Ziqing Mao

According to our database1, Ziqing Mao authored at least 15 papers between 2004 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
CAPED: Context-Aware Powerlet-Based Energy Disaggregation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

2011
Combining Discretionary Policy with Mandatory Information Flow in Operating Systems.
ACM Trans. Inf. Syst. Secur., 2011

Painless migration from passwords to two factor authentication.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

2010
Towards analyzing complex operating system access control configurations.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

A robust link-translating proxy server mirroring the whole web.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

2009
Improving real-world access control systems by identifying the true origins of a request
PhD thesis, 2009

Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

Evaluating role mining algorithms.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Trojan horse resistant discretionary access control.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems.
Proceedings of the Network and Distributed System Security Symposium, 2009

Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection.
Proceedings of the Financial Cryptography and Data Security, 2009

2007
Usable Mandatory Integrity Protection for Operating Systems.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Administration in role-based access control.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

2004
An Error Resilience Scheme for Packet Loss Recover of H.264 Video.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004


  Loading...