Privacy-aware role-based access control Q Ni, E Bertino, J Lobo, C Brodie, CM Karat, J Karat, A Trombeta ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010 | 473 | 2010 |
Risk-based access control systems built on fuzzy inferences Q Ni, E Bertino, J Lobo Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 165 | 2010 |
An obligation model bridging access control policies and privacy policies Q Ni, E Bertino, J Lobo Proceedings of the 13th ACM symposium on Access control models and …, 2008 | 127 | 2008 |
An access control language for a general provenance model Q Ni, S Xu, E Bertino, R Sandhu, W Han Workshop on Secure Data Management, 68-88, 2009 | 94 | 2009 |
Conditional privacy-aware role based access control Q Ni, D Lin, E Bertino, J Lobo European Symposium on Research in Computer Security, 72-89, 2007 | 85 | 2007 |
D-algebra for composing access control policy decisions Q Ni, E Bertino, J Lobo Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 78 | 2009 |
Privacy-aware role-based access control Q Ni, E Bertino, J Lobo, SB Calo IEEE Security & Privacy 7 (4), 35-43, 2009 | 73 | 2009 |
Analysis of privacy and security policies E Bertino, C Brodie, SB Calo, LF Cranor, CM Karat, J Karat, N Li, D Lin, ... IBM Journal of Research and Development 53 (2), 3: 1-3: 18, 2009 | 56 | 2009 |
Multi-domain and privacy-aware role based access control in ehealth LD Martino, Q Ni, D Lin, E Bertino 2008 Second International Conference on Pervasive Computing Technologies for …, 2008 | 52 | 2008 |
Automating role-based provisioning by learning from examples Q Ni, J Lobo, S Calo, P Rohatgi, E Bertino Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 51 | 2009 |
Policy framework for security and privacy management J Karat, CM Karat, E Bertino, N Li, Q Ni, C Brodie, J Lobo, SB Calo, ... IBM Journal of Research and Development 53 (2), 4: 1-4: 14, 2009 | 35 | 2009 |
Access control policy analysis and visualization tools for security professionals K Vaniea, Q Ni, L Cranor, E Bertino SOUPS Workshop (USM), 7-15, 2008 | 33 | 2008 |
A characterization of the problem of secure provenance management S Xu, Q Ni, E Bertino, R Sandhu 2009 IEEE International Conference on Intelligence and Security Informatics …, 2009 | 25 | 2009 |
Apply measurable risk to strengthen security of a role-based delegation supporting workflow system W Han, Q Ni, H Chen 2009 IEEE International Symposium on Policies for Distributed Systems and …, 2009 | 21 | 2009 |
An ontology-enabled service oriented architecture for pervasive computing Q Ni, M Sloman International Conference on Information Technology: Coding and Computing …, 2005 | 20 | 2005 |
Service composition in ontology enabled service oriented architecture for pervasive computing Q Ni Workshop on ubiquitous computing and e-research, 242-257, 2005 | 18 | 2005 |
xfACL: an extensible functional language for access control Q Ni, E Bertino Proceedings of the 16th ACM symposium on Access control models and …, 2011 | 15 | 2011 |
Privacy-aware RBAC-leveraging RBAC for privacy Q Ni, E Bertino, J Lobo IEEE Security and Privacy to appear, 2009 | 4 | 2009 |
Credibility-enhanced curated database: Improving the value of curated databases Q Ni, E Bertino 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010), 784-795, 2010 | 2 | 2010 |
Privacy-Aware Role-Based Access Control J Lobo, C Brodie, Q Ni, E Bertino ACM Trans. Information and System Security 13 (3), 2010 | 1 | 2010 |