Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ping Yang 0002
@article{DBLP:journals/tcc/FernandoTYG23, author = {Dinuni K. Fernando and Jonathan Terner and Ping Yang and Kartik Gopalan}, title = {V-Recover: Virtual Machine Recovery When Live Migration Fails}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {3}, pages = {3289--3300}, year = {2023}, url = {https://doi.org/10.1109/TCC.2023.3282466}, doi = {10.1109/TCC.2023.3282466}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/FernandoTYG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/GwakWWYSS023, author = {Joon{-}Young Gwak and Priti Prabhakar Wakodikar and Meng Wang and Guanhua Yan and Xiaokui Shu and Scott D. Stoller and Ping Yang}, editor = {Jihe Wang and Yi He and Thang N. Dinh and Christan Grant and Meikang Qiu and Witold Pedrycz}, title = {Debugging Malware Classification Models Based on Event Logs with Explainable {AI}}, booktitle = {{IEEE} International Conference on Data Mining, {ICDM} 2023 - Workshops, Shanghai, China, December 4, 2023}, pages = {939--948}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICDMW60847.2023.00125}, doi = {10.1109/ICDMW60847.2023.00125}, timestamp = {Tue, 13 Feb 2024 13:22:54 +0100}, biburl = {https://dblp.org/rec/conf/icdm/GwakWWYSS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MofradAZLYC22, author = {Saeid Mofrad and Ishtiaq Ahmed and Fengwei Zhang and Shiyong Lu and Ping Yang and Heming Cui}, title = {Securing Big Data Scientific Workflows via Trusted Heterogeneous Environments}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {6}, pages = {4187--4203}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3123640}, doi = {10.1109/TDSC.2021.3123640}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MofradAZLYC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/HerathWYY22, author = {Jerome Dinal Herath and Priti Prabhakar Wakodikar and Ping Yang and Guanhua Yan}, title = {CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs}, booktitle = {52nd Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2022, Baltimore, MD, USA, June 27-30, 2022}, pages = {172--184}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSN53405.2022.00028}, doi = {10.1109/DSN53405.2022.00028}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsn/HerathWYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/YangLY21, author = {Zezhang Yang and Jian Li and Ping Yang}, title = {FedADMP: {A} Joint Anomaly Detection and Mobility Prediction Framework via Federated Learning}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {29}, pages = {e4}, year = {2021}, url = {https://doi.org/10.4108/eai.21-10-2021.171595}, doi = {10.4108/EAI.21-10-2021.171595}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/YangLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/HerathYY21, author = {Jerome Dinal Herath and Ping Yang and Guanhua Yan}, editor = {Anupam Joshi and Barbara Carminati and Rakesh M. Verma}, title = {Real-Time Evasion Attacks against Deep Learning-Based Anomaly Detection from Distributed System Logs}, booktitle = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021}, pages = {29--40}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3422337.3447833}, doi = {10.1145/3422337.3447833}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/HerathYY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MofradALYCZ19, author = {Saeid Mofrad and Ishtiaq Ahmed and Shiyong Lu and Ping Yang and Heming Cui and Fengwei Zhang}, editor = {David Balenson}, title = {SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {390--403}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359845}, doi = {10.1145/3359789.3359845}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MofradALYCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/HerathBYYL19, author = {Jerome Dinal Herath and Changxin Bai and Guanhua Yan and Ping Yang and Shiyong Lu}, editor = {Chaitanya K. Baru and Jun Huan and Latifur Khan and Xiaohua Hu and Ronay Ak and Yuanyuan Tian and Roger S. Barga and Carlo Zaniolo and Kisung Lee and Yanfang (Fanny) Ye}, title = {{RAMP:} Real-Time Anomaly Detection in Scientific Workflows}, booktitle = {2019 {IEEE} International Conference on Big Data {(IEEE} BigData), Los Angeles, CA, USA, December 9-12, 2019}, pages = {1367--1374}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/BigData47090.2019.9005653}, doi = {10.1109/BIGDATA47090.2019.9005653}, timestamp = {Tue, 18 Oct 2022 14:44:48 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/HerathBYYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/FernandoKHMMBYY19, author = {Dinuni K. Fernando and Siddharth Kulshrestha and Jerome Dinal Herath and Nitin Mahadik and Yanzhe Ma and Changxin Bai and Ping Yang and Guanhua Yan and Shiyong Lu}, title = {SciBlock: {A} Blockchain-Based Tamper-Proof Non-Repudiable Storage for Scientific Workflow Provenance}, booktitle = {5th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2019, Los Angeles, CA, USA, December 12-14, 2019}, pages = {81--90}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CIC48465.2019.00019}, doi = {10.1109/CIC48465.2019.00019}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/coinco/FernandoKHMMBYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic2e/LiG019, author = {Tianlin Li and Kartik Gopalan and Ping Yang}, title = {ContainerVisor: Customized Control of Container Resources}, booktitle = {{IEEE} International Conference on Cloud Engineering, {IC2E} 2019, Prague, Czech Republic, June 24-27, 2019}, pages = {190--199}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IC2E.2019.00033}, doi = {10.1109/IC2E.2019.00033}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/ic2e/LiG019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/FernandoTGY19, author = {Dinuni K. Fernando and Jonathan Terner and Kartik Gopalan and Ping Yang}, title = {Live Migration Ate My {VM:} Recovering a Virtual Machine after Failure of Post-Copy Live Migration}, booktitle = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019, Paris, France, April 29 - May 2, 2019}, pages = {343--351}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/INFOCOM.2019.8737452}, doi = {10.1109/INFOCOM.2019.8737452}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/FernandoTGY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscloud/LiM017, author = {Tianlin Li and Amish Mehta and Ping Yang}, title = {Security Analysis of Email Systems}, booktitle = {4th {IEEE} International Conference on Cyber Security and Cloud Computing, CSCloud 2017, New York, NY, USA, June 26-28, 2017}, pages = {91--96}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSCloud.2017.20}, doi = {10.1109/CSCLOUD.2017.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscloud/LiM017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cluster/FernandoBHYGKK16, author = {Dinuni K. Fernando and Hardik Bagdi and Yaohui Hu and Ping Yang and Kartik Gopalan and Charles A. Kamhoua and Kevin A. Kwiat}, title = {Quick Eviction of Virtual Machines through Proactive Snapshots}, booktitle = {2016 {IEEE} International Conference on Cluster Computing, {CLUSTER} 2016, Taipei, Taiwan, September 12-16, 2016}, pages = {156--157}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CLUSTER.2016.83}, doi = {10.1109/CLUSTER.2016.83}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cluster/FernandoBHYGKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ucc/FernandoBH0GKK16, author = {Dinuni K. Fernando and Hardik Bagdi and Yaohui Hu and Ping Yang and Kartik Gopalan and Charles A. Kamhoua and Kevin A. Kwiat}, editor = {Changjun Jiang and Omer F. Rana and Nick Antonopoulos}, title = {Quick eviction of virtual machines through proactive live snapshots}, booktitle = {Proceedings of the 9th International Conference on Utility and Cloud Computing, {UCC} 2016, Shanghai, China, December 6-9, 2016}, pages = {99--107}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996890.2996891}, doi = {10.1145/2996890.2996891}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ucc/FernandoBH0GKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/YangGSY15, author = {Ping Yang and Mikhail I. Gofman and Scott D. Stoller and Zijiang Yang}, title = {Policy analysis for administrative role based access control without separate administration}, journal = {J. Comput. Secur.}, volume = {23}, number = {1}, pages = {1--29}, year = {2015}, url = {https://doi.org/10.3233/JCS-140511}, doi = {10.3233/JCS-140511}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/YangGSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/HuPLKCDYG15, author = {Yaohui Hu and Sanket Panhale and Tianlin Li and Emine Kaynar and Danny Chan and Umesh Deshpande and Ping Yang and Kartik Gopalan}, editor = {Calton Pu and Ajay Mohindra}, title = {Performance Analysis of Encryption in Securing the Live Migration of Virtual Machines}, booktitle = {8th {IEEE} International Conference on Cloud Computing, {CLOUD} 2015, New York City, NY, USA, June 27 - July 2, 2015}, pages = {613--620}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CLOUD.2015.87}, doi = {10.1109/CLOUD.2015.87}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/HuPLKCDYG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiHYG15, author = {Tianlin Li and Yaohui Hu and Ping Yang and Kartik Gopalan}, title = {Privacy-preserving Virtual Machine}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {231--240}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818044}, doi = {10.1145/2818000.2818044}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiHYG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/GofmanLWHYG14, author = {Mikhail I. Gofman and Ruiqi Luo and Chad Wyszynski and Yaohui Hu and Ping Yang and Kartik Gopalan}, title = {Privacy-preserving virtual machine checkpointing mechanism}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {3}, pages = {245--266}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.064766}, doi = {10.1504/IJCC.2014.064766}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/GofmanLWHYG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsi/GofmanY14, author = {Mikhail I. Gofman and Ping Yang}, title = {Efficient Policy Analysis for Evolving Administrative Role Based Access Control}, journal = {Int. J. Softw. Informatics}, volume = {8}, number = {1}, pages = {95--131}, year = {2014}, url = {http://www.ijsi.org/ch/reader/view\_abstract.aspx?file\_no=i162}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsi/GofmanY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsi/YangJ14, author = {Ping Yang and Xiaolong Jin}, title = {Editorial: Information and Systems Security}, journal = {Int. J. Softw. Informatics}, volume = {8}, number = {2}, pages = {143--144}, year = {2014}, url = {http://www.ijsi.org/ch/reader/view\_abstract.aspx?file\_no=i190}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsi/YangJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/YangXRL14, author = {Ping Yang and Xing Xie and Indrakshi Ray and Shiyong Lu}, title = {Satisfiability Analysis of Workflows with Control-Flow Patterns and Authorization Constraints}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {7}, number = {2}, pages = {237--251}, year = {2014}, url = {https://doi.org/10.1109/TSC.2013.31}, doi = {10.1109/TSC.2013.31}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/YangXRL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isca/YangLYK13, author = {Zijiang Yang and Shiyong Lu and Ping Yang and Andrey Kashlev}, title = {Trustworthy and Dynamic Mobile Task Scheduling in Data-Intensive Scientific Workflow Environments}, journal = {Int. J. Comput. Their Appl.}, volume = {20}, number = {2}, pages = {65--77}, year = {2013}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isca/YangLYK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/HuLYG13, author = {Yaohui Hu and Tianlin Li and Ping Yang and Kartik Gopalan}, title = {An Application-Level Approach for Privacy-Preserving Virtual Machine Checkpointing}, booktitle = {2013 {IEEE} Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28 - July 3, 2013}, pages = {59--66}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CLOUD.2013.28}, doi = {10.1109/CLOUD.2013.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/HuLYG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/YangGY13, author = {Ping Yang and Mikhail I. Gofman and Zijiang Yang}, editor = {Lingyu Wang and Basit Shafiq}, title = {Policy Analysis for Administrative Role Based Access Control without Separate Administration}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {49--64}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_4}, doi = {10.1007/978-3-642-39256-6\_4}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/YangGY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/LuoYLG12, author = {Ruiqi Luo and Ping Yang and Shiyong Lu and Mikhail I. Gofman}, editor = {Louise E. Moser and Manish Parashar and Patrick C. K. Hung}, title = {Analysis of Scientific Workflow Provenance Access Control Policies}, booktitle = {2012 {IEEE} Ninth International Conference on Services Computing, Honolulu, HI, USA, June 24-29, 2012}, pages = {266--273}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SCC.2012.60}, doi = {10.1109/SCC.2012.60}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/LuoYLG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/StollerYGR11, author = {Scott D. Stoller and Ping Yang and Mikhail I. Gofman and C. R. Ramakrishnan}, title = {Symbolic reachability analysis for parameterized administrative role-based access control}, journal = {Comput. Secur.}, volume = {30}, number = {2-3}, pages = {148--164}, year = {2011}, url = {https://doi.org/10.1016/j.cose.2010.08.002}, doi = {10.1016/J.COSE.2010.08.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/StollerYGR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isca/YangLYB11, author = {Zijiang Yang and Shiyong Lu and Ping Yang and Fahima Amin Bhuyan}, title = {Model Checking Approach to Secure Host Access Enforcement of Mobile Tasks in Scientific Workflows}, journal = {Int. J. Comput. Their Appl.}, volume = {18}, number = {3}, pages = {148--159}, year = {2011}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isca/YangLYB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SasturkarYSR11, author = {Amit Sasturkar and Ping Yang and Scott D. Stoller and C. R. Ramakrishnan}, title = {Policy analysis for Administrative Role-Based Access Control}, journal = {Theor. Comput. Sci.}, volume = {412}, number = {44}, pages = {6208--6234}, year = {2011}, url = {https://doi.org/10.1016/j.tcs.2011.05.009}, doi = {10.1016/J.TCS.2011.05.009}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/SasturkarYSR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/GofmanLYG11, author = {Mikhail I. Gofman and Ruiqi Luo and Ping Yang and Kartik Gopalan}, editor = {Yan Chen and Jaideep Vaidya}, title = {{SPARC:} a security and privacy aware virtual machinecheckpointing mechanism}, booktitle = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic society, {WPES} 2011, Chicago, IL, USA, October 17, 2011}, pages = {115--124}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046556.2046571}, doi = {10.1145/2046556.2046571}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/GofmanLYG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/YangLGY10, author = {Ping Yang and Shiyong Lu and Mikhail I. Gofman and Zijiang Yang}, title = {Information flow analysis of scientific workflows}, journal = {J. Comput. Syst. Sci.}, volume = {76}, number = {6}, pages = {390--402}, year = {2010}, url = {https://doi.org/10.1016/j.jcss.2009.11.002}, doi = {10.1016/J.JCSS.2009.11.002}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/YangLGY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ChebotkoLCFY10, author = {Artem Chebotko and Shiyong Lu and Seunghan Chang and Farshad Fotouhi and Ping Yang}, title = {Secure Abstraction Views for Scientific Workflow Provenance Querying}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {3}, number = {4}, pages = {322--337}, year = {2010}, url = {https://doi.org/10.1109/TSC.2010.38}, doi = {10.1109/TSC.2010.38}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/ChebotkoLCFY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GofmanLY10, author = {Mikhail I. Gofman and Ruiqi Luo and Ping Yang}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {User-Role Reachability Analysis of Evolving Administrative Role Based Access Control}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {455--471}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_28}, doi = {10.1007/978-3-642-15497-3\_28}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GofmanLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icppw/LinGY10, author = {Zhao Lin and Kartik Gopalan and Ping Yang}, editor = {Wang{-}Chien Lee and Xin Yuan}, title = {A Case for Secure Virtual Append-Only Storage for Virtual Machines}, booktitle = {39th International Conference on Parallel Processing, {ICPP} Workshops 2010, San Diego, California, USA, 13-16 September 2010}, pages = {245--250}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICPPW.2010.15}, doi = {10.1109/ICPPW.2010.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icppw/LinGY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/GofmanLHZY09, author = {Mikhail I. Gofman and Ruiqi Luo and Jian He and Yingbin Zhang and Ping Yang}, editor = {Hamid R. Arabnia and Kevin Daimi}, title = {Incremental Information Flow Analysis of Role Based Access Control}, booktitle = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {397--403}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Thu, 20 Oct 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csreaSAM/GofmanLHZY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/StollerYGR09, author = {Scott D. Stoller and Ping Yang and Mikhail I. Gofman and C. R. Ramakrishnan}, editor = {Barbara Carminati and James Joshi}, title = {Symbolic reachability analysis for parameterized administrative role based access control}, booktitle = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2009, Stresa, Italy, June 3-5, 2009, Proceedings}, pages = {165--174}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1542207.1542233}, doi = {10.1145/1542207.1542233}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/StollerYGR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/GofmanLSZYS09, author = {Mikhail I. Gofman and Ruiqi Luo and Ayla C. Solomon and Yingbin Zhang and Ping Yang and Scott D. Stoller}, editor = {Stefan Kowalewski and Anna Philippou}, title = {{RBAC-PAT:} {A} Policy Analysis Tool for Role Based Access Control}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems, 15th International Conference, {TACAS} 2009, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2009, York, UK, March 22-29, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5505}, pages = {46--49}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00768-2\_4}, doi = {10.1007/978-3-642-00768-2\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/tacas/GofmanLSZYS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/GarepalliGY08, author = {Navodaya Garepalli and Kartik Gopalan and Ping Yang}, title = {Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols}, booktitle = {Proceedings of the 17th International Conference on Computer Communications and Networks, {IEEE} {ICCCN} 2008, St. Thomas, {U.S.} Virgin Islands, August 3-7, 2008}, pages = {125--130}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICCCN.2008.ECP.41}, doi = {10.1109/ICCCN.2008.ECP.41}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/GarepalliGY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/ChebotkoCLFY08, author = {Artem Chebotko and Seunghan Chang and Shiyong Lu and Farshad Fotouhi and Ping Yang}, title = {Scientific Workflow Provenance Querying with Security Views}, booktitle = {The Ninth International Conference on Web-Age Information Management, {WAIM} 2008, July 20-22, 2008, Zhangjiajie, China}, pages = {349--356}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WAIM.2008.41}, doi = {10.1109/WAIM.2008.41}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/waim/ChebotkoCLFY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/YangLY07, author = {Zijiang Yang and Shiyong Lu and Ping Yang}, title = {Itinerary-Based Access Control for Mobile Tasks in Scientific Workflows}, booktitle = {21st International Conference on Advanced Information Networking and Applications {(AINA} 2007), Workshops Proceedings, Volume 2, May 21-23, 2007, Niagara Falls, Canada}, pages = {506--511}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/AINAW.2007.215}, doi = {10.1109/AINAW.2007.215}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/YangLY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/StollerYRG07, author = {Scott D. Stoller and Ping Yang and C. R. Ramakrishnan and Mikhail I. Gofman}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Efficient policy analysis for administrative role based access control}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {445--455}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315300}, doi = {10.1145/1315245.1315300}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/StollerYRG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eScience/YangYL07, author = {Ping Yang and Zijiang Yang and Shiyong Lu}, title = {Formal Modeling and Analysis of Scientific Workflows Using Hierarchical State Machines}, booktitle = {Third International Conference on e-Science and Grid Computing, e-Science 2007, 10-13 December 2007, Bangalore, India}, pages = {619--626}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/E-SCIENCE.2007.35}, doi = {10.1109/E-SCIENCE.2007.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eScience/YangYL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/SasturkarYSR06, author = {Amit Sasturkar and Ping Yang and Scott D. Stoller and C. R. Ramakrishnan}, title = {Policy Analysis for Administrative Role Based Access Control}, booktitle = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006), 5-7 July 2006, Venice, Italy}, pages = {124--138}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CSFW.2006.22}, doi = {10.1109/CSFW.2006.22}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/SasturkarYSR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/YangLY06, author = {Zijiang Yang and Shiyong Lu and Ping Yang}, title = {Runtime Security Verification for Itinerary-Driven Mobile Agents}, booktitle = {Second International Symposium on Dependable Autonomic and Secure Computing {(DASC} 2006), 29 September - 1 October 2006, Indianapolis, Indiana, {USA}}, pages = {177--186}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/DASC.2006.42}, doi = {10.1109/DASC.2006.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/YangLY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/YangBR06, author = {Ping Yang and Samik Basu and C. R. Ramakrishnan}, editor = {Holger Hermanns and Jens Palsberg}, title = {Parameterized Verification of pi-Calculus Systems}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems, 12th International Conference, {TACAS} 2006 Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2006, Vienna, Austria, March 25 - April 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3920}, pages = {42--57}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11691372\_3}, doi = {10.1007/11691372\_3}, timestamp = {Sat, 30 Sep 2023 09:57:43 +0200}, biburl = {https://dblp.org/rec/conf/tacas/YangBR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/padl/YangDRS05, author = {Ping Yang and Yifei Dong and C. R. Ramakrishnan and Scott A. Smolka}, editor = {Manuel V. Hermenegildo and Daniel Cabeza}, title = {A Provably Correct Compiler for Efficient Model Checking of Mobile Processes}, booktitle = {Practical Aspects of Declarative Languages, 7th International Symposium, {PADL} 2005, Long Beach, CA, USA, January 10-11, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3350}, pages = {113--127}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30557-6\_10}, doi = {10.1007/978-3-540-30557-6\_10}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/padl/YangDRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/YangRS04, author = {Ping Yang and C. R. Ramakrishnan and Scott A. Smolka}, title = {A logical encoding of the pi-calculus: model checking mobile processes using tabled resolution}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {6}, number = {1}, pages = {38--66}, year = {2004}, url = {https://doi.org/10.1007/s10009-003-0136-3}, doi = {10.1007/S10009-003-0136-3}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/YangRS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vmcai/YangRS03, author = {Ping Yang and C. R. Ramakrishnan and Scott A. Smolka}, editor = {Lenore D. Zuck and Paul C. Attie and Agostino Cortesi and Supratik Mukhopadhyay}, title = {A Logical Encoding of the pi-Calculus: Model Checking Mobile Processes Using Tabled Resolution}, booktitle = {Verification, Model Checking, and Abstract Interpretation, 4th International Conference, {VMCAI} 2003, New York, NY, USA, January 9-11, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2575}, pages = {116--131}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36384-X\_12}, doi = {10.1007/3-540-36384-X\_12}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vmcai/YangRS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.