Seguir
Ping Yang
Ping Yang
Dirección de correo verificada de binghamton.edu
Título
Citado por
Citado por
Año
Efficient policy analysis for administrative role based access control
SD Stoller, P Yang, CR Ramakrishnan, MI Gofman
Proceedings of the 14th ACM conference on Computer and communications …, 2007
1612007
Policy analysis for administrative role-based access control
A Sasturkar, P Yang, SD Stoller, CR Ramakrishnan
Theoretical Computer Science 412 (44), 6208-6234, 2011
1382011
Scientific workflow provenance querying with security views
A Chebotko, S Chang, S Lu, F Fotouhi, P Yang
2008 The Ninth International Conference on Web-Age Information Management …, 2008
642008
Rbac-pat: A policy analysis tool for role based access control
MI Gofman, R Luo, AC Solomon, Y Zhang, P Yang, SD Stoller
International Conference on Tools and Algorithms for the Construction and …, 2009
602009
Symbolic reachability analysis for parameterized administrative role based access control
SD Stoller, P Yang, M Gofman, CR Ramakrishnan
Proceedings of the 14th ACM symposium on Access control models and …, 2009
572009
System and method for security and privacy aware virtual machine checkpointing
P Yang, K Gopalan
US Patent 9,069,782, 2015
562015
A logical encoding of the π-calculus: model checking mobile processes using tabled resolution
P Yang, CR Ramakrishnan, SA Smolka
International journal on software tools for technology transfer 6, 38-66, 2004
422004
Live migration ate my vm: Recovering a virtual machine after failure of post-copy live migration
D Fernando, J Terner, K Gopalan, P Yang
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 343-351, 2019
352019
Satisfiability analysis of workflows with control-flow patterns and authorization constraints
P Yang, X Xie, I Ray, S Lu
IEEE Transactions on Services Computing 7 (2), 237-251, 2013
332013
Sparc: a security and privacy aware virtual machinecheckpointing mechanism
MI Gofman, R Luo, P Yang, K Gopalan
Proceedings of the 10th annual ACM workshop on Privacy in the electronic …, 2011
332011
Secure abstraction views for scientific workflow provenance querying
A Chebotko, S Lu, S Chang, F Fotouhi, P Yang
IEEE Transactions on Services Computing 3 (4), 322-337, 2010
292010
A logical encoding of the π-calculus: Model checking mobile processes using tabled resolution
P Yang, CR Ramakrishnan, SA Smolka
International Workshop on Verification, Model Checking, and Abstract …, 2002
272002
Policy analysis for administrative role based access control without separate administration
P Yang, MI Gofman, SD Stoller, Z Yang
Journal of Computer Security 23 (1), 1-29, 2015
232015
Cfgexplainer: Explaining graph neural network-based malware classification from control flow graphs
JD Herath, PP Wakodikar, P Yang, G Yan
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022
202022
Formal modeling and analysis of scientific workflows using hierarchical state machines
P Yang, Z Yang, S Lu
Third IEEE International Conference on e-Science and Grid Computing (e …, 2007
202007
SciBlock: A blockchain-based tamper-proof non-repudiable storage for scientific workflow provenance
D Fernando, S Kulshrestha, JD Herath, N Mahadik, Y Ma, C Bai, P Yang, ...
2019 IEEE 5th International Conference on Collaboration and Internet …, 2019
192019
Ramp: Real-time anomaly detection in scientific workflows
JD Herath, C Bai, G Yan, P Yang, S Lu
2019 IEEE International Conference on Big Data (Big Data), 1367-1374, 2019
192019
User-role reachability analysis of evolving administrative role based access control
M Gofman, R Luo, P Yang
Computer Security–ESORICS 2010, 455-471, 2011
162011
Agent-oriented commonsense knowledge base
R Lu, C Shi, S Zhang
SCIENCE IN CHINA SERIES E TECHNOLOGICAL SCIENCES-ENGLISH EDITION- 43 (6 …, 2000
14*2000
Security analysis of email systems
T Li, A Mehta, P Yang
2017 IEEE 4th International Conference on Cyber Security and Cloud Computing …, 2017
132017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20