Follow
Ping Yang
Title
Cited by
Cited by
Year
Efficient policy analysis for administrative role based access control
SD Stoller, P Yang, CR Ramakrishnan, MI Gofman
Proceedings of the 14th ACM conference on Computer and communications …, 2007
1612007
Policy analysis for administrative role-based access control
A Sasturkar, P Yang, SD Stoller, CR Ramakrishnan
Theoretical Computer Science 412 (44), 6208-6234, 2011
1382011
Scientific workflow provenance querying with security views
A Chebotko, S Chang, S Lu, F Fotouhi, P Yang
2008 The Ninth International Conference on Web-Age Information Management …, 2008
642008
Rbac-pat: A policy analysis tool for role based access control
MI Gofman, R Luo, AC Solomon, Y Zhang, P Yang, SD Stoller
International Conference on Tools and Algorithms for the Construction and …, 2009
602009
Symbolic reachability analysis for parameterized administrative role based access control
SD Stoller, P Yang, M Gofman, CR Ramakrishnan
Proceedings of the 14th ACM symposium on Access control models and …, 2009
572009
System and method for security and privacy aware virtual machine checkpointing
P Yang, K Gopalan
US Patent 9,069,782, 2015
562015
A logical encoding of the π-calculus: model checking mobile processes using tabled resolution
P Yang, CR Ramakrishnan, SA Smolka
International journal on software tools for technology transfer 6, 38-66, 2004
422004
Live migration ate my vm: Recovering a virtual machine after failure of post-copy live migration
D Fernando, J Terner, K Gopalan, P Yang
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 343-351, 2019
352019
Satisfiability analysis of workflows with control-flow patterns and authorization constraints
P Yang, X Xie, I Ray, S Lu
IEEE Transactions on Services Computing 7 (2), 237-251, 2013
332013
Sparc: a security and privacy aware virtual machinecheckpointing mechanism
MI Gofman, R Luo, P Yang, K Gopalan
Proceedings of the 10th annual ACM workshop on Privacy in the electronic …, 2011
332011
Secure abstraction views for scientific workflow provenance querying
A Chebotko, S Lu, S Chang, F Fotouhi, P Yang
IEEE Transactions on Services Computing 3 (4), 322-337, 2010
292010
A logical encoding of the π-calculus: Model checking mobile processes using tabled resolution
P Yang, CR Ramakrishnan, SA Smolka
International Workshop on Verification, Model Checking, and Abstract …, 2002
272002
Policy analysis for administrative role based access control without separate administration
P Yang, MI Gofman, SD Stoller, Z Yang
Journal of Computer Security 23 (1), 1-29, 2015
232015
Formal modeling and analysis of scientific workflows using hierarchical state machines
P Yang, Z Yang, S Lu
Third IEEE International Conference on e-Science and Grid Computing (e …, 2007
202007
SciBlock: A blockchain-based tamper-proof non-repudiable storage for scientific workflow provenance
D Fernando, S Kulshrestha, JD Herath, N Mahadik, Y Ma, C Bai, P Yang, ...
2019 IEEE 5th International Conference on Collaboration and Internet …, 2019
192019
Cfgexplainer: Explaining graph neural network-based malware classification from control flow graphs
JD Herath, PP Wakodikar, P Yang, G Yan
2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems …, 2022
182022
Ramp: Real-time anomaly detection in scientific workflows
JD Herath, C Bai, G Yan, P Yang, S Lu
2019 IEEE International Conference on Big Data (Big Data), 1367-1374, 2019
182019
User-role reachability analysis of evolving administrative role based access control
M Gofman, R Luo, P Yang
Computer Security–ESORICS 2010, 455-471, 2011
162011
Agent-oriented commonsense knowledge base
R Lu, C Shi, S Zhang
SCIENCE IN CHINA SERIES E TECHNOLOGICAL SCIENCES-ENGLISH EDITION- 43 (6 …, 2000
14*2000
Security analysis of email systems
T Li, A Mehta, P Yang
2017 IEEE 4th International Conference on Cyber Security and Cloud Computing …, 2017
132017
The system can't perform the operation now. Try again later.
Articles 1–20