Efficient policy analysis for administrative role based access control SD Stoller, P Yang, CR Ramakrishnan, MI Gofman Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 162 | 2007 |
Policy analysis for administrative role-based access control A Sasturkar, P Yang, SD Stoller, CR Ramakrishnan Theoretical Computer Science 412 (44), 6208-6234, 2011 | 140 | 2011 |
Scientific workflow provenance querying with security views A Chebotko, S Chang, S Lu, F Fotouhi, P Yang 2008 The Ninth International Conference on Web-Age Information Management …, 2008 | 66 | 2008 |
Rbac-pat: A policy analysis tool for role based access control MI Gofman, R Luo, AC Solomon, Y Zhang, P Yang, SD Stoller International Conference on Tools and Algorithms for the Construction and …, 2009 | 61 | 2009 |
System and method for security and privacy aware virtual machine checkpointing P Yang, K Gopalan US Patent 9,069,782, 2015 | 58 | 2015 |
Symbolic reachability analysis for parameterized administrative role based access control SD Stoller, P Yang, M Gofman, CR Ramakrishnan Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 58 | 2009 |
A logical encoding of the π-calculus: model checking mobile processes using tabled resolution P Yang, CR Ramakrishnan, SA Smolka International journal on software tools for technology transfer 6, 38-66, 2004 | 43 | 2004 |
Live migration ate my vm: Recovering a virtual machine after failure of post-copy live migration D Fernando, J Terner, K Gopalan, P Yang IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 343-351, 2019 | 42 | 2019 |
Satisfiability analysis of workflows with control-flow patterns and authorization constraints P Yang, X Xie, I Ray, S Lu IEEE Transactions on Services Computing 7 (2), 237-251, 2013 | 36 | 2013 |
Sparc: a security and privacy aware virtual machinecheckpointing mechanism MI Gofman, R Luo, P Yang, K Gopalan Proceedings of the 10th annual ACM workshop on Privacy in the electronic …, 2011 | 34 | 2011 |
Cfgexplainer: Explaining graph neural network-based malware classification from control flow graphs JD Herath, PP Wakodikar, P Yang, G Yan 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022 | 31 | 2022 |
Secure abstraction views for scientific workflow provenance querying A Chebotko, S Lu, S Chang, F Fotouhi, P Yang IEEE Transactions on Services Computing 3 (4), 322-337, 2010 | 30 | 2010 |
A logical encoding of the π-calculus: Model checking mobile processes using tabled resolution P Yang, CR Ramakrishnan, SA Smolka International Workshop on Verification, Model Checking, and Abstract …, 2002 | 28 | 2002 |
SciBlock: A blockchain-based tamper-proof non-repudiable storage for scientific workflow provenance D Fernando, S Kulshrestha, JD Herath, N Mahadik, Y Ma, C Bai, P Yang, ... 2019 IEEE 5th International Conference on Collaboration and Internet …, 2019 | 25 | 2019 |
Ramp: Real-time anomaly detection in scientific workflows JD Herath, C Bai, G Yan, P Yang, S Lu 2019 IEEE International Conference on Big Data (Big Data), 1367-1374, 2019 | 24 | 2019 |
Policy analysis for administrative role based access control without separate administration P Yang, MI Gofman, SD Stoller, Z Yang Journal of Computer Security 23 (1), 1-29, 2015 | 22 | 2015 |
Formal modeling and analysis of scientific workflows using hierarchical state machines P Yang, Z Yang, S Lu Third IEEE International Conference on e-Science and Grid Computing (e …, 2007 | 19 | 2007 |
User-role reachability analysis of evolving administrative role based access control M Gofman, R Luo, P Yang Computer Security–ESORICS 2010, 455-471, 2011 | 16 | 2011 |
Recovering a virtual machine after failure of post-copy live migration K Gopalan, P Yang, DK Fernando, J Terner US Patent 11,409,619, 2022 | 15 | 2022 |
Real-time evasion attacks against deep learning-based anomaly detection from distributed system logs JD Herath, P Yang, G Yan Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | 15 | 2021 |