Xinwen Zhang
Xinwen Zhang
Hiretual
Dirección de correo verificada de hiretual.com - Página principal
Título
Citado por
Citado por
Año
Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading
S Kosta, A Aucinas, P Hui, R Mortier, X Zhang
2012 Proceedings IEEE Infocom, 945-953, 2012
11592012
Apex: extending android permission model and enforcement with user-defined runtime constraints
M Nauman, S Khan, X Zhang
Proceedings of the 5th ACM symposium on information, computer and …, 2010
7752010
Taming information-stealing smartphone applications (on android)
Y Zhou, X Zhang, X Jiang, VW Freeh
International conference on Trust and trustworthy computing, 93-107, 2011
5362011
PBDM: a flexible delegation model in RBAC
X Zhang, S Oh, R Sandhu
Proceedings of the eighth ACM symposium on Access control models and …, 2003
3662003
Towards an elastic application model for augmenting the computing capabilities of mobile devices with cloud computing
X Zhang, A Kunjithapatham, S Jeong, S Gibbs
Mobile Networks and Applications 16 (3), 270-284, 2011
3332011
Formal model and policy specification of usage control
X Zhang, F Parisi-Presicce, R Sandhu, J Park
ACM Transactions on Information and System Security (TISSEC) 8 (4), 351-387, 2005
2972005
Detecting unauthorized use of computing devices based on behavioral patterns
L Xie, X Zhang, JP Seifert, O Aciicmez, A Latifi
US Patent 8,595,834, 2013
2922013
Mobicloud: A secure mobile cloud framework for pervasive mobile computing and communication
D Huang, X Zhang, M Kang, J Luo
Proceedings of 5th IEEE International Symposium on Service-Oriented System …, 2010
243*2010
Securing elastic applications on mobile devices for cloud computing
X Zhang, J Schiffman, S Gibbs, A Kunjithapatham, S Jeong
Proceedings of the 2009 ACM workshop on Cloud computing security, 127-134, 2009
2192009
Generalized dual-mode data forwarding plane for information-centric network
GQ Wang, R Ravindran, X Zhang
US Patent 8,694,675, 2014
2062014
Peer-to-peer access control architecture using trusted computing technology
R Sandhu, X Zhang
Proceedings of the tenth ACM symposium on Access control models and …, 2005
1992005
Principal-identity-domain based naming scheme for information centric networks
X Zhang, GQ Wang, R Ravindran
US Patent 9,253,087, 2016
1862016
Measurement of particle production and inclusive differential cross sections in collisions at
T Aaltonen, J Adelman, T Akimoto, BÁ González, S Amerio, D Amidei, ...
Physical Review D 79 (11), 112005, 2009
1762009
Virusmeter: Preventing your cellphone from spies
L Liu, G Yan, X Zhang, S Chen
International workshop on recent advances in intrusion detection, 244-264, 2009
1722009
Name-based neighbor discovery and multi-hop service discovery in information-centric networks
X Zhang, B Zhao, A Chakraborti, R Ravindran, GQ Wang
US Patent 9,515,920, 2016
1712016
pBMDS: a behavior-based malware detection system for cellphone devices
L Xie, X Zhang, JP Seifert, S Zhu
Proceedings of the third ACM conference on Wireless network security, 37-48, 2010
1582010
Augmenting name/prefix based routing protocols with trust anchor in information-centric networks
X Zhang, H Xie, R Ravindran, GQ Wang
US Patent 9,009,465, 2015
1512015
Protection of query privacy for continuous location based services
A Pingley, N Zhang, X Fu, HA Choi, S Subramaniam, W Zhao
2011 Proceedings IEEE INFOCOM, 1710-1718, 2011
1432011
Towards a VMM-based usage control framework for OS kernel integrity protection
M Xu, X Jiang, R Sandhu, X Zhang
Proceedings of the 12th ACM symposium on Access control models and …, 2007
1412007
A logical specification for usage control
X Zhang, J Park, F Parisi-Presicce, R Sandhu
Proceedings of the ninth ACM symposium on Access control models and …, 2004
1342004
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20