2009 Publications (12)

[1].Jinwei Hu, Yan Zhang, Ruixuan Li, and Zhengding  Lu. Managing authorization provenance: A modal logic based approach. In  Proceedings of 21st International Conference on Tools with Artificial  Intelligence (ICTAI 2009),? Newark, New  Jersey, USA, November 2-5, 2009 (to appear).

[2].Jinwei Hu, Ruixuan Li, and Zhengding Lu. On Role  Mappings for RBAC-based Secure Interoperation. In Proceedings of 3rd  International Conference on Network & System Security (NSS 2009), Gold  Coast, Australia, October 19-21, 2009 (to appear)

[3].Jinwei Hu, Ruixuan Li, and Zhengding Lu.  RBAC-based Secure Interoperation using Constraint Logic Programming. The 2009  IEEE/IFIP International Symposium on Trusted Computing and Communications  (TrustCom 2009), Vancouver, Canada, August 29-31, 2009

[4].Jianfeng Lu, Ruixuan Li, Vijay Varadharajan,  Zhengding Lu, Xiaopu Ma. Secure Interoperation in Multidomain Environments  Employing UCON Policies.  The 12th Information Security Conference (ISC  2009), Pisa, Italy, 2009 (to appear)

[5].Jianfeng Lu, Ruixuan Li, Zhengding Lu, Jinwei  Hu, and Xiaopu Ma. Specication and Enforcement of Static Separation-of-Duty  Policies in Usage Control. The 12th Information Security Conference (ISC 2009),  Pisa, Italy, 2009 (to appear)

[6].Ruixuan Li, Jianfeng Lu, Zhengding Lu, Xiaopu  Ma: Consistency Checking of Safety and Availability in Access Control. IEICE  Transaction on Information and Systems Society, Vol. E93-D, No.3, pp. 101-112,  Mar. 2010.

[7].Jianfeng Lu, Ruixuan Li, Zhengding Lu, and Yanan  Jin. Dynamic Enforcement of Separation-of-Duty Policies. The 2009 International  Conference on Multimedia Information NEtworking and Security (MINES 2009), pp.  394-397, Wuhan, China, 2009 (to appear)

[8].Jianfeng Lu, Ruixuan Li, Zhengding Lu, Xiaopu  Ma: A Role-based Access Control Architecture for P2P File-Sharing Systems Using  Primary/Backup Strategy. International Conference on Networks Security,  Wireless Communications and Trusted Computing (NSWCTC 2009), pp. 700-703, Wuhan,  China, 2009 (to appear)

[9].Xiaopu Ma, Ruixuan Li, Zhengding Lu, and Jianfeng  Lu. Global Static Separation of Duty in Multi-domains. The 2009 International  Conference on Multimedia Information NEtworking and Security (MINES 2009), pp.  398-402,Wuhan, China, 2009 (to appear)

[10].LI Rui-xuan, GAO Chang, GU Xi-wu, LU Zheng-ding.  Research on Credit Counting and Risk Evaluation for C2C E-commerce.   Journal on Communications, 2009, 30(7) (Chinese)

[11].Tang Zhuo, Zhao Lin, Li Kenli, and Li Ruixuan. A Dynamic Access Control  Model for Inter-Operation in Multi-Domain Environment Based on Risk. Journal of  Computer Research and Development, 2009, 46(6) (Chinese)

[12].YU Guang-can, LI Rui-xuan, LU Zheng-ding, SONG Wei, TANG Zhuo. Locale-based  Access Control Model in Collaborative Environment. Computer Science, 2009,  36(1): 81-85 (Chinese)