Stebėti
Jianwei Niu
Jianwei Niu
Professor of Computer Science, UTSA
Patvirtintas el. paštas utsa.edu
Pavadinimas
Cituota
Cituota
Metai
ROWLBAC: representing role based access control in OWL
T Finin, A Joshi, L Kagal, J Niu, R Sandhu, W Winsborough, ...
Proceedings of the 13th ACM symposium on Access control models and …, 2008
3452008
Toward a framework for detecting privacy policy violations in android application code
R Slavin, X Wang, MB Hosseini, J Hester, R Krishnan, J Bhatia, ...
Proceedings of the 38th International conference on software engineering, 25-36, 2016
2652016
Guileak: Tracing privacy policy claims on user input data for android applications
X Wang, X Qin, MB Hosseini, R Slavin, TD Breaux, J Niu
Proceedings of the 40th International Conference on Software Engineering, 37-47, 2018
1272018
Template semantics for model-based notations
J Niu, JM Atlee, NA Day
IEEE Transactions on Software Engineering 29 (10), 866-882, 2003
692003
Group-centric secure information-sharing models for isolated groups
R Krishnan, J Niu, R Sandhu, WH Winsborough
ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-29, 2011
512011
Foundations for group-centric secure information sharing models
R Krishnan, R Sandhu, J Niu, WH Winsborough
Proceedings of the 14th ACM symposium on Access control models and …, 2009
512009
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule
O Chowdhury, A Gampe, J Niu, J von Ronne, J Bennatt, A Datta, L Jia, ...
Proceedings of the 18th ACM symposium on Access control models and …, 2013
472013
Deconstructing the semantics of big-step modelling languages
S Esmaeilsabzali, NA Day, JM Atlee, J Niu
Requirements Engineering 15, 235-265, 2010
462010
A conceptual framework for group-centric secure information sharing
R Krishnan, R Sandhu, J Niu, WH Winsborough
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
432009
How does misconfiguration of analytic services compromise mobile privacy?
X Zhang, X Wang, R Slavin, T Breaux, J Niu
Proceedings of the ACM/IEEE 42nd international conference on software …, 2020
372020
Formalize UML 2 sequence diagrams
H Shen, A Virani, J Niu
2008 11th IEEE High Assurance Systems Engineering Symposium, 437-440, 2008
342008
Lexical Similarity of Information Type Hypernyms, Meronyms and Synonyms in Privacy Policies.
MB Hosseini, S Wadkar, TD Breaux, J Niu
AAAI Fall Symposia, 2016
332016
Towards a framework for group-centric secure collaboration
R Krishnan, R Sandhu, J Niu, W Winsborough
2009 5th International Conference on Collaborative Computing: Networking …, 2009
312009
Stale-safe security properties for group-based secure information sharing
R Krishnan, J Niu, R Sandhu, WH Winsborough
Proceedings of the 6th ACM workshop on Formal methods in security …, 2008
312008
Condysta: Context-aware dynamic supplement to static taint analysis
X Zhang, X Wang, R Slavin, J Niu
2021 IEEE Symposium on Security and Privacy (SP), 796-812, 2021
292021
Monitoring dense-time, continuous-semantics, metric temporal logic
K Baldor, J Niu
International Conference on Runtime Verification, 245-259, 2012
262012
Mapping template semantics to SMV
Y Lu, JM Atlee, NA Day, J Niu
Proceedings. 19th International Conference on Automated Software Engineering …, 2004
242004
Analyzing privacy policies through syntax-driven semantic analysis of information types
MB Hosseini, TD Breaux, R Slavin, J Niu, X Wang
Information and Software Technology 138, 106608, 2021
232021
Managing security requirements patterns using feature diagram hierarchies
R Slavin, JM Lehker, J Niu, TD Breaux
2014 IEEE 22nd International Requirements Engineering Conference (RE), 193-202, 2014
232014
Access control policy generation from user stories using machine learning
J Heaps, R Krishnan, Y Huang, J Niu, R Sandhu
Data and Applications Security and Privacy XXXV: 35th Annual IFIP WG 11.3 …, 2021
222021
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20