ROWLBAC: representing role based access control in OWL T Finin, A Joshi, L Kagal, J Niu, R Sandhu, W Winsborough, ... Proceedings of the 13th ACM symposium on Access control models and …, 2008 | 337 | 2008 |
Toward a framework for detecting privacy policy violations in android application code R Slavin, X Wang, MB Hosseini, J Hester, R Krishnan, J Bhatia, ... Proceedings of the 38th International Conference on Software Engineering, 25-36, 2016 | 235 | 2016 |
Guileak: Tracing privacy policy claims on user input data for android applications X Wang, X Qin, MB Hosseini, R Slavin, TD Breaux, J Niu Proceedings of the 40th International Conference on Software Engineering, 37-47, 2018 | 101 | 2018 |
Template semantics for model-based notations J Niu, JM Atlee, NA Day IEEE Transactions on Software Engineering 29 (10), 866-882, 2003 | 68 | 2003 |
Group-centric secure information-sharing models for isolated groups R Krishnan, J Niu, R Sandhu, WH Winsborough ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-29, 2011 | 52 | 2011 |
Foundations for group-centric secure information sharing models R Krishnan, R Sandhu, J Niu, WH Winsborough Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 52 | 2009 |
Deconstructing the semantics of big-step modelling languages S Esmaeilsabzali, NA Day, JM Atlee, J Niu Requirements Engineering 15, 235-265, 2010 | 45 | 2010 |
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule O Chowdhury, A Gampe, J Niu, J von Ronne, J Bennatt, A Datta, L Jia, ... Proceedings of the 18th ACM symposium on Access control models and …, 2013 | 44 | 2013 |
A conceptual framework for group-centric secure information sharing R Krishnan, R Sandhu, J Niu, WH Winsborough Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 44 | 2009 |
Formalize UML 2 sequence diagrams H Shen, A Virani, J Niu 2008 11th IEEE High Assurance Systems Engineering Symposium, 437-440, 2008 | 35 | 2008 |
Towards a framework for group-centric secure collaboration R Krishnan, R Sandhu, J Niu, W Winsborough 2009 5th International Conference on Collaborative Computing: Networking …, 2009 | 31 | 2009 |
Lexical similarity of information type hypernyms, meronyms and synonyms in privacy policies MB Hosseini, S Wadkar, TD Breaux, J Niu 2016 AAAI Fall Symposium Series, 2016 | 28 | 2016 |
Stale-safe security properties for group-based secure information sharing R Krishnan, J Niu, R Sandhu, WH Winsborough Proceedings of the 6th ACM workshop on Formal methods in security …, 2008 | 28 | 2008 |
How does misconfiguration of analytic services compromise mobile privacy? X Zhang, X Wang, R Slavin, T Breaux, J Niu Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 27 | 2020 |
Condysta: Context-aware dynamic supplement to static taint analysis X Zhang, X Wang, R Slavin, J Niu 2021 IEEE Symposium on Security and Privacy (SP), 796-812, 2021 | 23 | 2021 |
Mapping template semantics to SMV Y Lu, JM Atlee, NA Day, J Niu Proceedings. 19th International Conference on Automated Software Engineering …, 2004 | 23 | 2004 |
Managing security requirements patterns using feature diagram hierarchies R Slavin, JM Lehker, J Niu, TD Breaux 2014 IEEE 22nd International Requirements Engineering Conference (RE), 193-202, 2014 | 22 | 2014 |
Monitoring dense-time, continuous-semantics, metric temporal logic K Baldor, J Niu Runtime Verification: Third International Conference, RV 2012, Istanbul …, 2013 | 20 | 2013 |
Panel security and privacy in the age of Internet of Things: Opportunities and challenges J Niu, Y Jin, AJ Lee, R Sandhu, W Xu, X Zhang Proceedings of the 21st ACM on Symposium on Access Control Models and …, 2016 | 18 | 2016 |
Group-centric models for secure and agile information sharing R Sandhu, R Krishnan, J Niu, WH Winsborough Computer Network Security: 5th International Conference on Mathematical …, 2010 | 17 | 2010 |