Privacy-aware role-based access control Q Ni, E Bertino, J Lobo, C Brodie, CM Karat, J Karat, A Trombeta ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010 | 505 | 2010 |
Risk-based access control systems built on fuzzy inferences Q Ni, E Bertino, J Lobo Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 179 | 2010 |
An obligation model bridging access control policies and privacy policies Q Ni, E Bertino, J Lobo Proceedings of the 13th ACM symposium on Access control models and …, 2008 | 130 | 2008 |
An access control language for a general provenance model Q Ni, S Xu, E Bertino, R Sandhu, W Han Workshop on Secure Data Management, 68-88, 2009 | 101 | 2009 |
Conditional privacy-aware role based access control Q Ni, D Lin, E Bertino, J Lobo Computer Security–ESORICS 2007: 12th European Symposium On Research In …, 2007 | 86 | 2007 |
D-algebra for composing access control policy decisions Q Ni, E Bertino, J Lobo Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 78 | 2009 |
Privacy-aware role-based access control Q Ni, E Bertino, J Lobo, SB Calo IEEE Security & Privacy 7 (4), 35-43, 2009 | 76 | 2009 |
Automating role-based provisioning by learning from examples Q Ni, J Lobo, S Calo, P Rohatgi, E Bertino Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 69 | 2009 |
Analysis of privacy and security policies E Bertino, C Brodie, SB Calo, LF Cranor, CM Karat, J Karat, N Li, D Lin, ... IBM Journal of Research and Development 53 (2), 3: 1-3: 18, 2009 | 60 | 2009 |
Multi-domain and privacy-aware role based access control in ehealth LD Martino, Q Ni, D Lin, E Bertino 2008 Second International Conference on Pervasive Computing Technologies for …, 2008 | 57 | 2008 |
Access control policy analysis and visualization tools for security professionals K Vaniea, Q Ni, L Cranor, E Bertino Workshop on Usable IT Security Management, 2008 | 38 | 2008 |
Policy framework for security and privacy management J Karat, CM Karat, E Bertino, N Li, Q Ni, C Brodie, J Lobo, SB Calo, ... IBM Journal of Research and Development 53 (2), 4: 1-4: 14, 2009 | 37 | 2009 |
A characterization of the problem of secure provenance management S Xu, Q Ni, E Bertino, R Sandhu 2009 IEEE International Conference on Intelligence and Security Informatics …, 2009 | 29 | 2009 |
An ontology-enabled service oriented architecture for pervasive computing Q Ni, M Sloman International Conference on Information Technology: Coding and Computing …, 2005 | 22 | 2005 |
Apply measurable risk to strengthen security of a role-based delegation supporting workflow system W Han, Q Ni, H Chen 2009 IEEE International Symposium on Policies for Distributed Systems and …, 2009 | 21 | 2009 |
Service composition in ontology enabled service oriented architecture for pervasive computing Q Ni Workshop on ubiquitous computing and e-research, 242-257, 2005 | 19 | 2005 |
xfACL: an extensible functional language for access control Q Ni, E Bertino Proceedings of the 16th ACM symposium on Access control models and …, 2011 | 15 | 2011 |
Privacy-aware RBAC-leveraging RBAC for privacy Q Ni, E Bertino, J Lobo IEEE Security and Privacy to appear, 2009 | 4 | 2009 |
Credibility-enhanced curated database: Improving the value of curated databases Q Ni, E Bertino 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010), 784-795, 2010 | 2 | 2010 |
Aggregating uncertain access risk estimations from different sources invited paper Q Ni, E Bertino 2009 5th International Conference on Collaborative Computing: Networking …, 2009 | 1 | 2009 |