Jianwei Niu
Jianwei Niu
Professor of Computer Science, UTSA
Dirección de correo verificada de utsa.edu
TítuloCitado porAño
R OWL BAC: representing role based access control in OWL
T Finin, A Joshi, L Kagal, J Niu, R Sandhu, W Winsborough, ...
Proceedings of the 13th ACM symposium on Access control models and …, 2008
2752008
Toward a framework for detecting privacy policy violations in android application code
R Slavin, X Wang, MB Hosseini, J Hester, R Krishnan, J Bhatia, ...
Proceedings of the 38th International Conference on Software Engineering, 25-36, 2016
672016
Template semantics for model-based notations
J Niu, JM Atlee, NA Day
IEEE Transactions on Software Engineering 29 (10), 866-882, 2003
582003
Foundations for group-centric secure information sharing models
R Krishnan, R Sandhu, J Niu, WH Winsborough
Proceedings of the 14th ACM symposium on Access control models and …, 2009
492009
A conceptual framework for group-centric secure information sharing
R Krishnan, R Sandhu, J Niu, WH Winsborough
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
442009
Group-centric secure information-sharing models for isolated groups
R Krishnan, J Niu, R Sandhu, WH Winsborough
ACM Transactions on Information and System Security (TISSEC) 14 (3), 23, 2011
372011
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule
O Chowdhury, A Gampe, J Niu, J von Ronne, J Bennatt, A Datta, L Jia, ...
Proceedings of the 18th ACM symposium on Access control models and …, 2013
322013
Deconstructing the semantics of big-step modelling languages
S Esmaeilsabzali, NA Day, JM Atlee, J Niu
Requirements Engineering 15 (2), 235-265, 2010
292010
Towards a framework for group-centric secure collaboration
R Krishnan, R Sandhu, J Niu, W Winsborough
2009 5th International Conference on Collaborative Computing: Networking …, 2009
272009
Formalize UML 2 sequence diagrams
H Shen, A Virani, J Niu
2008 11th IEEE High Assurance Systems Engineering Symposium, 437-440, 2008
252008
Formalize UML 2 sequence diagrams
H Shen, A Virani, J Niu
2008 11th IEEE High Assurance Systems Engineering Symposium, 437-440, 2008
252008
Stale-safe security properties for group-based secure information sharing
R Krishnan, J Niu, R Sandhu, WH Winsborough
Proceedings of the 6th ACM workshop on Formal methods in security …, 2008
252008
Mapping template semantics to SMV
Y Lu, JM Atlee, NA Day, J Niu
Proceedings of the 19th IEEE international conference on Automated software …, 2004
222004
Role based access control and OWL
T Finin, A Joshi, L Kagal, J Niu, R Sandhu, WH Winsborough, ...
Proceedings of the fourth OWL: Experiences and Directions Workshop, 2008
212008
Group-centric models for secure and agile information sharing
R Sandhu, R Krishnan, J Niu, WH Winsborough
International Conference on Mathematical Methods, Models, and Architectures …, 2010
172010
Managing security requirements patterns using feature diagram hierarchies
R Slavin, JM Lehker, J Niu, TD Breaux
2014 IEEE 22nd International Requirements Engineering Conference (RE), 193-202, 2014
162014
Apply model checking to security analysis in trust management
M Reith, J Niu, WH Winsborough
2007 IEEE 23rd International Conference on Data Engineering Workshop, 734-743, 2007
152007
Understanding and comparing model-based specification notations
J Niu, JM Atlee, NA Day
Proceedings. 11th IEEE International Requirements Engineering Conference …, 2003
152003
Engineering trust management into software models
M Reith, J Niu, WH Winsborough
Proceedings of the International Workshop on Modeling in Software Engineering, 9, 2007
122007
Toward practical analysis for trust management policy
M Reith, J Niu, WH Winsborough
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
112009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20