Følg
Yuan Cheng
Yuan Cheng
Verifisert e-postadresse på gvsu.edu - Startside
Tittel
Sitert av
Sitert av
År
Relationship-based access control for online social networks: Beyond user-to-user relationships
Y Cheng, J Park, R Sandhu
2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012
1382012
A user-to-user relationship-based access control model for online social networks
Y Cheng, J Park, R Sandhu
Data and Applications Security and Privacy XXVI, 8-24, 2012
1252012
An access control model for online social networks using user-to-user relationships
Y Cheng, J Park, R Sandhu
IEEE transactions on dependable and secure computing 13 (4), 424-436, 2015
752015
Preserving user privacy from third-party applications in online social networks
Y Cheng, J Park, R Sandhu
Proceedings of the 22nd international conference on world wide web, 723-728, 2013
642013
A User-Activity-Centric Framework for Access Control in Online Social Networks
J Park, R Sandhu, Y Cheng
Internet Computing, IEEE 15 (5), 62-65, 2011
642011
Attribute-aware relationship-based access control for online social networks
Y Cheng, J Park, R Sandhu
Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 …, 2014
602014
Relationship based information sharing control system and method of use
JH Park, RS Sandhu, Y Cheng
US Patent App. 14/328,682, 2015
412015
A performance comparison of WireGuard and OpenVPN
S Mackey, I Mihov, A Nosenko, F Vega, Y Cheng
Proceedings of the Tenth ACM Conference on data and application security and …, 2020
382020
ACON: Activity-Centric Access Control for Social Computing
J Park, R Sandhu, Y Cheng
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
372011
An empirical analysis on the usability and security of passwords
KS Walia, S Shenoy, Y Cheng
21st IEEE International Conference on Information Reuse and Integration for …, 2020
182020
A modern implementation of system call sequence based host-based intrusion detection systems
J Byrnes, T Hoang, NN Mehta, Y Cheng
2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020
162020
Extended ReBAC administrative models with cascading revocation and provenance support
Y Cheng, K Bijon, R Sandhu
Proceedings of the 21st ACM on Symposium on Access Control Models and …, 2016
162016
A performance study on cryptographic algorithms for IoT devices
E Anaya, J Patel, P Shah, V Shah, Y Cheng
Proceedings of the Tenth ACM Conference on data and application security and …, 2020
82020
Password and passphrase guessing with recurrent neural networks
A Nosenko, Y Cheng, H Chen
Information systems frontiers 25 (2), 549-565, 2023
72023
Towards provenance and risk-awareness in social computing
Y Cheng, D Nguyen, K Bijon, R Krishnan, J Park, R Sandhu
Proceedings of the first international workshop on secure and resilient …, 2012
42012
A Literature Survey of Phishing and Its Countermeasures
J Vega, D Shevchyk, Y Cheng
2022 Computer Science Conference for CSU Undergraduates, 2022
32022
Learning password modification patterns with recurrent neural networks
A Nosenko, Y Cheng, H Chen
International conference on secure knowledge management in artificial …, 2021
32021
Towards a framework for cyber social status based trusted open collaboration
J Park, Y Cheng, R Sandhu
6th International Conference on Collaborative Computing: Networking …, 2010
32010
Analyzing the Efficiency of Lightweight Symmetric Ciphers on IoT Devices
J Rivero, TNB Huynh, A Smith-Evans, O Thao, Y Cheng
2021 Computer Science Conference for CSU Undergraduates, 2021
22021
What to do first: Ranking the mission impact graph for effective mission assurance
P Appana, X Sun, Y Cheng
2019 International Conference on Computing, Networking and Communications …, 2019
22019
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20