متابعة
Ping Yang
Ping Yang
بريد إلكتروني تم التحقق منه على binghamton.edu
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Efficient policy analysis for administrative role based access control
SD Stoller, P Yang, CR Ramakrishnan, MI Gofman
Proceedings of the 14th ACM conference on Computer and communications …, 2007
1622007
Policy analysis for administrative role-based access control
A Sasturkar, P Yang, SD Stoller, CR Ramakrishnan
Theoretical Computer Science 412 (44), 6208-6234, 2011
1402011
Scientific workflow provenance querying with security views
A Chebotko, S Chang, S Lu, F Fotouhi, P Yang
2008 The Ninth International Conference on Web-Age Information Management …, 2008
662008
Rbac-pat: A policy analysis tool for role based access control
MI Gofman, R Luo, AC Solomon, Y Zhang, P Yang, SD Stoller
International Conference on Tools and Algorithms for the Construction and …, 2009
612009
System and method for security and privacy aware virtual machine checkpointing
P Yang, K Gopalan
US Patent 9,069,782, 2015
582015
Symbolic reachability analysis for parameterized administrative role based access control
SD Stoller, P Yang, M Gofman, CR Ramakrishnan
Proceedings of the 14th ACM symposium on Access control models and …, 2009
582009
A logical encoding of the π-calculus: model checking mobile processes using tabled resolution
P Yang, CR Ramakrishnan, SA Smolka
International journal on software tools for technology transfer 6, 38-66, 2004
432004
Live migration ate my vm: Recovering a virtual machine after failure of post-copy live migration
D Fernando, J Terner, K Gopalan, P Yang
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 343-351, 2019
422019
Satisfiability analysis of workflows with control-flow patterns and authorization constraints
P Yang, X Xie, I Ray, S Lu
IEEE Transactions on Services Computing 7 (2), 237-251, 2013
362013
Sparc: a security and privacy aware virtual machinecheckpointing mechanism
MI Gofman, R Luo, P Yang, K Gopalan
Proceedings of the 10th annual ACM workshop on Privacy in the electronic …, 2011
342011
Cfgexplainer: Explaining graph neural network-based malware classification from control flow graphs
JD Herath, PP Wakodikar, P Yang, G Yan
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022
312022
Secure abstraction views for scientific workflow provenance querying
A Chebotko, S Lu, S Chang, F Fotouhi, P Yang
IEEE Transactions on Services Computing 3 (4), 322-337, 2010
302010
A logical encoding of the π-calculus: Model checking mobile processes using tabled resolution
P Yang, CR Ramakrishnan, SA Smolka
International Workshop on Verification, Model Checking, and Abstract …, 2002
282002
SciBlock: A blockchain-based tamper-proof non-repudiable storage for scientific workflow provenance
D Fernando, S Kulshrestha, JD Herath, N Mahadik, Y Ma, C Bai, P Yang, ...
2019 IEEE 5th International Conference on Collaboration and Internet …, 2019
252019
Ramp: Real-time anomaly detection in scientific workflows
JD Herath, C Bai, G Yan, P Yang, S Lu
2019 IEEE International Conference on Big Data (Big Data), 1367-1374, 2019
242019
Policy analysis for administrative role based access control without separate administration
P Yang, MI Gofman, SD Stoller, Z Yang
Journal of Computer Security 23 (1), 1-29, 2015
222015
Formal modeling and analysis of scientific workflows using hierarchical state machines
P Yang, Z Yang, S Lu
Third IEEE International Conference on e-Science and Grid Computing (e …, 2007
192007
User-role reachability analysis of evolving administrative role based access control
M Gofman, R Luo, P Yang
Computer Security–ESORICS 2010, 455-471, 2011
162011
Recovering a virtual machine after failure of post-copy live migration
K Gopalan, P Yang, DK Fernando, J Terner
US Patent 11,409,619, 2022
152022
Real-time evasion attacks against deep learning-based anomaly detection from distributed system logs
JD Herath, P Yang, G Yan
Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021
152021
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20