Xinwen Zhang, Ph.D.

Affiliations: 
2006 George Mason University, Washington, DC 
Area:
Computer Science
Google:
"Xinwen Zhang"

Parents

Sign in to add mentor
Ravi Sandhu grad student 2006 George Mason
 (Formal model and analysis of usage control.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Li Q, Sandhu R, Zhang X, et al. (2017) Mandatory Content Access Control for Privacy Protection in Information Centric Networks Ieee Transactions On Dependable and Secure Computing. 14: 494-506
Gu Y, Li Q, Zhang H, et al. (2016) Direct Resource Hijacking in Android Ieee Internet Computing. 20: 46-56
Li Q, Zhang X, Zheng Q, et al. (2015) LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking Ieee Transactions On Information Forensics and Security. 10: 308-320
Mohaisen A, Mekky H, Zhang X, et al. (2015) Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures Ieee Transactions On Dependable and Secure Computing. 12: 675-687
Zhang X, Li Q, Su P. (2015) Invalidating idealized BGP security proposals and countermeasures Ieee Transactions On Dependable and Secure Computing. 12: 298-311
Zhang X, Seifert J, Aciicmez O. (2014) Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms Ieee Transactions On Mobile Computing. 13: 188-201
Jin H, Cheng G, Zou D, et al. (2013) Cherub: Fine-grained application protection with on-demand virtualization Computers & Mathematics With Applications. 65: 1326-1338
Alam M, Zhang X, Nauman M, et al. (2013) Behavioral Attestation for Web Services using access policies Multimedia Tools and Applications. 66: 283-302
Li Q, Xu M, Wu J, et al. (2012) Enhancing the Trust of Internet Routing With Lightweight Route Attestation Ieee Transactions On Information Forensics and Security. 7: 691-703
Xu W, Zhang X, Hu H, et al. (2012) Remote Attestation with Domain-Based Integrity Model and Policy Analysis Ieee Transactions On Dependable and Secure Computing. 9: 429-442
See more...