Gansen ZHAO
Cited by
Cited by
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
L Yan, C Rong, G Zhao
IEEE International Conference on Cloud Computing, 167-177, 2009
Trusted data sharing over untrusted cloud storage providers
G Zhao, C Rong, J Li, F Zhang, Y Tang
2010 IEEE Second International Conference on Cloud Computing Technology and†…, 2010
PERMIS: a modular authorization infrastructure
D Chadwick, G Zhao, S Otenko, R Laborde, L Su, TA Nguyen
Concurrency and Computation: Practice and Experience 20 (11), 1341-1357, 2008
Fine-grained data access control systems with user accountability in cloud computing
J Li, G Zhao, X Chen, D Xie, C Rong, W Li, L Tang, Y Tang
2010 IEEE Second International Conference on Cloud Computing Technology and†…, 2010
Proc. IAU Symp. 298, Setting the scene for Gaia and LAMOST
XW Liu, S Feltzing, G Zhao, NA Walton, P Whitelock
Cambridge Univ. Press, Cambridge, 2014
Fast algorithms to evaluate collaborative filtering recommender systems
F Zhang, T Gong, VE Lee, G Zhao, C Rong, G Qu
Knowledge-Based Systems 96, 96-103, 2016
Schema conversion model of SQL database to NoSQL
G Zhao, Q Lin, L Li, Z Li
2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and†…, 2014
Designing cloud-based electronic health record system with attribute-based encryption
F Xhafa, J Li, G Zhao, J Li, X Chen, DS Wong
Multimedia tools and applications 74 (10), 3441-3458, 2015
Modeling MongoDB with relational model
G Zhao, W Huang, S Liang, Y Tang
2013 Fourth International Conference on Emerging Intelligent Data and Web†…, 2013
Cloud computing: A statistics aspect of users
G Zhao, J Liu, Y Tang, W Sun, F Zhang, X Ye, N Tang
IEEE International Conference on Cloud Computing, 347-358, 2009
Deployment models: Towards eliminating security concerns from cloud computing
G Zhao, C Rong, MG Jaatun, FE Sandnes
2010 International Conference on High Performance Computing & Simulation†…, 2010
ContractGuard: Defend ethereum smart contracts with embedded intrusion detection
X Wang, J He, Z Xie, G Zhao, SC Cheung
IEEE Transactions on Services Computing 13 (2), 314-328, 2019
Reference deployment models for eliminating user concerns on cloud security
G Zhao, C Rong, MG Jaatun, FE Sandnes
The Journal of Supercomputing 61 (2), 337-352, 2012
Obligations for role based access control
G Zhao, D Chadwick, S Otenko
21st International Conference on Advanced Information Networking and†…, 2007
Cloud Computing: First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings
MG Jaatun, G Zhao, C Rong
Springer, 2009
Multiple nested schema of HBase for migration from SQL
G Zhao, L Li, Z Li, Q Lin
2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and†…, 2014
On the modeling of bell-lapadula security policies using RBAC
G Zhao, DW Chadwick
2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for†…, 2008
MDP-based quantitative analysis framework for proof of authority
X Liu, G Zhao, X Wang, Y Lin, Z Zhou, H Tang, B Chen
2019 International Conference on Cyber-Enabled Distributed Computing and†…, 2019
System for protecting an encrypted information unit
C Rong, G Zhao
US Patent 8,855,317, 2014
The design of a redundant array of independent net-storages for improved confidentiality in cloud computing
MG Jaatun, G Zhao, AV Vasilakos, ŇA Nyre, S Alapnes, Y Tang
Journal of Cloud Computing: Advances, Systems and Applications 1 (1), 1-19, 2012
The system can't perform the operation now. Try again later.
Articles 1–20