[1] Xiaopu Ma, Ruixuan Li, Zhengding Lu, Jianfeng Lu, Meng Dong. Specifying and Enforcing the Principle of Least Privilege in Role-Based Access Control. Concurrency and Computation: Practice and Experience, Wiley, 2011, 23(12): 1313–1331
[2] Jianfeng Lu, Ruixuan Li, Jinwei Hu, Dewu Xu. Inconsistency Resolving of Safety and Utility in Access Control. EURASIP Journal on Wireless Communications and Networking, Hindawi Publishing Corporation, 2011:101
[3] Bing Li, Buqing Cao, Kunmei Wen, Ruixuan Li. Trustworthy Assurance of Service Interoperation in Cloud Environment. International Journal of Automation and Computing, 2011, 8(3): 297-308
[4] Yan’an Jin, Ruixuan Li, Kunmei Wen, Xiwu Gu, Fei Xiao. Topic-based ranking in Folksonomy via probabilistic model. Artificial Intelligence Review, Springer, 2011, 36(2): 139-151
[5] Jinwei Hu, Ruixuan Li, Zhengding Lu, Jianfeng Lu, Xiaopu Ma. RAR: A Role-and-Risk Based Flexible Framework for Secure Collaboration. Future Generation Computer Systems, Elsevier, 2011, 27(5): 574-586
[6] Ruixuan Li, Wei Song, Haiying Shen, Weijun Xiao, Zhengding Lu. A Flabellate Overlay Network for Multi-attribute Search. Journal of Parallel and Distributed Computing, Elsevier, 2011, 71(3): 407-423
[7] Ruixuan Li, Kunmei Wen, Xiwu Gu, Yuhua Li, Xiaolin Sun, Bing Li. Type-2 Fuzzy Description Logic. Frontiers of Computer Science in China, Springer, 2011, 5(2): 205-215