BibTeX records: Xinwen Zhang

download as .bib file

@article{DBLP:journals/phycomm/JiangLZJH23,
  author       = {Yuwei Jiang and
                  Yueheng Li and
                  Xinwen Zhang and
                  Meiyan Ju and
                  Ping Huang},
  title        = {Outage performance analysis for relay-assisted {UWOC} systems over
                  {GGD} weak turbulence with nonzero boresight pointing errors},
  journal      = {Phys. Commun.},
  volume       = {58},
  pages        = {102017},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.phycom.2023.102017},
  doi          = {10.1016/J.PHYCOM.2023.102017},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/phycomm/JiangLZJH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbi/ZhangZLYC23,
  author       = {Xinwen Zhang and
                  Chaoyi Zhang and
                  Dongnan Liu and
                  Qianbi Yu and
                  Weidong Cai},
  title        = {SynthMix: Mixing Up Aligned Synthesis for Medical Cross-Modality Domain
                  Adaptation},
  booktitle    = {20th {IEEE} International Symposium on Biomedical Imaging, {ISBI}
                  2023, Cartagena, Colombia, April 18-21, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISBI53787.2023.10230360},
  doi          = {10.1109/ISBI53787.2023.10230360},
  timestamp    = {Wed, 04 Oct 2023 17:01:25 +0200},
  biburl       = {https://dblp.org/rec/conf/isbi/ZhangZLYC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscit/LiGBZMX23,
  author       = {Xinru Li and
                  Yi Gong and
                  JingNing Bai and
                  Xinwen Zhang and
                  Fanke Meng and
                  Zhan Xu},
  title        = {A Compressive Sensing and Denoising RCAN-Based Channel Estimation
                  Scheme for {OTFS} System},
  booktitle    = {22nd International Symposium on Communications and Information Technologies,
                  {ISCIT} 2023, Sydney, Australia, October 16-18, 2023},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISCIT57293.2023.10376082},
  doi          = {10.1109/ISCIT57293.2023.10376082},
  timestamp    = {Tue, 16 Jan 2024 21:01:25 +0100},
  biburl       = {https://dblp.org/rec/conf/iscit/LiGBZMX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/GaoZ23,
  author       = {Hongchang Gao and
                  Xinwen Zhang},
  editor       = {Ambuj K. Singh and
                  Yizhou Sun and
                  Leman Akoglu and
                  Dimitrios Gunopulos and
                  Xifeng Yan and
                  Ravi Kumar and
                  Fatma Ozcan and
                  Jieping Ye},
  title        = {Distributed Optimization for Big Data Analytics: Beyond Minimization},
  booktitle    = {Proceedings of the 29th {ACM} {SIGKDD} Conference on Knowledge Discovery
                  and Data Mining, {KDD} 2023, Long Beach, CA, USA, August 6-10, 2023},
  pages        = {5800--5801},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3580305.3599554},
  doi          = {10.1145/3580305.3599554},
  timestamp    = {Mon, 25 Sep 2023 08:29:22 +0200},
  biburl       = {https://dblp.org/rec/conf/kdd/GaoZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/ZhangZYSG23,
  author       = {Xinwen Zhang and
                  Yihan Zhang and
                  Tianbao Yang and
                  Richard Souvenir and
                  Hongchang Gao},
  editor       = {Alice Oh and
                  Tristan Naumann and
                  Amir Globerson and
                  Kate Saenko and
                  Moritz Hardt and
                  Sergey Levine},
  title        = {Federated Compositional Deep {AUC} Maximization},
  booktitle    = {Advances in Neural Information Processing Systems 36: Annual Conference
                  on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans,
                  LA, USA, December 10 - 16, 2023},
  year         = {2023},
  url          = {http://papers.nips.cc/paper\_files/paper/2023/hash/1e7b192fc8b3acb93749c5accfa60e0c-Abstract-Conference.html},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/ZhangZYSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-10101,
  author       = {Xinwen Zhang and
                  Yihan Zhang and
                  Tianbao Yang and
                  Richard Souvenir and
                  Hongchang Gao},
  title        = {Federated Compositional Deep {AUC} Maximization},
  journal      = {CoRR},
  volume       = {abs/2304.10101},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.10101},
  doi          = {10.48550/ARXIV.2304.10101},
  eprinttype    = {arXiv},
  eprint       = {2304.10101},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-10101.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-04156,
  author       = {Xinwen Zhang and
                  Chaoyi Zhang and
                  Dongnan Liu and
                  Qianbi Yu and
                  Tom Weidong Cai},
  title        = {SynthMix: Mixing up Aligned Synthesis for Medical Cross-Modality Domain
                  Adaptation},
  journal      = {CoRR},
  volume       = {abs/2305.04156},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.04156},
  doi          = {10.48550/ARXIV.2305.04156},
  eprinttype    = {arXiv},
  eprint       = {2305.04156},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-04156.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmvc/YuLZZ022,
  author       = {Qianbi Yu and
                  Dongnan Liu and
                  Chaoyi Zhang and
                  Xinwen Zhang and
                  Weidong Cai},
  title        = {Unsupervised Domain Adaptive Fundus Image Segmentation with Few Labeled
                  Source Data},
  booktitle    = {33rd British Machine Vision Conference 2022, {BMVC} 2022, London,
                  UK, November 21-24, 2022},
  pages        = {237},
  publisher    = {{BMVA} Press},
  year         = {2022},
  url          = {https://bmvc2022.mpi-inf.mpg.de/237/},
  timestamp    = {Thu, 16 Feb 2023 16:15:04 +0100},
  biburl       = {https://dblp.org/rec/conf/bmvc/YuLZZ022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cicai/ZhangLWZ22,
  author       = {Zichen Zhang and
                  Yong Luo and
                  Yonggang Wen and
                  Xinwen Zhang},
  editor       = {Lu Fang and
                  Daniel Povey and
                  Guangtao Zhai and
                  Tao Mei and
                  Ruiping Wang},
  title        = {CycleResume: {A} Cycle Learning Framework with Hybrid Attention for
                  Fine-Grained Talent-Job Fit},
  booktitle    = {Artificial Intelligence - Second {CAAI} International Conference,
                  {CICAI} 2022, Beijing, China, August 27-28, 2022, Revised Selected
                  Papers, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13606},
  pages        = {260--271},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20503-3\_21},
  doi          = {10.1007/978-3-031-20503-3\_21},
  timestamp    = {Mon, 12 Feb 2024 16:07:12 +0100},
  biburl       = {https://dblp.org/rec/conf/cicai/ZhangLWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-10736,
  author       = {Jin Fang and
                  Jiacheng Weng and
                  Yi Xiang and
                  Xinwen Zhang},
  title        = {Imitate then Transcend: Multi-Agent Optimal Execution with Dual-Window
                  Denoise {PPO}},
  journal      = {CoRR},
  volume       = {abs/2206.10736},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.10736},
  doi          = {10.48550/ARXIV.2206.10736},
  eprinttype    = {arXiv},
  eprint       = {2206.10736},
  timestamp    = {Mon, 27 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-10736.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-04379,
  author       = {Qianbi Yu and
                  Dongnan Liu and
                  Chaoyi Zhang and
                  Xinwen Zhang and
                  Weidong Cai},
  title        = {Unsupervised Domain Adaptive Fundus Image Segmentation with Few Labeled
                  Source Data},
  journal      = {CoRR},
  volume       = {abs/2210.04379},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.04379},
  doi          = {10.48550/ARXIV.2210.04379},
  eprinttype    = {arXiv},
  eprint       = {2210.04379},
  timestamp    = {Wed, 12 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-04379.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceme/XingZ21,
  author       = {Wenxuan Xing and
                  Xinwen Zhang},
  title        = {Research on the Impact of Work Flexibility on Employee Happiness -
                  Based on the Perspective of Ecological Balance Theory},
  booktitle    = {{ICEME} 2021: The 12th International Conference on E-business, Management
                  and Economics, Beijing, China, July 17 - 19, 2021},
  pages        = {557--563},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3481127.3481231},
  doi          = {10.1145/3481127.3481231},
  timestamp    = {Mon, 06 Mar 2023 10:25:38 +0100},
  biburl       = {https://dblp.org/rec/conf/iceme/XingZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipec/WangZ21,
  author       = {Shifen Wang and
                  Xinwen Zhang},
  title        = {The Impact of Macroeconomic Uncertainty on China's Stock Market -
                  - Take the Shanghai Composite Index as an Example},
  booktitle    = {{IPEC} 2021: 2nd Asia-Pacific Conference on Image Processing, Electronics
                  and Computers, Dalian, China, April, 2021},
  pages        = {515--519},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3452446.3452573},
  doi          = {10.1145/3452446.3452573},
  timestamp    = {Fri, 23 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipec/WangZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/LuoZWZ19,
  author       = {Yong Luo and
                  Huaizheng Zhang and
                  Yonggang Wen and
                  Xinwen Zhang},
  editor       = {Wenwu Zhu and
                  Dacheng Tao and
                  Xueqi Cheng and
                  Peng Cui and
                  Elke A. Rundensteiner and
                  David Carmel and
                  Qi He and
                  Jeffrey Xu Yu},
  title        = {ResumeGAN: An Optimized Deep Representation Learning Framework for
                  Talent-Job Fit via Adversarial Learning},
  booktitle    = {Proceedings of the 28th {ACM} International Conference on Information
                  and Knowledge Management, {CIKM} 2019, Beijing, China, November 3-7,
                  2019},
  pages        = {1101--1110},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3357384.3357899},
  doi          = {10.1145/3357384.3357899},
  timestamp    = {Sun, 30 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/LuoZWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmlc2/ZhangJL19,
  author       = {Xinwen Zhang and
                  Chao Jia and
                  Weiguo Liu},
  title        = {Asymptotic Stability of Nonlinear Impulsive Stochastic Systems with
                  Markovian Switching},
  booktitle    = {Proceedings of the 2019 11th International Conference on Machine Learning
                  and Computing, {ICMLC} '19, Zhuhai, China, February 22-24, 2019},
  pages        = {114--118},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3318299.3318304},
  doi          = {10.1145/3318299.3318304},
  timestamp    = {Tue, 25 Aug 2020 13:26:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icmlc2/ZhangJL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuLWOZ18,
  author       = {Han Hu and
                  Yong Luo and
                  Yonggang Wen and
                  Yew{-}Soon Ong and
                  Xinwen Zhang},
  title        = {How to Find a Perfect Data Scientist: {A} Distance-Metric Learning
                  Approach},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {60380--60395},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2870535},
  doi          = {10.1109/ACCESS.2018.2870535},
  timestamp    = {Sun, 30 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HuLWOZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/ZhangWZ18,
  author       = {Weiwen Zhang and
                  Yonggang Wen and
                  Xinwen Zhang},
  title        = {Towards Virus Scanning as a Service in Mobile Cloud Computing: Energy-Efficient
                  Dispatching Policy Under N-Version Protection},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {6},
  number       = {1},
  pages        = {122--134},
  year         = {2018},
  url          = {https://doi.org/10.1109/TETC.2015.2471852},
  doi          = {10.1109/TETC.2015.2471852},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/ZhangWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/LuoZWWZ18,
  author       = {Yong Luo and
                  Huaizheng Zhang and
                  Yongjie Wang and
                  Yonggang Wen and
                  Xinwen Zhang},
  title        = {ResumeNet: {A} Learning-Based Framework for Automatic Resume Quality
                  Assessment},
  booktitle    = {{IEEE} International Conference on Data Mining, {ICDM} 2018, Singapore,
                  November 17-20, 2018},
  pages        = {307--316},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICDM.2018.00046},
  doi          = {10.1109/ICDM.2018.00046},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdm/LuoZWWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-02832,
  author       = {Yong Luo and
                  Huaizheng Zhang and
                  Yongjie Wang and
                  Yonggang Wen and
                  Xinwen Zhang},
  title        = {ResumeNet: {A} Learning-based Framework for Automatic Resume Quality
                  Assessment},
  journal      = {CoRR},
  volume       = {abs/1810.02832},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.02832},
  eprinttype    = {arXiv},
  eprint       = {1810.02832},
  timestamp    = {Sun, 30 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-02832.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiSZX17,
  author       = {Qi Li and
                  Ravi S. Sandhu and
                  Xinwen Zhang and
                  Mingwei Xu},
  title        = {Mandatory Content Access Control for Privacy Protection in Information
                  Centric Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {5},
  pages        = {494--506},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2494049},
  doi          = {10.1109/TDSC.2015.2494049},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiSZX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/GuLZSZF16,
  author       = {Yacong Gu and
                  Qi Li and
                  Hongtao Zhang and
                  Purui Su and
                  Xinwen Zhang and
                  Dengguo Feng},
  title        = {Direct Resource Hijacking in Android},
  journal      = {{IEEE} Internet Comput.},
  volume       = {20},
  number       = {5},
  pages        = {46--56},
  year         = {2016},
  url          = {https://doi.org/10.1109/MIC.2015.138},
  doi          = {10.1109/MIC.2015.138},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/GuLZSZF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apweb/LiZYS16,
  author       = {Huakang Li and
                  Xinwen Zhang and
                  Yitao Yang and
                  Guozi Sun},
  editor       = {Feifei Li and
                  Kyuseok Shim and
                  Kai Zheng and
                  Guanfeng Liu},
  title        = {A Demonstration of Encrypted Logistics Information System},
  booktitle    = {Web Technologies and Applications - 18th Asia-Pacific Web Conference,
                  APWeb 2016, Suzhou, China, September 23-25, 2016. Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9932},
  pages        = {525--528},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45817-5\_57},
  doi          = {10.1007/978-3-319-45817-5\_57},
  timestamp    = {Thu, 07 Nov 2019 15:14:45 +0100},
  biburl       = {https://dblp.org/rec/conf/apweb/LiZYS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLYSC16,
  author       = {Xinwen Zhang and
                  Huakang Li and
                  Yitao Yang and
                  Guozi Sun and
                  Guangxuan Chen},
  title        = {{LIPPS:} Logistics Information Privacy Protection System Based on
                  Encrypted {QR} Code},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {996--1000},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0167},
  doi          = {10.1109/TRUSTCOM.2016.0167},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangLYSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scientometrics/AnLYZ15,
  author       = {Lu An and
                  Xia Lin and
                  Chuanming Yu and
                  Xinwen Zhang},
  title        = {Measuring and visualizing the contributions of Chinese and American
                  {LIS} research institutions to emerging themes and salient themes},
  journal      = {Scientometrics},
  volume       = {105},
  number       = {3},
  pages        = {1605--1634},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11192-015-1640-4},
  doi          = {10.1007/S11192-015-1640-4},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scientometrics/AnLYZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiZZS15,
  author       = {Qi Li and
                  Xinwen Zhang and
                  Xin Zhang and
                  Purui Su},
  title        = {Invalidating Idealized {BGP} Security Proposals and Countermeasures},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {12},
  number       = {3},
  pages        = {298--311},
  year         = {2015},
  url          = {https://doi.org/10.1109/TDSC.2014.2345381},
  doi          = {10.1109/TDSC.2014.2345381},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiZZS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MohaisenMZXK15,
  author       = {Aziz Mohaisen and
                  Hesham Mekky and
                  Xinwen Zhang and
                  Haiyong Xie and
                  Yongdae Kim},
  title        = {Timing Attacks on Access Privacy in Information Centric Networks and
                  Countermeasures},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {12},
  number       = {6},
  pages        = {675--687},
  year         = {2015},
  url          = {https://doi.org/10.1109/TDSC.2014.2382592},
  doi          = {10.1109/TDSC.2014.2382592},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/MohaisenMZXK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZZSF15,
  author       = {Qi Li and
                  Xinwen Zhang and
                  Qingji Zheng and
                  Ravi S. Sandhu and
                  Xiaoming Fu},
  title        = {{LIVE:} Lightweight Integrity Verification and Content Access Control
                  for Named Data Networking},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {2},
  pages        = {308--320},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2365742},
  doi          = {10.1109/TIFS.2014.2365742},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiZZSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/XuZWS15,
  author       = {Lei Xu and
                  Xinwen Zhang and
                  Xiaoxin Wu and
                  Weidong Shi},
  editor       = {Jaehong Park and
                  Anna Cinzia Squicciarini},
  title        = {{ABSS:} An Attribute-based Sanitizable Signature for Integrity of
                  Outsourced Database with Public Cloud},
  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages        = {167--169},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699026.2699135},
  doi          = {10.1145/2699026.2699135},
  timestamp    = {Wed, 06 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/XuZWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ZhangZOCEJ15,
  author       = {Su Zhang and
                  Xinwen Zhang and
                  Xinming Ou and
                  Liqun Chen and
                  Nigel Edwards and
                  Jing Jin},
  editor       = {Meikang Qiu and
                  Shouhuai Xu and
                  Moti Yung and
                  Haibo Zhang},
  title        = {Assessing Attack Surface with Component-Based Package Dependency},
  booktitle    = {Network and System Security - 9th International Conference, {NSS}
                  2015, New York, NY, USA, November 3-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9408},
  pages        = {405--417},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25645-0\_29},
  doi          = {10.1007/978-3-319-25645-0\_29},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ZhangZOCEJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangERZNXZA15,
  author       = {Ruowen Wang and
                  William Enck and
                  Douglas S. Reeves and
                  Xinwen Zhang and
                  Peng Ning and
                  Dingbang Xu and
                  Wu Zhou and
                  Ahmed M. Azab},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {EASEAndroid: Automatic Policy Analysis and Refinement for Security
                  Enhanced Android via Large-Scale Semi-Supervised Learning},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {351--366},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wang-ruowen},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WangERZNXZA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taas/ChenLWZZ14,
  author       = {Songqing Chen and
                  Lei Liu and
                  Xinyuan Wang and
                  Xinwen Zhang and
                  Zhao Zhang},
  title        = {A Host-Based Approach for Unknown Fast-Spreading Worm Detection and
                  Containment},
  journal      = {{ACM} Trans. Auton. Adapt. Syst.},
  volume       = {8},
  number       = {4},
  pages        = {21:1--21:18},
  year         = {2014},
  url          = {https://doi.org/10.1145/2555615},
  doi          = {10.1145/2555615},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/taas/ChenLWZZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/ZhangSA14,
  author       = {Xinwen Zhang and
                  Jean{-}Pierre Seifert and
                  Onur Acii{\c{c}}mez},
  title        = {Design and Implementation of Efficient Integrity Protection for Open
                  Mobile Platforms},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {13},
  number       = {1},
  pages        = {188--201},
  year         = {2014},
  url          = {https://doi.org/10.1109/TMC.2012.232},
  doi          = {10.1109/TMC.2012.232},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/ZhangSA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhengZZZ14,
  author       = {Qingji Zheng and
                  Wei Zhu and
                  Jiafeng Zhu and
                  Xinwen Zhang},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {Improved anonymous proxy re-encryption with {CCA} security},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {249--258},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590322},
  doi          = {10.1145/2590296.2590322},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhengZZZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangZO14,
  author       = {Su Zhang and
                  Xinwen Zhang and
                  Xinming Ou},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {After we knew it: empirical study and modeling of cost-effectiveness
                  of exploiting prevalent known vulnerabilities across IaaS cloud},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {317--328},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590300},
  doi          = {10.1145/2590296.2590300},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangZO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HeZK13,
  author       = {Xingze He and
                  Xinwen Zhang and
                  C.{-}C. Jay Kuo},
  title        = {A Distortion-Based Approach to Privacy-Preserving Metering in Smart
                  Grids},
  journal      = {{IEEE} Access},
  volume       = {1},
  pages        = {67--78},
  year         = {2013},
  url          = {https://doi.org/10.1109/ACCESS.2013.2260815},
  doi          = {10.1109/ACCESS.2013.2260815},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HeZK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/JinCZZ13,
  author       = {Hai Jin and
                  Ge Cheng and
                  Deqing Zou and
                  Xinwen Zhang},
  title        = {Cherub: Fine-grained application protection with on-demand virtualization},
  journal      = {Comput. Math. Appl.},
  volume       = {65},
  number       = {9},
  pages        = {1326--1338},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.camwa.2012.02.001},
  doi          = {10.1016/J.CAMWA.2012.02.001},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cma/JinCZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AlamZNAAAA13,
  author       = {Masoom Alam and
                  Xinwen Zhang and
                  Mohammad Nauman and
                  Tamleek Ali and
                  Muhammad Ali and
                  Sajid Anwar and
                  Quratulain Alam},
  title        = {Behavioral Attestation for Web Services using access policies},
  journal      = {Multim. Tools Appl.},
  volume       = {66},
  number       = {2},
  pages        = {283--302},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11042-011-0770-9},
  doi          = {10.1007/S11042-011-0770-9},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/AlamZNAAAA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhouZJ13,
  author       = {Wu Zhou and
                  Xinwen Zhang and
                  Xuxian Jiang},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {AppInk: watermarking android apps for repackaging deterrence},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484315},
  doi          = {10.1145/2484313.2484315},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhouZJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MohaisenZSXK13,
  author       = {Abedelaziz Mohaisen and
                  Xinwen Zhang and
                  Max Schuchard and
                  Haiyong Xie and
                  Yongdae Kim},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Protecting access privacy of cached contents in information centric
                  networks},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {173--178},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484335},
  doi          = {10.1145/2484313.2484335},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MohaisenZSXK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudnet/RavindranLCZW13,
  author       = {Ravishankar Ravindran and
                  Xuan Liu and
                  Asit Chakraborti and
                  Xinwen Zhang and
                  Guoqiang Wang},
  editor       = {Xiaoming Fu and
                  Puneet Sharma and
                  Dijiang Huang and
                  Deep Medhi},
  title        = {Towards software defined {ICN} based edge-cloud services},
  booktitle    = {{IEEE} 2nd International Conference on Cloud Networking, CloudNet
                  2013, San Francisco, CA, USA, November 11-13, 2013},
  pages        = {227--235},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CloudNet.2013.6710583},
  doi          = {10.1109/CLOUDNET.2013.6710583},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudnet/RavindranLCZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XiongZZY13,
  author       = {Huijun Xiong and
                  Qingji Zheng and
                  Xinwen Zhang and
                  Danfeng Yao},
  title        = {CloudSafe: Securing data processing within vulnerable virtualization
                  environments in the cloud},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {172--180},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682705},
  doi          = {10.1109/CNS.2013.6682705},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/XiongZZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/RavindranBZCW13,
  author       = {Ravishankar Ravindran and
                  Trisha Biswas and
                  Xinwen Zhang and
                  Asit Chakraborti and
                  Guoqiang Wang},
  editor       = {Filip De Turck and
                  Yixin Diao and
                  Choong Seon Hong and
                  Deep Medhi and
                  Ramin Sadre},
  title        = {Information-centric networking based homenet},
  booktitle    = {2013 {IFIP/IEEE} International Symposium on Integrated Network Management
                  {(IM} 2013), Ghent, Belgium, May 27-31, 2013},
  pages        = {1102--1108},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/6573146/},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/RavindranBZCW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/WangLCSZZ13,
  author       = {Shangping Wang and
                  Lihua Liu and
                  Juanjuan Chen and
                  Jin Sun and
                  Xinwen Zhang and
                  Yaling Zhang},
  title        = {Lattice-Based Multi-party Concurrent Signatures Scheme},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {568--572},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.105},
  doi          = {10.1109/INCOS.2013.105},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/WangLCSZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/BiswasCRZW13,
  author       = {Trisha Biswas and
                  Asit Chakraborti and
                  Ravishankar Ravindran and
                  Xinwen Zhang and
                  Guoqiang Wang},
  editor       = {Dah Ming Chiu and
                  Jia Wang and
                  Paul Barford and
                  Srinivasan Seshan},
  title        = {Contextualized information-centric home network},
  booktitle    = {{ACM} {SIGCOMM} 2013 Conference, {SIGCOMM} 2013, Hong Kong, August
                  12-16, 2013},
  pages        = {461--462},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2486001.2491691},
  doi          = {10.1145/2486001.2491691},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/BiswasCRZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/WuZASX13,
  author       = {Ruoyu Wu and
                  Xinwen Zhang and
                  Gail{-}Joon Ahn and
                  Hadi Sharifi and
                  Haiyong Xie},
  title        = {ACaaS: Access Control as a Service for IaaS Cloud},
  booktitle    = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom
                  2013, Washington, DC, USA, 8-14 September, 2013},
  pages        = {423--428},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SocialCom.2013.66},
  doi          = {10.1109/SOCIALCOM.2013.66},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/WuZASX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/displays/ZhangWJWWH12,
  author       = {Xinwen Zhang and
                  Zhaoxin Wu and
                  Bo Jiao and
                  Dongdong Wang and
                  Dawei Wang and
                  Xun Hou},
  title        = {White organic light-emitting devices with a solution-processed small
                  molecular emission layer},
  journal      = {Displays},
  volume       = {33},
  number       = {3},
  pages        = {129--132},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.displa.2012.03.004},
  doi          = {10.1016/J.DISPLA.2012.03.004},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/displays/ZhangWJWWH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/BanuriAKMAKYTAAZ12,
  author       = {Hammad Banuri and
                  Masoom Alam and
                  Shahryar Khan and
                  Jawad Manzoor and
                  Bahar Ali and
                  Yasar Khan and
                  Mohsin Yaseen and
                  Mir Nauman Tahir and
                  Tamleek Ali and
                  Quratulain Alam and
                  Xinwen Zhang},
  title        = {An Android runtime security policy enforcement framework},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {16},
  number       = {6},
  pages        = {631--641},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00779-011-0437-6},
  doi          = {10.1007/S00779-011-0437-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/BanuriAKMAKYTAAZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuZHAS12,
  author       = {Wenjuan Xu and
                  Xinwen Zhang and
                  Hongxin Hu and
                  Gail{-}Joon Ahn and
                  Jean{-}Pierre Seifert},
  title        = {Remote Attestation with Domain-Based Integrity Model and Policy Analysis},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {3},
  pages        = {429--442},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2011.61},
  doi          = {10.1109/TDSC.2011.61},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuZHAS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiXWZLX12,
  author       = {Qi Li and
                  Mingwei Xu and
                  Jianping Wu and
                  Xinwen Zhang and
                  Patrick P. C. Lee and
                  Ke Xu},
  title        = {Enhancing the Trust of Internet Routing With Lightweight Route Attestation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {2},
  pages        = {691--703},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2011.2177822},
  doi          = {10.1109/TIFS.2011.2177822},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiXWZLX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/RavindranWZC12,
  author       = {Ravishankar Ravindran and
                  Guoqiang Wang and
                  Xinwen Zhang and
                  Asit Chakraborti},
  title        = {Supporting dual-mode forwarding in content-centric network},
  booktitle    = {{IEEE} International Conference on Advanced Networks and Telecommuncations
                  Systems, {ANTS} 2012, Bangalore, India, 16-19 December, 2012},
  pages        = {55--60},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ANTS.2012.6524228},
  doi          = {10.1109/ANTS.2012.6524228},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEants/RavindranWZC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuWZ12,
  author       = {Lei Xu and
                  Xiaoxin Wu and
                  Xinwen Zhang},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {{CL-PRE:} a certificateless proxy re-encryption scheme for secure
                  data sharing with public cloud},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {87--88},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414507},
  doi          = {10.1145/2414456.2414507},
  timestamp    = {Wed, 06 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/XuWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MohaisenZSXK12,
  author       = {Abedelaziz Mohaisen and
                  Xinwen Zhang and
                  Max Schuchard and
                  Haiyong Xie and
                  Yongdae Kim},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Protecting access privacy of cached contents in information centric
                  networks},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1001--1003},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382305},
  doi          = {10.1145/2382196.2382305},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MohaisenZSXK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangD12,
  author       = {Xinwen Zhang and
                  Xuhua Ding},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {{STC} 2012: the seventh {ACM} workshop on scalable trusted computing},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1058--1059},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382328},
  doi          = {10.1145/2382196.2382328},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/ShiLSWZ12,
  author       = {Weidong Shi and
                  Jong{-}Hyuk Lee and
                  Taeweon Suh and
                  Dong Hyuk Woo and
                  Xinwen Zhang},
  editor       = {John Feo and
                  Paolo Faraboschi and
                  Oreste Villa},
  title        = {Architectural support of multiple hypervisors over single platform
                  for enhancing cloud computing security},
  booktitle    = {Proceedings of the Computing Frontiers Conference, CF'12, Caligari,
                  Italy - May 15 - 17, 2012},
  pages        = {75--84},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2212908.2212920},
  doi          = {10.1145/2212908.2212920},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cf/ShiLSWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/XiongZYWW12,
  author       = {Huijun Xiong and
                  Xinwen Zhang and
                  Danfeng Yao and
                  Xiaoxin Wu and
                  Yonggang Wen},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Towards end-to-end secure content storage and delivery with public
                  cloud},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {257--266},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133633},
  doi          = {10.1145/2133601.2133633},
  timestamp    = {Wed, 06 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/XiongZYWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/RavindranLZW12,
  author       = {Ravishankar Ravindran and
                  Samantha Lo and
                  Xinwen Zhang and
                  Guoqiang Wang},
  title        = {Supporting seamless mobility in named data networking},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  pages        = {5854--5869},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICC.2012.6364701},
  doi          = {10.1109/ICC.2012.6364701},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/RavindranLZW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/KostaAHMZ12,
  author       = {Sokol Kosta and
                  Andrius Aucinas and
                  Pan Hui and
                  Richard Mortier and
                  Xinwen Zhang},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {ThinkAir: Dynamic resource allocation and parallel execution in the
                  cloud for mobile code offloading},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {945--953},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195845},
  doi          = {10.1109/INFCOM.2012.6195845},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/KostaAHMZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiuZYC12,
  author       = {Lei Liu and
                  Xinwen Zhang and
                  Guanhua Yan and
                  Songqing Chen},
  title        = {Chrome Extensions: Threat Analysis and Countermeasures},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/chrome-extensions-threat-analysis-and-countermeasures},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/LiuZYC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/petra/ZhuZZLL12,
  author       = {Jiafeng Zhu and
                  Jingji Zheng and
                  Xinwen Zhang and
                  Zhengyi Le and
                  Min Luo},
  editor       = {Fillia Makedon},
  title        = {On-demand security service},
  booktitle    = {The 5th International Conference on PErvasive Technologies Related
                  to Assistive Environments, {PETRA} 2012, Heraklion, Crete, Greece,
                  June 6-9, 2012},
  pages        = {7},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2413097.2413106},
  doi          = {10.1145/2413097.2413106},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/petra/ZhuZZLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QinHZ12a,
  author       = {Yang Qin and
                  Dijiang Huang and
                  Xinwen Zhang},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {1438--1445},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.16},
  doi          = {10.1109/TRUSTCOM.2012.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/QinHZ12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2012,
  editor       = {Stefan Katzenbeisser and
                  Edgar R. Weippl and
                  L. Jean Camp and
                  Melanie Volkamer and
                  Mike K. Reiter and
                  Xinwen Zhang},
  title        = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
                  2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7344},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30921-2},
  doi          = {10.1007/978-3-642-30921-2},
  isbn         = {978-3-642-30920-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1206-3717,
  author       = {Qingji Zheng and
                  Xinwen Zhang},
  title        = {Multiparty Cloud Computation},
  journal      = {CoRR},
  volume       = {abs/1206.3717},
  year         = {2012},
  url          = {http://arxiv.org/abs/1206.3717},
  eprinttype    = {arXiv},
  eprint       = {1206.3717},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1206-3717.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JinAHCZ11,
  author       = {Jing Jin and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Michael J. Covington and
                  Xinwen Zhang},
  title        = {Patient-centric authorization framework for electronic healthcare
                  services},
  journal      = {Comput. Secur.},
  volume       = {30},
  number       = {2-3},
  pages        = {116--127},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cose.2010.09.001},
  doi          = {10.1016/J.COSE.2010.09.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JinAHCZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/ZhangKJG11,
  author       = {Xinwen Zhang and
                  Anugeetha Kunjithapatham and
                  Sangoh Jeong and
                  Simon Gibbs},
  title        = {Towards an Elastic Application Model for Augmenting the Computing
                  Capabilities of Mobile Devices with Cloud Computing},
  journal      = {Mob. Networks Appl.},
  volume       = {16},
  number       = {3},
  pages        = {270--284},
  year         = {2011},
  url          = {https://doi.org/10.1007/s11036-011-0305-7},
  doi          = {10.1007/S11036-011-0305-7},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/ZhangKJG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/XuWZ11,
  author       = {Min Xu and
                  Duminda Wijesekera and
                  Xinwen Zhang},
  title        = {Runtime Administration of an {RBAC} Profile for {XACML}},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {4},
  number       = {4},
  pages        = {286--299},
  year         = {2011},
  url          = {https://doi.org/10.1109/TSC.2010.27},
  doi          = {10.1109/TSC.2010.27},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/XuWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/RavindranWZ11,
  author       = {Ravishankar Ravindran and
                  Guoqiang Wang and
                  Xinwen Zhang},
  title        = {Towards Secure Mobile Virtual Group in information-centric network},
  booktitle    = {Fifth {IEEE} International Conference on Advanced Telecommunication
                  Systems and Networks, {ANTS} 2011, December 18-21, 2011 Bengaluru,
                  India},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ANTS.2011.6163663},
  doi          = {10.1109/ANTS.2011.6163663},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEants/RavindranWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiXWZLX11,
  author       = {Qi Li and
                  Mingwei Xu and
                  Jianping Wu and
                  Xinwen Zhang and
                  Patrick P. C. Lee and
                  Ke Xu},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {Enhancing the trust of internet routing with lightweight route attestation},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {92--101},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966927},
  doi          = {10.1145/1966913.1966927},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiXWZLX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WuXZ11,
  author       = {Xiaoxin Wu and
                  Lei Xu and
                  Xinwen Zhang},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: a certificateless proxy re-encryption scheme for cloud-based
                  data sharing},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {869--872},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093514},
  timestamp    = {Wed, 06 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WuXZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/ZhangCXWSW11,
  author       = {Xinwen Zhang and
                  Katharine Chang and
                  Huijun Xiong and
                  Yonggang Wen and
                  Guangyu Shi and
                  Guoqiang Wang},
  title        = {Towards name-based trust and security for content-centric network},
  booktitle    = {Proceedings of the 19th annual {IEEE} International Conference on
                  Network Protocols, {ICNP} 2011, Vancouver, BC, Canada, October 17-20,
                  2011},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICNP.2011.6089053},
  doi          = {10.1109/ICNP.2011.6089053},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/ZhangCXWSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/AlamZKA11,
  author       = {Masoom Alam and
                  Xinwen Zhang and
                  Kamran Khan and
                  Gohar Ali},
  editor       = {Ruth Breu and
                  Jason Crampton and
                  Jorge Lobo},
  title        = {xDAuth: a scalable and lightweight framework for cross domain access
                  control and delegation},
  booktitle    = {16th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2011, Innsbruck, Austria, June 15-17, 2011, Proceedings},
  pages        = {31--40},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1998441.1998447},
  doi          = {10.1145/1998441.1998447},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/AlamZKA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/XiongZZY11,
  author       = {Huijun Xiong and
                  Xinwen Zhang and
                  Wei Zhu and
                  Danfeng Yao},
  editor       = {Muttukrishnan Rajarajan and
                  Fred Piper and
                  Haining Wang and
                  George Kesidis},
  title        = {CloudSeal: End-to-End Content Protection in Cloud-Based Storage and
                  Delivery Services},
  booktitle    = {Security and Privacy in Communication Networks - 7th International
                  {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {96},
  pages        = {491--500},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31909-9\_30},
  doi          = {10.1007/978-3-642-31909-9\_30},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/XiongZZY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/ChangZWS11,
  author       = {Katharine Chang and
                  Xinwen Zhang and
                  Guoqiang Wang and
                  Kang G. Shin},
  title        = {{TGIS:} Booting Trust for Secure Information Sharing in Dynamic Group
                  Collaborations},
  booktitle    = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT),
                  2011 {IEEE} Third International Conference on and 2011 {IEEE} Third
                  International Conference on Social Computing (SocialCom), Boston,
                  MA, USA, 9-11 Oct., 2011},
  pages        = {1020--1025},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PASSAT/SocialCom.2011.201},
  doi          = {10.1109/PASSAT/SOCIALCOM.2011.201},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/ChangZWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/LiuZC11,
  author       = {Lei Liu and
                  Xinwen Zhang and
                  Songqing Chen},
  title        = {Botnet with Browser Extensions},
  booktitle    = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT),
                  2011 {IEEE} Third International Conference on and 2011 {IEEE} Third
                  International Conference on Social Computing (SocialCom), Boston,
                  MA, USA, 9-11 Oct., 2011},
  pages        = {1089--1094},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PASSAT/SocialCom.2011.25},
  doi          = {10.1109/PASSAT/SOCIALCOM.2011.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/LiuZC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ZhouZJF11,
  author       = {Yajin Zhou and
                  Xinwen Zhang and
                  Xuxian Jiang and
                  Vincent W. Freeh},
  editor       = {Jonathan M. McCune and
                  Boris Balacheff and
                  Adrian Perrig and
                  Ahmad{-}Reza Sadeghi and
                  M. Angela Sasse and
                  Yolanta Beres},
  title        = {Taming Information-Stealing Smartphone Applications (on Android)},
  booktitle    = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
                  2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6740},
  pages        = {93--107},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21599-5\_7},
  doi          = {10.1007/978-3-642-21599-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/ZhouZJF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011stc,
  editor       = {Yan Chen and
                  Shouhuai Xu and
                  Ahmad{-}Reza Sadeghi and
                  Xinwen Zhang},
  title        = {Proceedings of the sixth {ACM} workshop on Scalable trusted computing,
                  STC@CCS 2011, Chicago, Illinois, USA, October 17, 2011},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046582},
  doi          = {10.1145/2046582},
  isbn         = {978-1-4503-1001-7},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2011stc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1105-3232,
  author       = {Sokol Kosta and
                  Andrius Aucinas and
                  Pan Hui and
                  Richard Mortier and
                  Xinwen Zhang},
  title        = {Unleashing the Power of Mobile Cloud Computing using ThinkAir},
  journal      = {CoRR},
  volume       = {abs/1105.3232},
  year         = {2011},
  url          = {http://arxiv.org/abs/1105.3232},
  eprinttype    = {arXiv},
  eprint       = {1105.3232},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1105-3232.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ChengJZZ10,
  author       = {Ge Cheng and
                  Hai Jin and
                  Deqing Zou and
                  Xinwen Zhang},
  title        = {Building dynamic and transparent integrity measurement and protection
                  for virtualized platform in cloud computing},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {22},
  number       = {13},
  pages        = {1893--1910},
  year         = {2010},
  url          = {https://doi.org/10.1002/cpe.1614},
  doi          = {10.1002/CPE.1614},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/ChengJZZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jwsr/AlamNZAH10,
  author       = {Masoom Alam and
                  Mohammad Nauman and
                  Xinwen Zhang and
                  Tamleek Ali and
                  Patrick C. K. Hung},
  title        = {Behavioral Attestation for Web Services Based Business Processes},
  journal      = {Int. J. Web Serv. Res.},
  volume       = {7},
  number       = {3},
  pages        = {52--72},
  year         = {2010},
  url          = {https://doi.org/10.4018/jwsr.2010070103},
  doi          = {10.4018/JWSR.2010070103},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jwsr/AlamNZAH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NaumanKZ10,
  author       = {Mohammad Nauman and
                  Sohail Khan and
                  Xinwen Zhang},
  editor       = {Dengguo Feng and
                  David A. Basin and
                  Peng Liu},
  title        = {Apex: extending Android permission model and enforcement with user-defined
                  runtime constraints},
  booktitle    = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
                  2010},
  pages        = {328--332},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755688.1755732},
  doi          = {10.1145/1755688.1755732},
  timestamp    = {Fri, 03 Jun 2022 12:02:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/NaumanKZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/XuAHZS10,
  author       = {Wenjuan Xu and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Xinwen Zhang and
                  Jean{-}Pierre Seifert},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {DR@FT: Efficient Remote Attestation Framework for Dynamic Systems},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {182--198},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_12},
  doi          = {10.1007/978-3-642-15497-3\_12},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/XuAHZS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhangSA10,
  author       = {Xinwen Zhang and
                  Jean{-}Pierre Seifert and
                  Onur Acii{\c{c}}mez},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {{SEIP:} Simple and Efficient Integrity Protection for Open Mobile
                  Platforms},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {107--125},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_9},
  doi          = {10.1007/978-3-642-17650-0\_9},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ZhangSA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/AliNZ10,
  author       = {Tamleek Ali and
                  Mohammad Nauman and
                  Xinwen Zhang},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {On Leveraging Stochastic Models for Remote Attestation},
  booktitle    = {Trusted Systems - Second International Conference, {INTRUST} 2010,
                  Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6802},
  pages        = {290--301},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25283-9\_19},
  doi          = {10.1007/978-3-642-25283-9\_19},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/AliNZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicase/ZhangJGK10,
  author       = {Xinwen Zhang and
                  Won Jong Jeon and
                  Simon Gibbs and
                  Anugeetha Kunjithapatham},
  editor       = {Martin L. Griss and
                  Guang Yang},
  title        = {Elastic {HTML5:} Workload Offloading Using Cloud-Based Web Workers
                  and Storages for Mobile Devices},
  booktitle    = {Mobile Computing, Applications, and Services - Second International
                  {ICST} Conference, MobiCASE 2010, Santa Clara, CA, USA, October 25-28,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {76},
  pages        = {373--381},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-29336-8\_26},
  doi          = {10.1007/978-3-642-29336-8\_26},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicase/ZhangJGK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobilware/ZhangJKG10,
  author       = {Xinwen Zhang and
                  Sangoh Jeong and
                  Anugeetha Kunjithapatham and
                  Simon Gibbs},
  editor       = {Ying Cai and
                  Thomas Magedanz and
                  Minglu Li and
                  Jinchun Xia and
                  Carlo Giannelli},
  title        = {Towards an Elastic Application Model for Augmenting Computing Capabilities
                  of Mobile Platforms},
  booktitle    = {Mobile Wireless Middleware, Operating Systems, and Applications -
                  Third International Conference, Mobilware 2010, Chicago, IL, USA,
                  June 30 - July 2, 2010. Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {48},
  pages        = {161--174},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17758-3\_12},
  doi          = {10.1007/978-3-642-17758-3\_12},
  timestamp    = {Fri, 27 Oct 2017 16:28:24 +0200},
  biburl       = {https://dblp.org/rec/conf/mobilware/ZhangJKG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/SchiffmanZG10,
  author       = {Joshua Schiffman and
                  Xinwen Zhang and
                  Simon Gibbs},
  title        = {DAuth: Fine-Grained Authorization Delegation for Distributed Web Application
                  Consumers},
  booktitle    = {{POLICY} 2010, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, Fairfax, VA, USA, 21-23 July 2010},
  pages        = {95--102},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/POLICY.2010.12},
  doi          = {10.1109/POLICY.2010.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/SchiffmanZG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/AlamZNKA10,
  author       = {Masoom Alam and
                  Xinwen Zhang and
                  Mohammad Nauman and
                  Sohail Khan and
                  Quratulain Alam},
  title        = {MAuth: {A} Fine-Grained and User-centric Permission Delegation Framework
                  for Multi-mashup Web Services},
  booktitle    = {6th World Congress on Services, {SERVICES} 2010, Miami, Florida, USA,
                  July 5-10, 2010},
  pages        = {56--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SERVICES.2010.112},
  doi          = {10.1109/SERVICES.2010.112},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/AlamZNKA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sose/HuangZKL10,
  author       = {Dijiang Huang and
                  Xinwen Zhang and
                  Myong H. Kang and
                  Jim Luo},
  title        = {MobiCloud: Building Secure Cloud Framework for Mobile Computing and
                  Communication},
  booktitle    = {The Fifth {IEEE} International Symposium on Service-Oriented System
                  Engineering, {SOSE} 2010, June 4-5, 2010, Nanjing, China},
  pages        = {27--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SOSE.2010.20},
  doi          = {10.1109/SOSE.2010.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sose/HuangZKL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/XiangJZZWZ10,
  author       = {Guofu Xiang and
                  Hai Jin and
                  Deqing Zou and
                  Xinwen Zhang and
                  Sha Wen and
                  Feng Zhao},
  title        = {VMDriver: {A} Driver-Based Monitoring Mechanism for Virtualization},
  booktitle    = {29th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2010),
                  New Delhi, Punjab, India, October 31 - November 3, 2010},
  pages        = {72--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SRDS.2010.38},
  doi          = {10.1109/SRDS.2010.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/XiangJZZWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/NaumanKZS10,
  author       = {Mohammad Nauman and
                  Sohail Khan and
                  Xinwen Zhang and
                  Jean{-}Pierre Seifert},
  editor       = {Alessandro Acquisti and
                  Sean W. Smith and
                  Ahmad{-}Reza Sadeghi},
  title        = {Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation
                  for the Android Platform},
  booktitle    = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
                  2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6101},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13869-0\_1},
  doi          = {10.1007/978-3-642-13869-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/NaumanKZS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/XieZSZ10,
  author       = {Liang Xie and
                  Xinwen Zhang and
                  Jean{-}Pierre Seifert and
                  Sencun Zhu},
  editor       = {Susanne Wetzel and
                  Cristina Nita{-}Rotaru and
                  Frank Stajano},
  title        = {pBMDS: a behavior-based malware detection system for cellphone devices},
  booktitle    = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
                  {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages        = {37--48},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1741866.1741874},
  doi          = {10.1145/1741866.1741874},
  timestamp    = {Sun, 19 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/XieZSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiZXW09,
  author       = {Qi Li and
                  Xinwen Zhang and
                  Mingwei Xu and
                  Jianping Wu},
  title        = {Towards secure dynamic collaborations with group-based {RBAC} model},
  journal      = {Comput. Secur.},
  volume       = {28},
  number       = {5},
  pages        = {260--275},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.cose.2008.12.004},
  doi          = {10.1016/J.COSE.2008.12.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiZXW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ancs/LiuZYC09,
  author       = {Lei Liu and
                  Xinwen Zhang and
                  Guanhua Yan and
                  Songqing Chen},
  editor       = {Peter Z. Onufryk and
                  K. K. Ramakrishnan and
                  Patrick Crowley and
                  John Wroclawski},
  title        = {Exploitation and threat analysis of open mobile devices},
  booktitle    = {Proceedings of the 2009 {ACM/IEEE} Symposium on Architecture for Networking
                  and Communications Systems, {ANCS} 2009, Princeton, New Jersey, USA,
                  October 19-20, 2009},
  pages        = {20--29},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1882486.1882493},
  doi          = {10.1145/1882486.1882493},
  timestamp    = {Fri, 01 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ancs/LiuZYC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/AciicmezSZ10,
  author       = {Onur Acii{\c{c}}mez and
                  Jean{-}Pierre Seifert and
                  Xinwen Zhang},
  title        = {A Secure {DVB} Set-Top Box via Trusting Computing Technologies},
  booktitle    = {6th {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2009, Las Vegas, NV, USA, 10-13 Jan., 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CCNC.2009.4784777},
  doi          = {10.1109/CCNC.2009.4784777},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/AciicmezSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangSGKJ09,
  author       = {Xinwen Zhang and
                  Joshua Schiffman and
                  Simon Gibbs and
                  Anugeetha Kunjithapatham and
                  Sangoh Jeong},
  editor       = {Radu Sion and
                  Dawn Song},
  title        = {Securing elastic applications on mobile devices for cloud computing},
  booktitle    = {Proceedings of the first {ACM} Cloud Computing Security Workshop,
                  {CCSW} 2009, Chicago, IL, USA, November 13, 2009},
  pages        = {127--134},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655008.1655026},
  doi          = {10.1145/1655008.1655026},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangSGKJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/KattHZ09,
  author       = {Basel Katt and
                  Michael Hafner and
                  Xinwen Zhang},
  editor       = {James B. D. Joshi and
                  Tao Zhang},
  title        = {Building a stateful reference monitor with coloured petri nets},
  booktitle    = {The 5th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2009, Washington DC,
                  USA, November 11-14, 2009},
  pages        = {1--10},
  publisher    = {{ICST} / {IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.4108/ICST.COLLABORATECOM2009.8375},
  doi          = {10.4108/ICST.COLLABORATECOM2009.8375},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/KattHZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/KattHZ09a,
  author       = {Basel Katt and
                  Michael Hafner and
                  Xinwen Zhang},
  editor       = {James B. D. Joshi and
                  Tao Zhang},
  title        = {A usage control policy specification with Petri nets},
  booktitle    = {The 5th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2009, Washington DC,
                  USA, November 11-14, 2009},
  pages        = {1--8},
  publisher    = {{ICST} / {IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.4108/ICST.COLLABORATECOM2009.8394},
  doi          = {10.4108/ICST.COLLABORATECOM2009.8394},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/KattHZ09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/XuZA09,
  author       = {Wenjuan Xu and
                  Xinwen Zhang and
                  Gail{-}Joon Ahn},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Towards System Integrity Protection with Graph-Based Policy Analysis},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {65--80},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_5},
  doi          = {10.1007/978-3-642-03007-9\_5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/XuZA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/grid/ChengJZZLYX09,
  author       = {Ge Cheng and
                  Hai Jin and
                  Deqing Zou and
                  Xinwen Zhang and
                  Min Li and
                  Chen Yu and
                  Guofu Xiang},
  title        = {Building dynamic integrity protection for multiple independent authorities
                  in virtualization-based infrastructure},
  booktitle    = {Proceedings of the 2009 10th {IEEE/ACM} International Conference on
                  Grid Computing, October 13-15, 2009, Banff, Alberta, Canada},
  pages        = {113--119},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/GRID.2009.5353079},
  doi          = {10.1109/GRID.2009.5353079},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/grid/ChengJZZLYX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/AlamNZAH09,
  author       = {Masoom Alam and
                  Mohammad Nauman and
                  Xinwen Zhang and
                  Tamleek Ali and
                  Patrick C. K. Hung},
  title        = {Behavioral Attestation for Business Processes},
  booktitle    = {{IEEE} International Conference on Web Services, {ICWS} 2009, Los
                  Angeles, CA, USA, 6-10 July 2009},
  pages        = {343--350},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICWS.2009.139},
  doi          = {10.1109/ICWS.2009.139},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/AlamNZAH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec/ZhangAS09,
  author       = {Xinwen Zhang and
                  Onur Acii{\c{c}}mez and
                  Jean{-}Pierre Seifert},
  editor       = {Andreas U. Schmidt and
                  Shiguo Lian},
  title        = {Building Efficient Integrity Measurement and Attestation for Mobile
                  Phone Platforms},
  booktitle    = {Security and Privacy in Mobile Information and Communication Systems,
                  First International {ICST} Conference, MobiSec 2009, Turin, Italy,
                  June 3-5, 2009, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {17},
  pages        = {71--82},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04434-2\_7},
  doi          = {10.1007/978-3-642-04434-2\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisec/ZhangAS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/KattZH09,
  author       = {Basel Katt and
                  Xinwen Zhang and
                  Michael Hafner},
  editor       = {Robert Meersman and
                  Tharam S. Dillon and
                  Pilar Herrero},
  title        = {Towards a Usage Control Policy Specification with Petri Nets},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2009, Confederated
                  International Conferences, CoopIS, DOA, IS, and {ODBASE} 2009, Vilamoura,
                  Portugal, November 1-6, 2009, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5871},
  pages        = {905--912},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05151-7\_11},
  doi          = {10.1007/978-3-642-05151-7\_11},
  timestamp    = {Thu, 14 Oct 2021 10:28:26 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/KattZH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/XuWZC09,
  author       = {Min Xu and
                  Duminda Wijesekera and
                  Xinwen Zhang and
                  Deshan Cooray},
  title        = {Towards Session-Aware {RBAC} Administration and Enforcement with {XACML}},
  booktitle    = {{POLICY} 2009, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, London, UK, 20-22 July 2009},
  pages        = {9--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/POLICY.2009.27},
  doi          = {10.1109/POLICY.2009.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/XuWZC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LiuYZC09,
  author       = {Lei Liu and
                  Guanhua Yan and
                  Xinwen Zhang and
                  Songqing Chen},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {VirusMeter: Preventing Your Cellphone from Spies},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {244--264},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_13},
  doi          = {10.1007/978-3-642-04342-0\_13},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LiuYZC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/JinAHCZ09,
  author       = {Jing Jin and
                  Gail{-}Joon Ahn and
                  Hongxin Hu and
                  Michael J. Covington and
                  Xinwen Zhang},
  editor       = {Barbara Carminati and
                  James Joshi},
  title        = {Patient-centric authorization framework for sharing electronic health
                  records},
  booktitle    = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2009, Stresa, Italy, June 3-5, 2009, Proceedings},
  pages        = {125--134},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1542207.1542228},
  doi          = {10.1145/1542207.1542228},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/JinAHCZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/XieZCJZ09,
  author       = {Liang Xie and
                  Xinwen Zhang and
                  Ashwin Chaugule and
                  Trent Jaeger and
                  Sencun Zhu},
  title        = {Designing System-Level Defenses against Cellphone Malware},
  booktitle    = {28th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2009),
                  Niagara Falls, New York, USA, September 27-30, 2009},
  pages        = {83--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SRDS.2009.21},
  doi          = {10.1109/SRDS.2009.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/XieZCJZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/NaumanAZA09,
  author       = {Mohammad Nauman and
                  Masoom Alam and
                  Xinwen Zhang and
                  Tamleek Ali},
  editor       = {Liqun Chen and
                  Chris J. Mitchell and
                  Andrew P. Martin},
  title        = {Remote Attestation of Attribute Updates and Information Flows in a
                  {UCON} System},
  booktitle    = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
                  UK, April 6-8, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5471},
  pages        = {63--80},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00587-9\_5},
  doi          = {10.1007/978-3-642-00587-9\_5},
  timestamp    = {Sat, 28 Aug 2021 16:06:55 +0200},
  biburl       = {https://dblp.org/rec/conf/trust/NaumanAZA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhangNCS08,
  author       = {Xinwen Zhang and
                  Masayuki Nakae and
                  Michael J. Covington and
                  Ravi S. Sandhu},
  title        = {Toward a Usage-Based Security Framework for Collaborative Computing
                  Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {3:1--3:36},
  year         = {2008},
  url          = {https://doi.org/10.1145/1330295.1330298},
  doi          = {10.1145/1330295.1330298},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhangNCS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/AciicmezLSZ08,
  author       = {Onur Acii{\c{c}}mez and
                  Afshin Latifi and
                  Jean{-}Pierre Seifert and
                  Xinwen Zhang},
  title        = {A Trusted Mobile Phone Prototype},
  booktitle    = {5th {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2008, Las Vegas, NV, USA, January 10-12, 2008},
  pages        = {1208--1209},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ccnc08.2007.270},
  doi          = {10.1109/CCNC08.2007.270},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/AciicmezLSZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlamSLZ08,
  author       = {Masoom Alam and
                  Jean{-}Pierre Seifert and
                  Qi Li and
                  Xinwen Zhang},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {Usage control platformization via trustworthy SELinux},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {245--248},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368345},
  doi          = {10.1145/1368310.1368345},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AlamSLZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/JinACZ08,
  author       = {Jing Jin and
                  Gail{-}Joon Ahn and
                  Michael J. Covington and
                  Xinwen Zhang},
  editor       = {Elisa Bertino and
                  James B. D. Joshi},
  title        = {Access Control Model for Sharing Composite Electronic Health Records},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing,
                  4th International Conference, CollaborateCom 2008, Orlando, FL, USA,
                  November 13-16, 2008, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {10},
  pages        = {340--354},
  publisher    = {Springer / {ICST}},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-03354-4\_25},
  doi          = {10.1007/978-3-642-03354-4\_25},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/JinACZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/LiXZ08a,
  author       = {Qi Li and
                  Mingwei Xu and
                  Xinwen Zhang},
  title        = {Towards a Group-Based {RBAC} Model and Decentralized User-Role Administration},
  booktitle    = {28th {IEEE} International Conference on Distributed Computing Systems
                  Workshops {(ICDCS} 2008 Workshops), 17-20 June 2008, Beijing, China},
  pages        = {441--446},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICDCS.Workshops.2008.26},
  doi          = {10.1109/ICDCS.WORKSHOPS.2008.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/LiXZ08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/LiXZ08,
  author       = {Qi Li and
                  Mingwei Xu and
                  Xinwen Zhang},
  title        = {Access control in Group Communication Systems},
  booktitle    = {Proceedings of the 13th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2008), July 6-9, Marrakech, Morocco},
  pages        = {380--385},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISCC.2008.4625718},
  doi          = {10.1109/ISCC.2008.4625718},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/LiXZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/AhnXZ08,
  author       = {Gail{-}Joon Ahn and
                  Wenjuan Xu and
                  Xinwen Zhang},
  title        = {Systematic Policy Analysis for High-Assurance Services in SELinux},
  booktitle    = {9th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2008), 2-4 June 2008, Palisades, New York,
                  {USA}},
  pages        = {3--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/POLICY.2008.18},
  doi          = {10.1109/POLICY.2008.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/AhnXZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/KattZBHS08,
  author       = {Basel Katt and
                  Xinwen Zhang and
                  Ruth Breu and
                  Michael Hafner and
                  Jean{-}Pierre Seifert},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {A general obligation model and continuity: enhanced policy enforcement
                  engine for usage control},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {123--132},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377856},
  doi          = {10.1145/1377836.1377856},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/KattZBHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/AlamZNAS08,
  author       = {Masoom Alam and
                  Xinwen Zhang and
                  Mohammad Nauman and
                  Tamleek Ali and
                  Jean{-}Pierre Seifert},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Model-based behavioral attestation},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {175--184},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377864},
  doi          = {10.1145/1377836.1377864},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/AlamZNAS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sutc/ZhangSS08,
  author       = {Xinwen Zhang and
                  Jean{-}Pierre Seifert and
                  Ravi S. Sandhu},
  editor       = {Mukesh Singhal and
                  Giovanna Di Marzo Serugendo and
                  Jeffrey J. P. Tsai and
                  Wang{-}Chien Lee and
                  Kay R{\"{o}}mer and
                  Yu{-}Chee Tseng and
                  Han C. W. Hsiao},
  title        = {Security Enforcement Model for Distributed Usage Control},
  booktitle    = {{IEEE} International Conference on Sensor Networks, Ubiquitous, and
                  Trustworthy Computing {(SUTC} 2008), 11-13 June 2008, Taichung, Taiwan},
  pages        = {10--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SUTC.2008.79},
  doi          = {10.1109/SUTC.2008.79},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sutc/ZhangSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/AlamZNA08,
  author       = {Masoom Alam and
                  Xinwen Zhang and
                  Mohammad Nauman and
                  Tamleek Ali},
  editor       = {Ernesto Damiani and
                  Seth Proctor},
  title        = {Behavioral attestation for web services {(BA4WS)}},
  booktitle    = {Proceedings of the 5th {ACM} Workshop On Secure Web Services, {SWS}
                  2008, Alexandria, VA, USA, October 31, 2008},
  pages        = {21--28},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456492.1456496},
  doi          = {10.1145/1456492.1456496},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/AlamZNA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangAS07,
  author       = {Xinwen Zhang and
                  Onur Acii{\c{c}}mez and
                  Jean{-}Pierre Seifert},
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {A trusted mobile phone reference architecturevia secure kernel},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Scalable Trusted Computing,
                  {STC} 2007, Alexandria, VA, USA, November 2, 2007},
  pages        = {7--14},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314354.1314359},
  doi          = {10.1145/1314354.1314359},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangAS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangCCS07,
  author       = {Xinwen Zhang and
                  Michael J. Covington and
                  Songqing Chen and
                  Ravi S. Sandhu},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {SecureBus: towards application-transparent trusted computing with
                  mandatory access control},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {117--126},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229304},
  doi          = {10.1145/1229285.1229304},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangCCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ZhaoSZQ07,
  author       = {Baoxian Zhao and
                  Ravi S. Sandhu and
                  Xinwen Zhang and
                  Xiaolin Qin},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Towards a Times-Based Usage Control Model},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {227--242},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_17},
  doi          = {10.1007/978-3-540-73538-0\_17},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ZhaoSZQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/AlamSZ07,
  author       = {Masoom Alam and
                  Jean{-}Pierre Seifert and
                  Xinwen Zhang},
  title        = {A Model-Driven Framework for Trusted Computing Based Systems},
  booktitle    = {11th {IEEE} International Enterprise Distributed Object Computing
                  Conference {(EDOC} 2007), 15-19 October 2007, Annapolis, Maryland,
                  {USA}},
  pages        = {75--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/EDOC.2007.52},
  doi          = {10.1109/EDOC.2007.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/AlamSZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hase/ZhangLSX07,
  author       = {Xinwen Zhang and
                  Qi Li and
                  Jean{-}Pierre Seifert and
                  Mingwei Xu},
  title        = {Flexible Authorization with Decentralized Access Control Model for
                  Grid Computing},
  booktitle    = {Tenth {IEEE} International Symposium on High Assurance Systems Engineering
                  {(HASE} 2007), November 14-16, 2007, Dallas, Texas, {USA}},
  pages        = {156--165},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/HASE.2007.29},
  doi          = {10.1109/HASE.2007.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hase/ZhangLSX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/XuJSZ07,
  author       = {Min Xu and
                  Xuxian Jiang and
                  Ravi S. Sandhu and
                  Xinwen Zhang},
  editor       = {Volkmar Lotz and
                  Bhavani Thuraisingham},
  title        = {Towards a VMM-based usage control framework for {OS} kernel integrity
                  protection},
  booktitle    = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings},
  pages        = {71--80},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1266840.1266852},
  doi          = {10.1145/1266840.1266852},
  timestamp    = {Wed, 29 Jun 2022 15:37:42 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/XuJSZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/AgreiterABHPSZ07,
  author       = {Berthold Agreiter and
                  Muhammad Alam and
                  Ruth Breu and
                  Michael Hafner and
                  Alexander Pretschner and
                  Jean{-}Pierre Seifert and
                  Xinwen Zhang},
  editor       = {Peng Ning and
                  Ernesto Damiani and
                  Seth Proctor},
  title        = {A technical architecture for enforcing usage control requirements
                  in service-oriented architectures},
  booktitle    = {Proceedings of the 4th {ACM} Workshop On Secure Web Services, {SWS}
                  2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {18--25},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314418.1314422},
  doi          = {10.1145/1314418.1314422},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/AgreiterABHPSZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/SandhuZRC06,
  author       = {Ravi S. Sandhu and
                  Xinwen Zhang and
                  Kumar Ranganathan and
                  Michael J. Covington},
  title        = {Client-side access control enforcement using trusted computing and
                  {PEI} models},
  journal      = {J. High Speed Networks},
  volume       = {15},
  number       = {3},
  pages        = {229--245},
  year         = {2006},
  url          = {http://content.iospress.com/articles/journal-of-high-speed-networks/jhs288},
  timestamp    = {Mon, 18 May 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhsn/SandhuZRC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OhSZ06,
  author       = {Sejong Oh and
                  Ravi S. Sandhu and
                  Xinwen Zhang},
  title        = {An effective role administration model using organization structure},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {2},
  pages        = {113--137},
  year         = {2006},
  url          = {https://doi.org/10.1145/1151414.1151415},
  doi          = {10.1145/1151414.1151415},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/OhSZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ancs/ChenWLZ06,
  author       = {Songqing Chen and
                  Xinyuan Wang and
                  Lei Liu and
                  Xinwen Zhang},
  editor       = {Laxmi N. Bhuyan and
                  Michel Dubois and
                  Will Eatherton},
  title        = {WormTerminator: an effective containment of unknown and polymorphic
                  fast spreading worms},
  booktitle    = {Proceedings of the 2006 {ACM/IEEE} Symposium on Architecture for Networking
                  and Communications Systems, {ANCS} 2006, San Jose, California, USA,
                  December 3-5, 2006},
  pages        = {173--182},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1185347.1185371},
  doi          = {10.1145/1185347.1185371},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ancs/ChenWLZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SandhuRZ06,
  author       = {Ravi S. Sandhu and
                  Kumar Ranganathan and
                  Xinwen Zhang},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Secure information sharing enabled by Trusted Computing and {PEI}
                  models},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {2--12},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128820},
  doi          = {10.1145/1128817.1128820},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SandhuRZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangSP06,
  author       = {Xinwen Zhang and
                  Ravi S. Sandhu and
                  Francesco Parisi{-}Presicce},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Safety analysis of usage control authorization models},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {243--254},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128853},
  doi          = {10.1145/1128817.1128853},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangSP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NakaeZS06,
  author       = {Masayuki Nakae and
                  Xinwen Zhang and
                  Ravi S. Sandhu},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {A general design towards secure ad-hoc collaboration},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {358},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128874},
  doi          = {10.1145/1128817.1128874},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NakaeZS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/LiZQX06,
  author       = {Qi Li and
                  Xinwen Zhang and
                  Sihan Qing and
                  Mingwei Xu},
  editor       = {Enrico Blanzieri and
                  Tao Zhang},
  title        = {Supporting Ad-hoc Collaboration with Group-based {RBAC} Model},
  booktitle    = {2nd International {ICST} Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA,
                  November 17-20, 2006},
  publisher    = {{IEEE} Computer Society / {ICST}},
  year         = {2006},
  url          = {https://doi.org/10.1109/COLCOM.2006.361887},
  doi          = {10.1109/COLCOM.2006.361887},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/LiZQX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/ZhangZS06,
  author       = {Zhixiong Zhang and
                  Xinwen Zhang and
                  Ravi S. Sandhu},
  editor       = {Enrico Blanzieri and
                  Tao Zhang},
  title        = {{ROBAC:} Scalable Role and Organization Based Access Control Models},
  booktitle    = {2nd International {ICST} Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA,
                  November 17-20, 2006},
  publisher    = {{IEEE} Computer Society / {ICST}},
  year         = {2006},
  url          = {https://doi.org/10.1109/COLCOM.2006.361879},
  doi          = {10.1109/COLCOM.2006.361879},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/ZhangZS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhangPS06,
  author       = {Xinwen Zhang and
                  Francesco Parisi{-}Presicce and
                  Ravi S. Sandhu},
  editor       = {Hiroshi Yoshiura and
                  Kouichi Sakurai and
                  Kai Rannenberg and
                  Yuko Murayama and
                  Shin{-}ichi Kawamura},
  title        = {Towards Remote Policy Enforcement for Runtime Protection of Mobile
                  Code Using Trusted Computing},
  booktitle    = {Advances in Information and Computer Security, First International
                  Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4266},
  pages        = {179--195},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11908739\_13},
  doi          = {10.1007/11908739\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhangPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ZhangNCS06,
  author       = {Xinwen Zhang and
                  Masayuki Nakae and
                  Michael J. Covington and
                  Ravi S. Sandhu},
  editor       = {David F. Ferraiolo and
                  Indrakshi Ray},
  title        = {A usage-based authorization framework for collaborative computing
                  systems},
  booktitle    = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings},
  pages        = {180--189},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1133058.1133084},
  doi          = {10.1145/1133058.1133084},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/ZhangNCS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecra/LiZ05,
  author       = {Yingjiu Li and
                  Xinwen Zhang},
  title        = {Securing credit card transactions with one-time payment scheme},
  journal      = {Electron. Commer. Res. Appl.},
  volume       = {4},
  number       = {4},
  pages        = {413--426},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.elerap.2005.06.002},
  doi          = {10.1016/J.ELERAP.2005.06.002},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ecra/LiZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/ZhangCS05,
  author       = {Xinwen Zhang and
                  Songqing Chen and
                  Ravi S. Sandhu},
  title        = {Enhancing Data Authenticity and Integrity in {P2P} Systems},
  journal      = {{IEEE} Internet Comput.},
  volume       = {9},
  number       = {6},
  pages        = {42--49},
  year         = {2005},
  url          = {https://doi.org/10.1109/MIC.2005.124},
  doi          = {10.1109/MIC.2005.124},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/ZhangCS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhangPSP05,
  author       = {Xinwen Zhang and
                  Francesco Parisi{-}Presicce and
                  Ravi S. Sandhu and
                  Jaehong Park},
  title        = {Formal model and policy specification of usage control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {351--387},
  year         = {2005},
  url          = {https://doi.org/10.1145/1108906.1108908},
  doi          = {10.1145/1108906.1108908},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/ZhangPSP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ZhangLN05,
  author       = {Xinwen Zhang and
                  Yingjiu Li and
                  Divya Nalla},
  editor       = {Hisham Haddad and
                  Lorie M. Liebrock and
                  Andrea Omicini and
                  Roger L. Wainwright},
  title        = {An attribute-based access matrix model},
  booktitle    = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC),
                  Santa Fe, New Mexico, USA, March 13-17, 2005},
  pages        = {359--363},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1066677.1066760},
  doi          = {10.1145/1066677.1066760},
  timestamp    = {Tue, 06 Nov 2018 11:06:45 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/ZhangLN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/SandhuZ05,
  author       = {Ravi S. Sandhu and
                  Xinwen Zhang},
  editor       = {Elena Ferrari and
                  Gail{-}Joon Ahn},
  title        = {Peer-to-peer access control architecture using trusted computing technology},
  booktitle    = {10th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2005, Stockholm, Sweden, June 1-3, 2005, Proceedings},
  pages        = {147--158},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1063979.1064005},
  doi          = {10.1145/1063979.1064005},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/SandhuZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ParkZS04,
  author       = {Jaehong Park and
                  Xinwen Zhang and
                  Ravi S. Sandhu},
  editor       = {Csilla Farkas and
                  Pierangela Samarati},
  title        = {Attribute Mutability in Usage Control},
  booktitle    = {Research Directions in Data and Applications Security XVIII, {IFIP}
                  {TC11/WG} 11.3 Eighteenth Annual Conference on Data and Applications
                  Security, July 25-28, 2004, Sitges, Catalonia, Spain},
  series       = {{IFIP}},
  volume       = {144},
  pages        = {15--29},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8128-6\_2},
  doi          = {10.1007/1-4020-8128-6\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ParkZS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ride/LiZ04,
  author       = {Yingjiu Li and
                  Xinwen Zhang},
  title        = {A Security-Enhanced One-Time Payment Scheme for Credit Card},
  booktitle    = {14th International Workshop on Research Issues in Data Engineering
                  {(RIDE-WS-ECEG} 2004), Web Services for E-Commerce and E-Government
                  Applications, 28-29 March 2004, Boston, MA, {USA}},
  pages        = {40--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/RIDE.2004.1281701},
  doi          = {10.1109/RIDE.2004.1281701},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ride/LiZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ZhangPPS04,
  author       = {Xinwen Zhang and
                  Jaehong Park and
                  Francesco Parisi{-}Presicce and
                  Ravi S. Sandhu},
  editor       = {Trent Jaeger and
                  Elena Ferrari},
  title        = {A logical specification for usage control},
  booktitle    = {9th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/990036.990038},
  doi          = {10.1145/990036.990038},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/ZhangPPS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ZhangPS03,
  author       = {Xinwen Zhang and
                  Jaehong Park and
                  Ravi S. Sandhu},
  editor       = {Sabrina De Capitani di Vimercati and
                  Indrakshi Ray and
                  Indrajit Ray},
  title        = {Schema Based {XML} Security: {RBAC} Approach},
  booktitle    = {Data and Applications Security {XVII:} Status and Prospects, {IFIP}
                  {TC-11} {WG} 11.3 Seventeenth Annual Working Conference on Data and
                  Application Security, August4-6, 2003, Estes Park, Colorado, {USA}},
  series       = {{IFIP}},
  volume       = {142},
  pages        = {330--343},
  publisher    = {Kluwer/Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/1-4020-8070-0\_24},
  doi          = {10.1007/1-4020-8070-0\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ZhangPS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ZhangOS03,
  author       = {Xinwen Zhang and
                  Sejong Oh and
                  Ravi S. Sandhu},
  editor       = {Elena Ferrari and
                  David F. Ferraiolo},
  title        = {{PBDM:} a flexible delegation model in {RBAC}},
  booktitle    = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings},
  pages        = {149--157},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/775412.775431},
  doi          = {10.1145/775412.775431},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/ZhangOS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics