep Learning-based Detection of IoT Malware Using Power Side Channels.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies.
IEEE Trans. Dependable Secur. Comput., 2019

Tripod: Towards a Scalable, Efficient and Resilient Cloud Gateway.
IEEE J. Sel. Areas Commun., 2019

MicroNF: An Efficient Framework for Enabling Modularized Service Chains in NFV.
IEEE J. Sel. Areas Commun., 2019

Explaining Deep Learning-Based Networked Systems.
CoRR, 2019

SvTPM: A Secure and Efficient vTPM in the Cloud.
CoRR, 2019

Towards a reliable firewall for software-defined networks.
Comput. Secur., 2019

Security Labs for Software Defined Networks in CloudLab.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

PiTree: Practical Implementation of ABR Algorithms Using Decision Trees.
Proceedings of the 27th ACM International Conference on Multimedia, 2019

Octans: Optimal Placement of Service Function Chains in Many-Core Systems.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

When NFV Meets ANN: Rethinking Elastic Scaling for ANN-based NFs.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Enabling Dynamic Network Access Control with Anomaly-based IDS and SDN.
Proceedings of the SDN-NFV@CODASPY 2019, 2019

2018
Enabling NFV Elasticity Control With Optimized Flow Migration.
IEEE J. Sel. Areas Commun., 2018

Vision-based Navigation of Autonomous Vehicle in Roadway Environments with Unexpected Hazards.
CoRR, 2018

Enhancing Security Education Through Designing SDN Security Labs in CloudLab.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

PAM: When Overloaded, Push Your Neighbor Aside!
Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos, 2018

OFM: Optimized Flow Migration for NFV Elasticity Control.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

Grus: Enabling Latency SLOs for GPU-Accelerated NFV Systems.
Proceedings of the 2018 IEEE 26th International Conference on Network Protocols, 2018

CrescendoNet: A New Deep Convolutional Neural Network with Ensemble Behavior.
Proceedings of the 17th IEEE International Conference on Machine Learning and Applications, 2018

Improving Integrated LTE-WiFi Network Performance with SDN Based Flow Scheduling.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

CoCo: Compact and Optimized Consolidation of Modularized Service Function Chains in NFV.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Challenges Towards Protecting VNF With SGX.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

On the Safety of IoT Device Physical Interaction Control.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

GEN: A GPU-Accelerated Elastic Framework for NFV.
Proceedings of the 2nd Asia-Pacific Workshop on Networking, 2018

2017
SDPA: Toward a Stateful Data Plane in Software-Defined Networking.
IEEE/ACM Trans. Netw., 2017

CHAOS: An SDN-Based Moving Target Defense System.
Secur. Commun. Networks, 2017

Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos.
Proc. ACM Hum. Comput. Interact., 2017

HYPER: A Hybrid High-Performance Framework for Network Function Virtualization.
IEEE J. Sel. Areas Commun., 2017

Cybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and their Prevention.
CoRR, 2017

CrescendoNet: A Simple Deep Convolutional Neural Network with Ensemble Behavior.
CoRR, 2017

CHAOS: an SDN-based Moving Target Defense System.
CoRR, 2017

ThinGs In a Fog: System Illustration with Connected Vehicles.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

PRAM: Priority-aware Flow Migration Scheme in NFV Networks.
Proceedings of the Symposium on SDN Research, 2017

NFP: Enabling Network Function Parallelism in NFV.
Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

On the Safety and Efficiency of Virtual Firewall Elasticity Control.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Load-aware and congestion-free state management in network function virtualization.
Proceedings of the 2017 International Conference on Computing, 2017

Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

Towards Effective Virtualization of Intrusion Detection Systems.
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017

MCDefender: Toward Effective Cyberbullying Defense in Mobile Online Social Networks.
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017

Dynamic Defense Provision via Network Functions Virtualization.
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017

Building a Security OS With Software Defined Infrastructure.
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017

2016
Supporting virtualized network functions with stateful data plane abstraction.
IEEE Netw., 2016

TripleMon: A multi-layer security framework for mediating inter-process communication on Android.
J. Comput. Secur., 2016

Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT).
Int. J. Distributed Sens. Networks, 2016

Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces.
IEEE Secur. Priv., 2016

SLA-NFV: an SLA-aware High Performance Framework for Network Function Virtualization.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

State-aware Network Access Management for Software-Defined Networks.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

HetSDN: Exploiting SDN for intelligent network usage in heterogeneous wireless networks.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

NeSMA: Enabling network-level state-aware applications in SDN.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Cyberbullying Detection with a Pronunciation Based Convolutional Neural Network.
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016

Comprehensive view of security practices in vehicular networks.
Proceedings of the 2016 International Conference on Connected Vehicles and Expo, 2016

Performance considerations of network functions virtualization using containers.
Proceedings of the 2016 International Conference on Computing, 2016

2015
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation.
ACM Trans. Inf. Syst. Secur., 2015

Towards Automated Risk Assessment and Mitigation of Mobile Applications.
IEEE Trans. Dependable Secur. Comput., 2015

VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2015

SDPA: Enhancing Stateful Forwarding for Software-Defined Networking.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

2014
Secure and efficient random functions with variable-length output.
J. Netw. Comput. Appl., 2014

FLOWGUARD: building robust firewalls for software-defined networks.
Proceedings of the third workshop on Hot topics in software defined networking, 2014

Game theoretic analysis of multiparty access control in online social networks.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Towards a Reliable SDN Firewall.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

LPM: Layered Policy Management for Software-Defined Networks.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Defensive maneuver cyber platform modeling with Stochastic Petri Nets.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

RiskMon: continuous and automated risk assessment of mobile applications.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

POSTER: An E2E Trusted Cloud Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Morpheus: automatically generating heuristics to detect Android emulators.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Dynamic Audit Services for Outsourced Storages in Clouds.
IEEE Trans. Serv. Comput., 2013

Multiparty Access Control for Online Social Networks: Model and Mechanisms.
IEEE Trans. Knowl. Data Eng., 2013

Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy.
IEEE Trans. Inf. Forensics Secur., 2013

Discovery and Resolution of Anomalies in Web Access Control Policies.
IEEE Trans. Dependable Secur. Comput., 2013

On the Security of Picture Gesture Authentication.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Towards a Security-Enhanced Firewall Application for OpenFlow Networks.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Towards a Trusted Launch Mechanism for Virtual Machines in Cloud Computing.
Proceedings of the Cloud Computing - 4th International Conference, CloudComp 2013, Wuhan, 2013

2012
Assurance Management Framework for Access Control Systems.
PhD thesis, 2012

Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage.
IEEE Trans. Parallel Distributed Syst., 2012

Risk-Aware Mitigation for MANET Routing Attacks.
IEEE Trans. Dependable Secur. Comput., 2012

Remote Attestation with Domain-Based Integrity Model and Policy Analysis.
IEEE Trans. Dependable Secur. Comput., 2012

Detecting and Resolving Firewall Policy Anomalies.
IEEE Trans. Dependable Secur. Comput., 2012

Efficient audit service outsourcing for data integrity in clouds.
J. Syst. Softw., 2012

Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL.
Inf. Softw. Technol., 2012

Towards HIPAA-Compliant Healthcare Systems in Cloud Computing.
Int. J. Comput. Model. Algorithms Medicine, 2012

Secure Collaborative Integrity Verification for Hybrid Cloud Environments.
Int. J. Cooperative Inf. Syst., 2012

Efficient construction of provably secure steganography under ordinary covert channels.
Sci. China Inf. Sci., 2012

Model-Based Conformance Testing for Android.
Proceedings of the Advances in Information and Computer Security, 2012

Towards temporal access control in cloud computing.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Towards HIPAA-compliant healthcare systems.
Proceedings of the ACM International Health Informatics Symposium, 2012

Secure and efficient constructions of hash, MAC and PRF for mobile devices.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Enabling Collaborative data sharing in Google+.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

SocialImpact: Systematic Analysis of Underground Social Dynamics.
Proceedings of the Computer Security - ESORICS 2012, 2012

Secure sharing of electronic health records in clouds.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Comparison-based encryption for fine-grained access control in clouds.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Provably Secure Role-Based Encryption with Revocation Mechanism.
J. Comput. Sci. Technol., 2011

Patient-centric authorization framework for electronic healthcare services.
Comput. Secur., 2011

Zero-knowledge proofs of retrievability.
Sci. China Inf. Sci., 2011

Automatic Extraction of Secrets from Malware.
Proceedings of the 18th Working Conference on Reverse Engineering, 2011

Anomaly discovery and resolution in web access control policies.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Dynamic audit services for integrity verification of outsourced storages in clouds.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Examining Social Dynamics for Countering Botnet Attacks.
Proceedings of the Global Communications Conference, 2011

Multiparty Authorization Framework for Data Sharing in Online Social Networks.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Collaborative integrity verification in hybrid clouds.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Ontology-based policy anomaly management for autonomic computing.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Poster: temporal attribute-based encryption in clouds.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Detecting and resolving privacy conflicts for collaborative data sharing in online social networks.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Constructing Authorization Systems Using Assurance Management Framework.
IEEE Trans. Syst. Man Cybern. Part C, 2010

Efficient provable data possession for hybrid clouds.
IACR Cryptol. ePrint Arch., 2010

A Collaborative Framework for Privacy Protection in Online Social Networks.
IACR Cryptol. ePrint Arch., 2010

Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy.
IACR Cryptol. ePrint Arch., 2010

FAME: a firewall anomaly management environment.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

Risk-Aware Response for Mitigating MANET Routing Attacks.
Proceedings of the Global Communications Conference, 2010

DR@FT: Efficient Remote Attestation Framework for Dynamic Systems.
Proceedings of the Computer Security, 2010

Representing and Reasoning about Web Access Control Policies.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Information flow control in cloud computing.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
Security-Enhanced OSGi Service Environments.
IEEE Trans. Syst. Man Cybern. Part C, 2009

Patient-centric authorization framework for sharing electronic health records.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

2008
Enabling verification and conformance testing for access control model.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Towards Role-Based Authorization for OSGi Service Environments.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008

2007
Towards realizing a formal RBAC model in real systems.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Towards trust-aware access management for ad-hoc collaborations.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007


  Loading...