Relationship-based access control for online social networks: Beyond user-to-user relationships Y Cheng, J Park, R Sandhu 2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012 | 112 | 2012 |
A user-to-user relationship-based access control model for online social networks Y Cheng, J Park, R Sandhu Data and Applications Security and Privacy XXVI, 8-24, 2012 | 111 | 2012 |
A User-Activity-Centric Framework for Access Control in Online Social Networks J Park, R Sandhu, Y Cheng Internet Computing, IEEE 15 (5), 62-65, 2011 | 60 | 2011 |
Preserving user privacy from third-party applications in online social networks Y Cheng, J Park, R Sandhu Proceedings of the 22nd International Conference on World Wide Web, 723-728, 2013 | 44 | 2013 |
Attribute-aware relationship-based access control for online social networks Y Cheng, J Park, R Sandhu IFIP Annual Conference on Data and Applications Security and Privacy, 292-306, 2014 | 40 | 2014 |
An access control model for online social networks using user-to-user relationships Y Cheng, J Park, R Sandhu IEEE transactions on dependable and secure computing 13 (4), 424-436, 2015 | 37 | 2015 |
ACON: Activity-Centric Access Control for Social Computing J Park, R Sandhu, Y Cheng Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011 | 28 | 2011 |
Relationship based information sharing control system and method of use JH Park, RS Sandhu, Y Cheng US Patent App. 14/328,682, 2015 | 20 | 2015 |
Extended ReBAC administrative models with cascading revocation and provenance support Y Cheng, K Bijon, R Sandhu Proceedings of the 21st ACM on Symposium on Access Control Models and …, 2016 | 11 | 2016 |
Towards provenance and risk-awareness in social computing Y Cheng, D Nguyen, K Bijon, R Krishnan, J Park, R Sandhu Proceedings of the First International Workshop on Secure and Resilient …, 2012 | 3 | 2012 |
A Performance Comparison of WireGuard and OpenVPN S Mackey, I Mihov, A Nosenko, F Vega, Y Cheng Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 2 | 2020 |
Access control for online social networks using relationship type patterns Y Cheng The University of Texas at San Antonio, 2014 | 2 | 2014 |
Towards a framework for cyber social status based trusted open collaboration J Park, Y Cheng, R Sandhu 6th International Conference on Collaborative Computing: Networking …, 2010 | 2 | 2010 |
An Empirical Analysis on the Usability and Security of Passwords KS Walia, S Shenoy, Y Cheng 2020 IEEE 21st International Conference on Information Reuse and Integration …, 2020 | 1 | 2020 |
A Performance Study on Cryptographic Algorithms for IoT Devices E Anaya, J Patel, P Shah, V Shah, Y Cheng Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 1 | 2020 |
A Modern Implementation of System Call Sequence Based Host-based Intrusion Detection Systems J Byrnes, T Hoang, NN Mehta, Y Cheng 2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020 | | 2020 |
Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log A Liu, S Haidar, Y Cheng, Y Li EAI Endorsed Transactions on Security and Safety 6 (20), 2019 | | 2019 |
What To Do First: Ranking The Mission Impact Graph for Effective Mission Assurance P Appana, X Sun, Y Cheng 2019 International Conference on Computing, Networking and Communications …, 2019 | | 2019 |