Xinwen Zhang, Ph.D.
Affiliations: | 2006 | George Mason University, Washington, DC |
Area:
Computer ScienceGoogle:
"Xinwen Zhang"Parents
Sign in to add mentorRavi Sandhu | grad student | 2006 | George Mason | |
(Formal model and analysis of usage control.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Li Q, Sandhu R, Zhang X, et al. (2017) Mandatory Content Access Control for Privacy Protection in Information Centric Networks Ieee Transactions On Dependable and Secure Computing. 14: 494-506 |
Gu Y, Li Q, Zhang H, et al. (2016) Direct Resource Hijacking in Android Ieee Internet Computing. 20: 46-56 |
Li Q, Zhang X, Zheng Q, et al. (2015) LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking Ieee Transactions On Information Forensics and Security. 10: 308-320 |
Mohaisen A, Mekky H, Zhang X, et al. (2015) Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures Ieee Transactions On Dependable and Secure Computing. 12: 675-687 |
Zhang X, Li Q, Su P. (2015) Invalidating idealized BGP security proposals and countermeasures Ieee Transactions On Dependable and Secure Computing. 12: 298-311 |
Zhang X, Seifert J, Aciicmez O. (2014) Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms Ieee Transactions On Mobile Computing. 13: 188-201 |
Jin H, Cheng G, Zou D, et al. (2013) Cherub: Fine-grained application protection with on-demand virtualization Computers & Mathematics With Applications. 65: 1326-1338 |
Alam M, Zhang X, Nauman M, et al. (2013) Behavioral Attestation for Web Services using access policies Multimedia Tools and Applications. 66: 283-302 |
Li Q, Xu M, Wu J, et al. (2012) Enhancing the Trust of Internet Routing With Lightweight Route Attestation Ieee Transactions On Information Forensics and Security. 7: 691-703 |
Xu W, Zhang X, Hu H, et al. (2012) Remote Attestation with Domain-Based Integrity Model and Policy Analysis Ieee Transactions On Dependable and Secure Computing. 9: 429-442 |