Seguir
Dan (Linda) Lin
Dan (Linda) Lin
Professor of Computer Science, Director of I-Privacy Lab, Vanderbilt University
Dirección de correo verificada de vanderbilt.edu - Página principal
Título
Citado por
Citado por
Año
Query and update efficient B+-tree based indexing of moving objects
CS Jensen, D Lin, BC Ooi
Proceedings of the Thirtieth international conference on Very large data …, 2004
4982004
iPrivacy: image privacy protection by identifying sensitive objects via deep multi-task learning
J Yu, B Zhang, Z Kuang, D Lin, J Fan
IEEE Transactions on Information Forensics and Security 12 (5), 1005-1016, 2016
3122016
Ensuring Distributed Accountability for Data Sharing in the Cloud
S Sundareswaran, A Squicciarini, D Lin
Dependable and Secure Computing, IEEE Transactions on 9 (4), 556-568, 2012
2882012
A brokerage-based approach for cloud service selection
S Sundareswaran, A Squicciarini, D Lin
2012 IEEE Fifth International Conference on Cloud Computing, 558-565, 2012
2482012
MoZo: A moving zone based routing protocol using pure V2V communication in VANETs
D Lin, J Kang, A Squicciarini, Y Wu, S Gurung, O Tonguz
Ieee transactions on mobile computing 16 (5), 1357-1370, 2016
2372016
Continuous clustering of moving objects
CS Jensen, D Lin, BC Ooi
IEEE transactions on knowledge and data engineering 19 (9), 1161-1174, 2007
2082007
An approach to evaluate data trustworthiness based on data provenance
C Dai, D Lin, E Bertino, M Kantarcioglu
Secure Data Management: 5th VLDB Workshop, SDM 2008, Auckland, New Zealand …, 2008
2052008
Leveraging content sensitiveness and user trustworthiness to recommend fine-grained privacy settings for social image sharing
J Yu, Z Kuang, B Zhang, W Zhang, D Lin, J Fan
IEEE transactions on information forensics and security 13 (5), 1317-1332, 2018
2022018
Access control policy combining: theory meets practice
N Li, Q Wang, W Qardaji, E Bertino, P Rao, J Lobo, D Lin
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1602009
Effective density queries on continuouslymoving objects
CS Jensen, D Lin, BC Ooi, R Zhang
22nd International Conference on Data Engineering (ICDE'06), 71-71, 2006
1372006
An algebra for fine-grained integration of XACML policies
P Rao, D Lin, E Bertino, N Li, J Lobo
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1322009
Privacy policy inference of user-uploaded images on content sharing sites
AC Squicciarini, D Lin, S Sundareswaran, J Wede
IEEE transactions on knowledge and data engineering 27 (1), 193-206, 2014
1302014
Information-oriented trustworthiness evaluation in vehicular ad-hoc networks
S Gurung, D Lin, A Squicciarini, E Bertino
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
1222013
Efficient indexing of the historical, present, and future positions of moving objects
D Lin, CS Jensen, BC Ooi, S Šaltenis
Proceedings of the 6th international conference on Mobile data management, 59-66, 2005
1222005
A3p: adaptive policy prediction for shared images over popular content sharing sites
AC Squicciarini, S Sundareswaran, D Lin, J Wede
Proceedings of the 22nd ACM conference on Hypertext and hypermedia, 261-270, 2011
1122011
Preventing information leakage from indexing in the cloud
A Squicciarini, S Sundareswaran, D Lin
2010 IEEE 3rd International Conference on Cloud Computing, 188-195, 2010
1122010
A benchmark for evaluating moving object indexes
S Chen, CS Jensen, D Lin
Proceedings of the VLDB Endowment 1 (2), 1574-1585, 2008
1102008
An approach to evaluate policy similarity
D Lin, P Rao, E Bertino, J Lobo
Proceedings of the 12th ACM symposium on Access control models and …, 2007
952007
EXAM: a comprehensive environment for the analysis of access control policies
D Lin, P Rao, E Bertino, N Li, J Lobo
International Journal of Information Security 9, 253-273, 2010
922010
Data protection models for service provisioning in the cloud
D Lin, A Squicciarini
Proceedings of the 15th ACM symposium on Access control models and …, 2010
862010
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20