BibTeX records: Ping Yang 0002

download as .bib file

@article{DBLP:journals/tcc/FernandoTYG23,
  author       = {Dinuni K. Fernando and
                  Jonathan Terner and
                  Ping Yang and
                  Kartik Gopalan},
  title        = {V-Recover: Virtual Machine Recovery When Live Migration Fails},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {3},
  pages        = {3289--3300},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2023.3282466},
  doi          = {10.1109/TCC.2023.3282466},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/FernandoTYG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/GwakWWYSS023,
  author       = {Joon{-}Young Gwak and
                  Priti Prabhakar Wakodikar and
                  Meng Wang and
                  Guanhua Yan and
                  Xiaokui Shu and
                  Scott D. Stoller and
                  Ping Yang},
  editor       = {Jihe Wang and
                  Yi He and
                  Thang N. Dinh and
                  Christan Grant and
                  Meikang Qiu and
                  Witold Pedrycz},
  title        = {Debugging Malware Classification Models Based on Event Logs with Explainable
                  {AI}},
  booktitle    = {{IEEE} International Conference on Data Mining, {ICDM} 2023 - Workshops,
                  Shanghai, China, December 4, 2023},
  pages        = {939--948},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICDMW60847.2023.00125},
  doi          = {10.1109/ICDMW60847.2023.00125},
  timestamp    = {Tue, 13 Feb 2024 13:22:54 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/GwakWWYSS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MofradAZLYC22,
  author       = {Saeid Mofrad and
                  Ishtiaq Ahmed and
                  Fengwei Zhang and
                  Shiyong Lu and
                  Ping Yang and
                  Heming Cui},
  title        = {Securing Big Data Scientific Workflows via Trusted Heterogeneous Environments},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {6},
  pages        = {4187--4203},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3123640},
  doi          = {10.1109/TDSC.2021.3123640},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MofradAZLYC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/HerathWYY22,
  author       = {Jerome Dinal Herath and
                  Priti Prabhakar Wakodikar and
                  Ping Yang and
                  Guanhua Yan},
  title        = {CFGExplainer: Explaining Graph Neural Network-Based Malware Classification
                  from Control Flow Graphs},
  booktitle    = {52nd Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2022, Baltimore, MD, USA, June 27-30, 2022},
  pages        = {172--184},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSN53405.2022.00028},
  doi          = {10.1109/DSN53405.2022.00028},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/HerathWYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/YangLY21,
  author       = {Zezhang Yang and
                  Jian Li and
                  Ping Yang},
  title        = {FedADMP: {A} Joint Anomaly Detection and Mobility Prediction Framework
                  via Federated Learning},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {29},
  pages        = {e4},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.21-10-2021.171595},
  doi          = {10.4108/EAI.21-10-2021.171595},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/YangLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/HerathYY21,
  author       = {Jerome Dinal Herath and
                  Ping Yang and
                  Guanhua Yan},
  editor       = {Anupam Joshi and
                  Barbara Carminati and
                  Rakesh M. Verma},
  title        = {Real-Time Evasion Attacks against Deep Learning-Based Anomaly Detection
                  from Distributed System Logs},
  booktitle    = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security
                  and Privacy, Virtual Event, USA, April 26-28, 2021},
  pages        = {29--40},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422337.3447833},
  doi          = {10.1145/3422337.3447833},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/HerathYY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MofradALYCZ19,
  author       = {Saeid Mofrad and
                  Ishtiaq Ahmed and
                  Shiyong Lu and
                  Ping Yang and
                  Heming Cui and
                  Fengwei Zhang},
  editor       = {David Balenson},
  title        = {SecDATAVIEW: a secure big data workflow management system for heterogeneous
                  computing environments},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {390--403},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359845},
  doi          = {10.1145/3359789.3359845},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MofradALYCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/HerathBYYL19,
  author       = {Jerome Dinal Herath and
                  Changxin Bai and
                  Guanhua Yan and
                  Ping Yang and
                  Shiyong Lu},
  editor       = {Chaitanya K. Baru and
                  Jun Huan and
                  Latifur Khan and
                  Xiaohua Hu and
                  Ronay Ak and
                  Yuanyuan Tian and
                  Roger S. Barga and
                  Carlo Zaniolo and
                  Kisung Lee and
                  Yanfang (Fanny) Ye},
  title        = {{RAMP:} Real-Time Anomaly Detection in Scientific Workflows},
  booktitle    = {2019 {IEEE} International Conference on Big Data {(IEEE} BigData),
                  Los Angeles, CA, USA, December 9-12, 2019},
  pages        = {1367--1374},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/BigData47090.2019.9005653},
  doi          = {10.1109/BIGDATA47090.2019.9005653},
  timestamp    = {Tue, 18 Oct 2022 14:44:48 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/HerathBYYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/FernandoKHMMBYY19,
  author       = {Dinuni K. Fernando and
                  Siddharth Kulshrestha and
                  Jerome Dinal Herath and
                  Nitin Mahadik and
                  Yanzhe Ma and
                  Changxin Bai and
                  Ping Yang and
                  Guanhua Yan and
                  Shiyong Lu},
  title        = {SciBlock: {A} Blockchain-Based Tamper-Proof Non-Repudiable Storage
                  for Scientific Workflow Provenance},
  booktitle    = {5th {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2019, Los Angeles, CA, USA, December 12-14, 2019},
  pages        = {81--90},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CIC48465.2019.00019},
  doi          = {10.1109/CIC48465.2019.00019},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/coinco/FernandoKHMMBYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic2e/LiG019,
  author       = {Tianlin Li and
                  Kartik Gopalan and
                  Ping Yang},
  title        = {ContainerVisor: Customized Control of Container Resources},
  booktitle    = {{IEEE} International Conference on Cloud Engineering, {IC2E} 2019,
                  Prague, Czech Republic, June 24-27, 2019},
  pages        = {190--199},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IC2E.2019.00033},
  doi          = {10.1109/IC2E.2019.00033},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ic2e/LiG019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/FernandoTGY19,
  author       = {Dinuni K. Fernando and
                  Jonathan Terner and
                  Kartik Gopalan and
                  Ping Yang},
  title        = {Live Migration Ate My {VM:} Recovering a Virtual Machine after Failure
                  of Post-Copy Live Migration},
  booktitle    = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019,
                  Paris, France, April 29 - May 2, 2019},
  pages        = {343--351},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/INFOCOM.2019.8737452},
  doi          = {10.1109/INFOCOM.2019.8737452},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/FernandoTGY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/LiM017,
  author       = {Tianlin Li and
                  Amish Mehta and
                  Ping Yang},
  title        = {Security Analysis of Email Systems},
  booktitle    = {4th {IEEE} International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2017, New York, NY, USA, June 26-28, 2017},
  pages        = {91--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CSCloud.2017.20},
  doi          = {10.1109/CSCLOUD.2017.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscloud/LiM017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cluster/FernandoBHYGKK16,
  author       = {Dinuni K. Fernando and
                  Hardik Bagdi and
                  Yaohui Hu and
                  Ping Yang and
                  Kartik Gopalan and
                  Charles A. Kamhoua and
                  Kevin A. Kwiat},
  title        = {Quick Eviction of Virtual Machines through Proactive Snapshots},
  booktitle    = {2016 {IEEE} International Conference on Cluster Computing, {CLUSTER}
                  2016, Taipei, Taiwan, September 12-16, 2016},
  pages        = {156--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CLUSTER.2016.83},
  doi          = {10.1109/CLUSTER.2016.83},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cluster/FernandoBHYGKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucc/FernandoBH0GKK16,
  author       = {Dinuni K. Fernando and
                  Hardik Bagdi and
                  Yaohui Hu and
                  Ping Yang and
                  Kartik Gopalan and
                  Charles A. Kamhoua and
                  Kevin A. Kwiat},
  editor       = {Changjun Jiang and
                  Omer F. Rana and
                  Nick Antonopoulos},
  title        = {Quick eviction of virtual machines through proactive live snapshots},
  booktitle    = {Proceedings of the 9th International Conference on Utility and Cloud
                  Computing, {UCC} 2016, Shanghai, China, December 6-9, 2016},
  pages        = {99--107},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996890.2996891},
  doi          = {10.1145/2996890.2996891},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ucc/FernandoBH0GKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/YangGSY15,
  author       = {Ping Yang and
                  Mikhail I. Gofman and
                  Scott D. Stoller and
                  Zijiang Yang},
  title        = {Policy analysis for administrative role based access control without
                  separate administration},
  journal      = {J. Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {1--29},
  year         = {2015},
  url          = {https://doi.org/10.3233/JCS-140511},
  doi          = {10.3233/JCS-140511},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/YangGSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/HuPLKCDYG15,
  author       = {Yaohui Hu and
                  Sanket Panhale and
                  Tianlin Li and
                  Emine Kaynar and
                  Danny Chan and
                  Umesh Deshpande and
                  Ping Yang and
                  Kartik Gopalan},
  editor       = {Calton Pu and
                  Ajay Mohindra},
  title        = {Performance Analysis of Encryption in Securing the Live Migration
                  of Virtual Machines},
  booktitle    = {8th {IEEE} International Conference on Cloud Computing, {CLOUD} 2015,
                  New York City, NY, USA, June 27 - July 2, 2015},
  pages        = {613--620},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CLOUD.2015.87},
  doi          = {10.1109/CLOUD.2015.87},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/HuPLKCDYG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LiHYG15,
  author       = {Tianlin Li and
                  Yaohui Hu and
                  Ping Yang and
                  Kartik Gopalan},
  title        = {Privacy-preserving Virtual Machine},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {231--240},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818044},
  doi          = {10.1145/2818000.2818044},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/LiHYG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcc/GofmanLWHYG14,
  author       = {Mikhail I. Gofman and
                  Ruiqi Luo and
                  Chad Wyszynski and
                  Yaohui Hu and
                  Ping Yang and
                  Kartik Gopalan},
  title        = {Privacy-preserving virtual machine checkpointing mechanism},
  journal      = {Int. J. Cloud Comput.},
  volume       = {3},
  number       = {3},
  pages        = {245--266},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJCC.2014.064766},
  doi          = {10.1504/IJCC.2014.064766},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcc/GofmanLWHYG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsi/GofmanY14,
  author       = {Mikhail I. Gofman and
                  Ping Yang},
  title        = {Efficient Policy Analysis for Evolving Administrative Role Based Access
                  Control},
  journal      = {Int. J. Softw. Informatics},
  volume       = {8},
  number       = {1},
  pages        = {95--131},
  year         = {2014},
  url          = {http://www.ijsi.org/ch/reader/view\_abstract.aspx?file\_no=i162},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsi/GofmanY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsi/YangJ14,
  author       = {Ping Yang and
                  Xiaolong Jin},
  title        = {Editorial: Information and Systems Security},
  journal      = {Int. J. Softw. Informatics},
  volume       = {8},
  number       = {2},
  pages        = {143--144},
  year         = {2014},
  url          = {http://www.ijsi.org/ch/reader/view\_abstract.aspx?file\_no=i190},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsi/YangJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/YangXRL14,
  author       = {Ping Yang and
                  Xing Xie and
                  Indrakshi Ray and
                  Shiyong Lu},
  title        = {Satisfiability Analysis of Workflows with Control-Flow Patterns and
                  Authorization Constraints},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {7},
  number       = {2},
  pages        = {237--251},
  year         = {2014},
  url          = {https://doi.org/10.1109/TSC.2013.31},
  doi          = {10.1109/TSC.2013.31},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/YangXRL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isca/YangLYK13,
  author       = {Zijiang Yang and
                  Shiyong Lu and
                  Ping Yang and
                  Andrey Kashlev},
  title        = {Trustworthy and Dynamic Mobile Task Scheduling in Data-Intensive Scientific
                  Workflow Environments},
  journal      = {Int. J. Comput. Their Appl.},
  volume       = {20},
  number       = {2},
  pages        = {65--77},
  year         = {2013},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isca/YangLYK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/HuLYG13,
  author       = {Yaohui Hu and
                  Tianlin Li and
                  Ping Yang and
                  Kartik Gopalan},
  title        = {An Application-Level Approach for Privacy-Preserving Virtual Machine
                  Checkpointing},
  booktitle    = {2013 {IEEE} Sixth International Conference on Cloud Computing, Santa
                  Clara, CA, USA, June 28 - July 3, 2013},
  pages        = {59--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CLOUD.2013.28},
  doi          = {10.1109/CLOUD.2013.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/HuLYG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/YangGY13,
  author       = {Ping Yang and
                  Mikhail I. Gofman and
                  Zijiang Yang},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Policy Analysis for Administrative Role Based Access Control without
                  Separate Administration},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_4},
  doi          = {10.1007/978-3-642-39256-6\_4},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/YangGY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/LuoYLG12,
  author       = {Ruiqi Luo and
                  Ping Yang and
                  Shiyong Lu and
                  Mikhail I. Gofman},
  editor       = {Louise E. Moser and
                  Manish Parashar and
                  Patrick C. K. Hung},
  title        = {Analysis of Scientific Workflow Provenance Access Control Policies},
  booktitle    = {2012 {IEEE} Ninth International Conference on Services Computing,
                  Honolulu, HI, USA, June 24-29, 2012},
  pages        = {266--273},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SCC.2012.60},
  doi          = {10.1109/SCC.2012.60},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/LuoYLG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/StollerYGR11,
  author       = {Scott D. Stoller and
                  Ping Yang and
                  Mikhail I. Gofman and
                  C. R. Ramakrishnan},
  title        = {Symbolic reachability analysis for parameterized administrative role-based
                  access control},
  journal      = {Comput. Secur.},
  volume       = {30},
  number       = {2-3},
  pages        = {148--164},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cose.2010.08.002},
  doi          = {10.1016/J.COSE.2010.08.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/StollerYGR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isca/YangLYB11,
  author       = {Zijiang Yang and
                  Shiyong Lu and
                  Ping Yang and
                  Fahima Amin Bhuyan},
  title        = {Model Checking Approach to Secure Host Access Enforcement of Mobile
                  Tasks in Scientific Workflows},
  journal      = {Int. J. Comput. Their Appl.},
  volume       = {18},
  number       = {3},
  pages        = {148--159},
  year         = {2011},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isca/YangLYB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/SasturkarYSR11,
  author       = {Amit Sasturkar and
                  Ping Yang and
                  Scott D. Stoller and
                  C. R. Ramakrishnan},
  title        = {Policy analysis for Administrative Role-Based Access Control},
  journal      = {Theor. Comput. Sci.},
  volume       = {412},
  number       = {44},
  pages        = {6208--6234},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.tcs.2011.05.009},
  doi          = {10.1016/J.TCS.2011.05.009},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/SasturkarYSR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/GofmanLYG11,
  author       = {Mikhail I. Gofman and
                  Ruiqi Luo and
                  Ping Yang and
                  Kartik Gopalan},
  editor       = {Yan Chen and
                  Jaideep Vaidya},
  title        = {{SPARC:} a security and privacy aware virtual machinecheckpointing
                  mechanism},
  booktitle    = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic
                  society, {WPES} 2011, Chicago, IL, USA, October 17, 2011},
  pages        = {115--124},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046556.2046571},
  doi          = {10.1145/2046556.2046571},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/GofmanLYG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/YangLGY10,
  author       = {Ping Yang and
                  Shiyong Lu and
                  Mikhail I. Gofman and
                  Zijiang Yang},
  title        = {Information flow analysis of scientific workflows},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {76},
  number       = {6},
  pages        = {390--402},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.jcss.2009.11.002},
  doi          = {10.1016/J.JCSS.2009.11.002},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcss/YangLGY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ChebotkoLCFY10,
  author       = {Artem Chebotko and
                  Shiyong Lu and
                  Seunghan Chang and
                  Farshad Fotouhi and
                  Ping Yang},
  title        = {Secure Abstraction Views for Scientific Workflow Provenance Querying},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {3},
  number       = {4},
  pages        = {322--337},
  year         = {2010},
  url          = {https://doi.org/10.1109/TSC.2010.38},
  doi          = {10.1109/TSC.2010.38},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/ChebotkoLCFY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GofmanLY10,
  author       = {Mikhail I. Gofman and
                  Ruiqi Luo and
                  Ping Yang},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {User-Role Reachability Analysis of Evolving Administrative Role Based
                  Access Control},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {455--471},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_28},
  doi          = {10.1007/978-3-642-15497-3\_28},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GofmanLY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icppw/LinGY10,
  author       = {Zhao Lin and
                  Kartik Gopalan and
                  Ping Yang},
  editor       = {Wang{-}Chien Lee and
                  Xin Yuan},
  title        = {A Case for Secure Virtual Append-Only Storage for Virtual Machines},
  booktitle    = {39th International Conference on Parallel Processing, {ICPP} Workshops
                  2010, San Diego, California, USA, 13-16 September 2010},
  pages        = {245--250},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICPPW.2010.15},
  doi          = {10.1109/ICPPW.2010.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icppw/LinGY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/GofmanLHZY09,
  author       = {Mikhail I. Gofman and
                  Ruiqi Luo and
                  Jian He and
                  Yingbin Zhang and
                  Ping Yang},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi},
  title        = {Incremental Information Flow Analysis of Role Based Access Control},
  booktitle    = {Proceedings of the 2009 International Conference on Security {\&}
                  Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {397--403},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Thu, 20 Oct 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/GofmanLHZY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/StollerYGR09,
  author       = {Scott D. Stoller and
                  Ping Yang and
                  Mikhail I. Gofman and
                  C. R. Ramakrishnan},
  editor       = {Barbara Carminati and
                  James Joshi},
  title        = {Symbolic reachability analysis for parameterized administrative role
                  based access control},
  booktitle    = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2009, Stresa, Italy, June 3-5, 2009, Proceedings},
  pages        = {165--174},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1542207.1542233},
  doi          = {10.1145/1542207.1542233},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/StollerYGR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/GofmanLSZYS09,
  author       = {Mikhail I. Gofman and
                  Ruiqi Luo and
                  Ayla C. Solomon and
                  Yingbin Zhang and
                  Ping Yang and
                  Scott D. Stoller},
  editor       = {Stefan Kowalewski and
                  Anna Philippou},
  title        = {{RBAC-PAT:} {A} Policy Analysis Tool for Role Based Access Control},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems,
                  15th International Conference, {TACAS} 2009, Held as Part of the Joint
                  European Conferences on Theory and Practice of Software, {ETAPS} 2009,
                  York, UK, March 22-29, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5505},
  pages        = {46--49},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00768-2\_4},
  doi          = {10.1007/978-3-642-00768-2\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/GofmanLSZYS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/GarepalliGY08,
  author       = {Navodaya Garepalli and
                  Kartik Gopalan and
                  Ping Yang},
  title        = {Control Message Reduction Techniques in Backward Learning Ad Hoc Routing
                  Protocols},
  booktitle    = {Proceedings of the 17th International Conference on Computer Communications
                  and Networks, {IEEE} {ICCCN} 2008, St. Thomas, {U.S.} Virgin Islands,
                  August 3-7, 2008},
  pages        = {125--130},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICCCN.2008.ECP.41},
  doi          = {10.1109/ICCCN.2008.ECP.41},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/GarepalliGY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waim/ChebotkoCLFY08,
  author       = {Artem Chebotko and
                  Seunghan Chang and
                  Shiyong Lu and
                  Farshad Fotouhi and
                  Ping Yang},
  title        = {Scientific Workflow Provenance Querying with Security Views},
  booktitle    = {The Ninth International Conference on Web-Age Information Management,
                  {WAIM} 2008, July 20-22, 2008, Zhangjiajie, China},
  pages        = {349--356},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WAIM.2008.41},
  doi          = {10.1109/WAIM.2008.41},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/waim/ChebotkoCLFY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/YangLY07,
  author       = {Zijiang Yang and
                  Shiyong Lu and
                  Ping Yang},
  title        = {Itinerary-Based Access Control for Mobile Tasks in Scientific Workflows},
  booktitle    = {21st International Conference on Advanced Information Networking and
                  Applications {(AINA} 2007), Workshops Proceedings, Volume 2, May 21-23,
                  2007, Niagara Falls, Canada},
  pages        = {506--511},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AINAW.2007.215},
  doi          = {10.1109/AINAW.2007.215},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/YangLY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StollerYRG07,
  author       = {Scott D. Stoller and
                  Ping Yang and
                  C. R. Ramakrishnan and
                  Mikhail I. Gofman},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Efficient policy analysis for administrative role based access control},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {445--455},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315300},
  doi          = {10.1145/1315245.1315300},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/StollerYRG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eScience/YangYL07,
  author       = {Ping Yang and
                  Zijiang Yang and
                  Shiyong Lu},
  title        = {Formal Modeling and Analysis of Scientific Workflows Using Hierarchical
                  State Machines},
  booktitle    = {Third International Conference on e-Science and Grid Computing, e-Science
                  2007, 10-13 December 2007, Bangalore, India},
  pages        = {619--626},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/E-SCIENCE.2007.35},
  doi          = {10.1109/E-SCIENCE.2007.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eScience/YangYL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SasturkarYSR06,
  author       = {Amit Sasturkar and
                  Ping Yang and
                  Scott D. Stoller and
                  C. R. Ramakrishnan},
  title        = {Policy Analysis for Administrative Role Based Access Control},
  booktitle    = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006),
                  5-7 July 2006, Venice, Italy},
  pages        = {124--138},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/CSFW.2006.22},
  doi          = {10.1109/CSFW.2006.22},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/SasturkarYSR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/YangLY06,
  author       = {Zijiang Yang and
                  Shiyong Lu and
                  Ping Yang},
  title        = {Runtime Security Verification for Itinerary-Driven Mobile Agents},
  booktitle    = {Second International Symposium on Dependable Autonomic and Secure
                  Computing {(DASC} 2006), 29 September - 1 October 2006, Indianapolis,
                  Indiana, {USA}},
  pages        = {177--186},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/DASC.2006.42},
  doi          = {10.1109/DASC.2006.42},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/YangLY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/YangBR06,
  author       = {Ping Yang and
                  Samik Basu and
                  C. R. Ramakrishnan},
  editor       = {Holger Hermanns and
                  Jens Palsberg},
  title        = {Parameterized Verification of pi-Calculus Systems},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems,
                  12th International Conference, {TACAS} 2006 Held as Part of the Joint
                  European Conferences on Theory and Practice of Software, {ETAPS} 2006,
                  Vienna, Austria, March 25 - April 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3920},
  pages        = {42--57},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11691372\_3},
  doi          = {10.1007/11691372\_3},
  timestamp    = {Sat, 30 Sep 2023 09:57:43 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/YangBR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/padl/YangDRS05,
  author       = {Ping Yang and
                  Yifei Dong and
                  C. R. Ramakrishnan and
                  Scott A. Smolka},
  editor       = {Manuel V. Hermenegildo and
                  Daniel Cabeza},
  title        = {A Provably Correct Compiler for Efficient Model Checking of Mobile
                  Processes},
  booktitle    = {Practical Aspects of Declarative Languages, 7th International Symposium,
                  {PADL} 2005, Long Beach, CA, USA, January 10-11, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3350},
  pages        = {113--127},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30557-6\_10},
  doi          = {10.1007/978-3-540-30557-6\_10},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/padl/YangDRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/YangRS04,
  author       = {Ping Yang and
                  C. R. Ramakrishnan and
                  Scott A. Smolka},
  title        = {A logical encoding of the pi-calculus: model checking mobile processes
                  using tabled resolution},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {6},
  number       = {1},
  pages        = {38--66},
  year         = {2004},
  url          = {https://doi.org/10.1007/s10009-003-0136-3},
  doi          = {10.1007/S10009-003-0136-3},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/YangRS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vmcai/YangRS03,
  author       = {Ping Yang and
                  C. R. Ramakrishnan and
                  Scott A. Smolka},
  editor       = {Lenore D. Zuck and
                  Paul C. Attie and
                  Agostino Cortesi and
                  Supratik Mukhopadhyay},
  title        = {A Logical Encoding of the pi-Calculus: Model Checking Mobile Processes
                  Using Tabled Resolution},
  booktitle    = {Verification, Model Checking, and Abstract Interpretation, 4th International
                  Conference, {VMCAI} 2003, New York, NY, USA, January 9-11, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2575},
  pages        = {116--131},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36384-X\_12},
  doi          = {10.1007/3-540-36384-X\_12},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vmcai/YangRS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics