Analysis Techniques for Information Security.
Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas W. Reps:
Morgan & Claypool Publishers, 2010.
ASIACCS 2013: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
Kefei Chen, Qi Xie, Weidong Qiu, Ninghui Li, and Wen-Guey Tzeng ACM Press, 2013.
Trust Management: Proceedings of IFIPTM 2009}
Elena Ferrari, Ninghui Li, Elisa Bertino, and Yuecel Karabulut Springer, 2010.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (SACMAT)
Indrashi Ray and Ninghui Li ACM Press, 2008.
Information and Communications Security,
Proceedings of the 8th International Conference (ICICS 2006) Peng Ning, Sihan
Qing, and Ninghui Li LNCS 4307, Springer, 2007.
Papers
2014
PriView: Practical Differentially Private Release of Marginal Contingency Tables
Wahbeh Qardaji, Weining Yang, Ninghui Li
Proceedings of ACM SIGMOD, 2014.
A Study of Probabilistic Password Models
Jerry Ma, Weining Yang, Min Luo, Ninghui Li
Proceedings of IEEE Symposium on Security and Privacy, 2014.
2013
[J31] Understanding Hierarchical Methods for Differentially Private Histograms
Wahbeh Qardaji, Weining Yang, and Ninghui Li PVLDB6(14):1954-1965, September 2013.
[J30] The Foundational work of Harrison-Ruzzo-Ullman Revisited
Mahesh Tripunitara and Ninghui Li IEEE Trans. Dependable Sec. Comput. 10(1): 28-39 (2013)
[C13c]
Membership Privacy: A Unifying Framework For Privacy Definitions
Ninghui Li, Wahbeh Qardaji, Dong Su, Yi Wu, Weining Yang
Proceedings of ACM CCS, 2013.
[C13b]
Differentially Private Grids for Geospatial Data
Wahbeh Qardaji, Weining Yang, Ninghui Li
Proceedings of ICDE, 2013.
[C13a]
Efficient and accurate strategies for differentially-private sliding window queries
Jianneng Cao, Qian Xiao, Gabriel Ghinita, Ninghui Li, Elisa Bertino
Proceedings of EDBT, 2012: pp 191-202.
2012
[J29] PrivBasis: Frequent Itemset Mining with Differential Privacy
Ninghui Li, Wahbeh Qardaji, Dong Su, and Jianneng Cao PVLDB 5(11):1340-1351, (2012)
[J28] Slicing: A New Approach for Privacy Preserving Data Publishing.
Tiancheng Li, Ninghui Li, Jian Zhang, Ian Molloy IEEE Trans. Knowl. Data Eng. 24(3): 561-574 (2012)
[C12h]
CodeShield: Towards Personalized Application Whitelisting
Chris Gates, Ninghui Li, Jing Chen, Robert Proctor
Annual Computer Security Applications Conference (ACSAC) 2012.
[C12g]
Minimizing Private Data Disclosures in the Smart Grid
Weining Yang, Ninghui Li, Yuan Qi, Wahbeh Qardaji, Steven McLaughlin and Patrick McDaniel
ACM Conference on Computer and Communications Security (CCS) 2012.
[C12f]
Using Probabilistic Generative Models For Ranking Risks of Android Apps
Hao Peng, Chris Gates, Bhaskar Sarma, Ninghui Li, Alan Qi, Rahul Potharaju, Cristina Nita-Rotaru and Ian Molloy
ACM Conference on Computer and Communications Security (CCS) 2012.
[C12e]
Anonymizing Network Traces with Temporal Pseudonym Consistency
Wahbeh Qardaji, Ninghui Li
IEEE Workshop on Network Forensics, Security and Privacy (NFSP), held in conjunction with ICDCS 2012.
[C12d]
Android Permissions: A Perspective Combining Risks and Benefits
Bhaskar Sarma, Ninghui Li, Chris Gates, Rahul Potharaju, Cristina Nita-Rotaru and Ian Molloy
ACM Symposium on Access Control Models and Technologies (SACMAT) 2012
[C12c]On Sampling, Anonymization, and Differential Privacy Or, K-Anonymization Meets Differential Privacy
Ninghui Li, Wahbeh Qardaji, Dong Su
ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2012
[C12b] Recursive Partitioning and Summarization: A Practical Framework for Differentially Private Data Publishing
Wahbeh Qardaji, Ninghui Li:
ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2012
[C12a] On Practical Specification and Enforcement of Obligations
Ninghui Li, Haining Chen, Elisa Bertino
ACM Conference on Data and Application Security and Privacy (CODASPY) 2012
2011
[J27] Combining Discretionary Policy with Mandatory Information Flow in Operating Systems.
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang: ACM Trans. Inf. Syst. Secur. 14(3): 24 (2011)
[J26] Fine-grained integration of access control policies.
Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo: Computers & Security. 30(2-3): 91-107 (2011)
[J25] On the Complexity of Authorization in RBAC under Qualification and Security Constraints.
Yuqing Sun, Qihua Wang, Ninghui Li, Elisa Bertino, Mikhail J. Atallah: IEEE Trans. Dependable Sec. Comput. 8(6): 883-897 (2011)
[M03] Security Risk Management Using Incentives.
Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp: IEEE Security & Privacy 9(6): 20-28 (2011)
[C11b] Attack on the GridCode one-time password.
Ian Molloy, Ninghui Li:
ASIACCS 2011: 306-315
[C11a] Beyond Risk-Based Access Control: Towards Incentive-Based Access Control.
Debin Liu, Ninghui Li, XiaoFeng Wang, L. Jean Camp:
Financial Cryptography 2011: 102-112
2010
[J24] Mining Roles with Multiple Objectives.
Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo: ACM Trans. Inf. Syst. Secur. 13(4): 36 (2010)
[J23] Satisfiability and Resiliency in Workflow Authorization Systems.
Qihua Wang, Ninghui Li. ACM Trans. Inf. Syst. Secur. 13(4): 40 (2010)
[J22] Closeness: A New Privacy Measure for Data Publishing.
Ninghui Li, Tiancheng Li, Suresh Venkatasubramanian: IEEE Trans. Knowl. Data Eng. 22(7): 943-956 (2010)
[J21]EXAM: a comprehensive environment for the analysis of access control policies.
Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, and Jorge Lobo Int. J. Inf. Sec. 9(4): 253-273 (2010)
[C10d] Towards analyzing complex operating system access control configurations.
Hong Chen, Ninghui Li, Christopher S. Gates, Ziqing Mao:
SACMAT 2010: 13-22
[C10c] Mining roles with noisy data.
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo, Luke Dickens:
SACMAT 2010: 45-54
[C10b] Nonparametric Bayesian Matrix Factorization by Power-EP.
Nan Ding, Yuan (Alan) Qi, Rongjing Xiang, Ian Molloy, Ninghui Li:
Journal of Machine Learning Research - Proceedings Track 9: 169-176 (2010)
[C10a] Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data.
Graham Cormode, Ninghui Li, Tiancheng Li, Divesh Srivastava: Proceedings of VLDB 3(1): 1045-1056 (2010)
2009
[J16] Towards Formal Verification of Role-Based Access Control Policies
Somesh Jha, Ninghui Li, Mahesh V. Tripunitara, Qihua Wang, and William H. Winsborough IEEE Transactions on Dependable and Secure Computing (TDSC). 5(4):242-255, Oct.-Dec. 2008.
(Paper in PDF)
[J15] Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies
Ninghui Li and Qihua Wang Journal of the ACM (JACM). 55(3), July 2008.
(Paper in PDF) Supercedes [C06f]
[J14] Purpose Based Access Control for Privacy Protection in Relational Database Systems
Ji-won Byun and Ninghui Li
The VLDB Journal, 17(4):603-619, July 2008.
(Paper in PDF)
[J13] Towards optimal k-anonymization
Tiancheng Li and Ninghui Li.
Data and Knowledge Engineering. 23(2): 166-175 (2008)
(Paper in PDF) Supercedes [C06i]
[J12] Algebraic Construction for Zero-Knowledge Sets
Rui Xue, Ninghui Li, and Jiangtao Li
Journal of Computer Science and Technology (JCST) 23(2): 166-175 (2008).
[J20] Automated Trust Negotiation Using Cryptographic Credentials
Jiangtao Li, Ninghui Li, and William H. Winsborough ACM Transactions on Information and System Security (TISSEC), 13(1), (2009)
(Paper in PDF) Supercedes [C05e]
[J19]Resiliency Policies in Access Control
Ninghui Li, Mahesh V. Tripunitara, and Qihua Wang ACM Transactions on Information and Systems Security (TISSEC), 12(4), April 2009.
(Paper in PDF) Supercedes [C06e]
[J18] Denial of Service Attacks and Defenses in Decentralized Trust Management
Jiangtao Li, Ninghui Li, Xiaofeng Wang, and Ting Yu International Journal of Information Security, 8(2):89-101, April 2009.
(Paper in PDF) Supercedes [C06b]
[J17] Privacy Preserving Incremental Data Dissemination
Ji-Won Byun, Tiancheng Li, Elisa Bertino, Ninghui Li, and Yonglak Sohn Journal of Computer Security (JCS), 17(1): 43-68, January 2009.
(Paper in PDF) Supercedes [C06c]
[C09l] On the (In)Security and (Im)Practicality of Outsourcing Precise Association Rule Mining.
Ian Molloy, Ninghui Li, Tiancheng Li: ICDM 2009: 872-877
[C09k] Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging.
Qihua Wang, Hongxia Jin, Ninghui Li: ESORICS 2009: 268-284
[C09j] WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance.
Tiancheng Li, Xiaonan Ma, Ninghui Li:
In ESORICS 2009: 472-488
[C09i] On the Tradeoff Between Privacy and Utility in Data Publishing
Tiancheng Li and Ninghui Li
In 2009 ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD-09), June 2009.
(Paper in PDF)
[C09h] Access Control Policy Combination: Theory Meets Practice
Ninghui Li, Qihua Wang, Wahbeh Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo, Dan Lin
In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT), June 2009.
(Paper in PDF)
[C09g] Trojan Horse Resistant Discretionay Access Control
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT), June 2009.
(Paper in PDF)
[C09f] Evaluating Role Mining Algorithms
Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, Qihua Wang, Jorge Lobo
In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT), June 2009.
(Paper in PDF)
[C09e] An Efficient Framework for User Authorization Query in RBAC Systems
Guneshi Wickramaarachchi, Wahbeh Qardaji, and Ninghui Li
In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT), June 2009.
(Paper in PDF)
[C09d] An Algebra for Fine-Grained Integration of XACML Policies
Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo
In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT),
June 2009.
[C08b] Modeling and Integrating Background Knowledge in Data Anonymization
Tiancheng Li, Ninghui Li, and Jian Zhang
In IEEE International Conference on Data Engineering (ICDE), March 2009.
(Paper in PDF)
[C09b] Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection
Ziqing Mao, Ninghui Li, and Ian Molloy
In Proceedings of the International Conference on Financial Cryptography and Data Security (FC'09), 2009.
(Paper in PDF)
[C09a] Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems
Hong Chen, Ninghui Li and Ziqing Mao
In Proceedings of the Network and Distributed System Security Symposium, February 2009.
(Paper in PDF)
2008
[C08f] On the Security of Delegation in Access Control Systems
Qihua Wang, Ninghui Li, Hong Chen
In Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS), pages 317--332, October 2008.
(Paper in PDF)
[C08e] Access Control Friendly Query Verification for Outsourced Data Publishing
Hong Chen, Xiaonan Ma, Windsor Hsu, Ninghui Li, and Qihua Wang
In Proceedings of the 13th European Symposium on Research in Computer Security (ESORICS), pages 177--191, October 2008.
(Paper in PDF)
[C08d] Mining Roles with Semantic Meanings
Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin Calo, and Jorge Lobo
In Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 21--30,
June 2008.
(Paper in PDF)
[C08c] Policy Decomposition for Collaborative Access Control
Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, and Jorge Lobo
In Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 103--112,
June 2008.
(Paper in PDF)
[C08b] Injector: Mining Background Knowledge for Data Anonymization Tiancheng Li and Ninghui Li
In Proceeings of IEEE International Conference on Data Engineering (ICDE), April 2008.
(Paper in PDF)
[C08a] PRECIP: Practical
and Retrofittable Confidential Information Protection Against Spyware
Surveillance XiaoFeng Wang, Zhuowei Li, Jong Youl Choi, Ninghui Li
In Proceedings of the Network & Distributed System Security Symposium (NDSS), February 2008.
(Paper in PDF)
2007
[J11] On Mutually-Exclusive Roles and Separation of Duty
Ninghui Li, Mahesh V. Tripunitara, and Ziad Bizri ACM Transactions on Information and Systems Security (TISSEC). 10(2), May 2007.
(Paper in PDF) Supercedes [C04e]
[J10] A Theory for Comparing the Expressive Power of Access Control Models
Mahesh V. Tripunitara and Ninghui Li Journal of Computer Security (JCS), 15(2):231--272, March, 2007
(Paper in PDF)
Supercedes [C04d]
[M02] A Critique of the ANSI Standard on Role Based Access Control Ninghui Li, Ji-won Byun, and Elisa Bertino IEEE Security and Privacy. 5(6):41--49, November 2007. (Paper in PDF)
[M01]
A Roadmap for Comprehensive Online Privacy Policy Management
Annie I. Anton, Elisa Bertino, Ninghui Li, and Ting Yu Communications of the ACM. 50(7):109--116, July 2007.
(Paper in PDF)
[C07i] On the Correctness Criteria of Fine-Grained
Access Control in Relational Databases Qihua Wang, Ting Yu, Ninghui Li, Jorge
Lobo, Elisa Bertino, Ji-Won Byun and Keith Irwin
In Proceedings of The 33rd International Conference on Very Large Data
Bases (VLDB 2007),
September 2007.
(Paper in PDF)
[C07h] Satisfiability and Resiliency in Workflow Systems
Qihua Wang and Ninghui Li
In Proceedings of the European Symposium on Research in Computer Security
(ESORICS),
September 2007.
(Paper in PDF)
[C07g] Universal Accumulators with Efficient Nonmembership Proofs
Jiangtai Li, Ninghui Li, and Rui Xue
In International Conference on Applied Cryptography and Network Security
,
June 2007.
(Paper in PDF)
[C07f] Usable Mandatory Integrity Protection for Operating Systems
Ninghui Li, Ziqing Mao, and Hong Chen
In
IEEE Symposium on Security and Privacy,
May 2007.
(Paper in PDF)
[C07e] t-Closeness: Privacy Beyond k-Anonymity
and l-Diversity Ninghui Li, Tiancheng Li, and Suresh
Venkatasubramanian In
International Conference on Data Engineering (ICDE),
April 2007.
(Paper in PDF)
[C07d]
Efficient k-Anonymization using Clustering Techniques
Ji-Won Byun, Ashish Kamra, Elisa Bertino, and Ninghui Li
In
Internal Conference on Database Systems for Advanced Applications (DASFAA),
April 2007.
(Paper in PDF)
[C07c] Administration in Role Based Access Control
Ninghui Li and Ziqing Mao
In
ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS),
March 2007.
(Paper in PDF)
[C07b] Direct Static Enforcement of High-level Policies
Qihua Wang and Ninghui Li
In
ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS),
March 2007.
(Paper in PDF)
[C07a] Dynamic Virtual Credit Card Numbers
Ian Molloy, Jiangtao Li, and Ninghui Li
In
International Conference on Financial Cryptography and Data Security (FC),
February 2007.
(Paper in PDF)
2006
[J09] Security Analysis in Role-Based Access Control
Ninghui Li and Mahesh V. Tripunitara ACM Transactions on Information and System Security (TISSEC), 9(4):391--420, November 2006.
(Paper in PDF) Supercedes [C04b]
[J08] OACerts: Oblivious Attribute Certificates Jiangtao Li and Ninghui Li
IEEE Transactions on Dependable and
Secure Computing (TDSC). Volume 3, Number 4, pp.340-352, October
2006. (Paper in PDF) Supercedes [C05c].
[J06]
Safety in Automated Trust Negotiation
William H. Winsborough and Ninghui Li
ACM Transactions on Information and System Security (TISSEC),
9(3):352--390, August 2006.
(Paper in PDF) Supercedes [C04a].
[J05] Understanding SPKI/SDSI Using
First-Order Logic
Ninghui Li and John C. Mitchell International Journal of Information Security. 5(1):48--64, January 2006.
(Paper in PDF) Supercedes
[C03d]
[C06i] Optimal k-Anonymity with Flexible
Generalization Schemes through Bottom-up Searching Tiancheng Li and Ninghui
Li In IEEE International Workshop on Privacy Aspects of Data
Mining (PADM),
December 2006. (Paper in PDF)
[C06h] An Efficient Oblivious Commitment Based Envelope
Protocol
Jiangtao Li and Ninghui Li
In International Conference on Information and Communications
Security (ICICS),
Decbember 2006.
(Paper in PDF)
[C06g] Distributed Credential Chain Discovery in Trust
Management with Parameterized Roles and Constraints (Short Paper)
Ziqing Mao, Ninghui Li, and William H. Winsborough
In International Conference on Information and Communications
Security (ICICS),
December 2006.
(Paper in PDF)
[C06f] Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies
Ninghui Li and Qihua Wang
In ACM Conference in Computer and Communications Security (CCS),
November 2006.
(Paper in PDF)
[C06e] Resiliency Policies in Access Control Ninghui Li, Mahesh
V. Tripunitara, and Qihua Wang
In ACM Conference in Computer and Communications Security (CCS),
November 2006. (Paper in PDF)
[C06d] Achieving Privacy in Mesh Networks
Xiaoxin Wu and Ninghui Li
In ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN),
October 2006.
(Paper in PDF)
[C06c] Secure Anonymization for Incremental Datasets
Ji-Won Byun, Yonglak Sohn, Elisa Bertino, Ninghui Li
In the Third VLDB Workshop on Secure Data Management (SDM'06), September
2006.
(Paper in PDF)
[C06b] Denial of Service Attacks and Defenses in Decentralized Trust Management
Jiangtao Li, Ninghui Li, Xiaofeng Wang, and Ting Yu In the
Second International Conference on Security and Privacy in Communication
Networks (SecureComm), August 2006.
(Paper in PDF)
[C06a] Constraint Generation for Separation of Duty
Hong Chen and Ninghui Li
In Proceedings of ACM Symposium on Access Control Models and
Technologies (SACMAT),
June 2006.
(Paper in PDF)
2005
[J04]
Beyond Proof-of-compliance: Security Analysis in Trust Management
Ninghui Li, John C. Mitchell, and William H. Winsborough
Journal of the ACM. 52(3):474--514, May 2005.
(Paper in PDF) Supercedes [C03c].
[J03]
Oblivious Signature-Based Envelope
Ninghui Li, Wenliang Du, and Dan Boneh.
Distributed Computing,
special issue of selected papers of PODC 2003.
(Paper in PDF) Supercedes
[C03e]
[H01] Privacy-Preserving Database Systems Elisa
Bertino, Ji-Won Byun, and Ninghui Li In Foundations of Security Analysis
and Design III, FOSAD 2004/2005 Tutorial Lectures, LNCS 3655, Springer, 2005.
(Paper in PDF)
[C05e] Automated Trust Negotiation Using Cryptographic Credentials
Jiangtao Li, Ninghui Li, and William H. Winsborough
In Proceedings of ACM Conference on Computer and Communications Security
(CCS),
November 2005.
(Paper in PDF)
[C05d] Policy-Hiding Access Control in Open Environment (Extended Abstract) Jiangtao Li and Ninghui Li
In Proceedings of ACM Symposium on Principles of Distributed Computing (PODC),
July 2005.
(Paper in PDF)
[C05c] OACerts: Oblivious Attribute Certificates Jiangtao Li and Ninghui Li
In Proceedings of The Third Applied Cryptography and Network Security conference (ACNS),
June 2005.
(Paper in PDF) Superceded by [J07]
[C05b] Purpose Based Access Control of Complex Data for Privacy Protection Ji-Won Byun, Elisa Bertino, and Ninghui Li
In
Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT),
June 2005.
(Paper in PDF)
[C05a] Safety in Discretionary Access Control. Ninghui Li and Mahesh V. Tripunitara
In
Proceedings of IEEE Symposium on Security and Privacy,
May 2005.
(Paper in PDF)
[C04g]
Securing Java RMI-based Distributed Applications
Ninghui Li, John C. Mitchell, and Derrick Tong
In Proceedings of Annual Computer Security Applications Conference (ACSAC),
December 2004.
(Paper in PDF)
[C04f]
A Formal Semantics for P3P
Ting Yu, Ninghui Li, and Annie Anton
In Proceedings of ACM Workshop on Secure Web Services (SWS),
October 2004.
(Paper in PDF)
Superceded by [J10].
[C04e]
On Mutually-Exclusive Roles and Separation of Duty
Ninghui Li, Ziad Bizri, and Mahesh V. Tripunitara
In Proceedings of ACM Conference on Computer and Communications Security (CCS),
October 2004.
(Paper in PDF)
Superceded by [J12].
[C04d]
Comparing the Expressive Power of Access Control Models
Mahesh V. Tripunitara and Ninghui Li
In Proceedings of ACM Conference on Computer and Communications Security (CCS),
October 2004.
(Paper in PDF)
Superceded by [J09]
[C04c] A Framework for Role-Based Access Control in Group Communication Systems
Cristina Nita-Rotaru and Ninghui Li
In Proceedings of 2004 International Workshop on Security in Parallel and Distributed Systems,
September 2004. (Paper in PDF)
[C04b]
Security Analysis in Role-Based Access Control.
Ninghui Li and Mahesh V. Tripunitara.
In Proceedings of the Ninth ACM Symposium on Access Control Models and Techniques (SACMAT 2004), June 2004.
(Paper in PDF)
Superceded by [J09].
[C04a]
Safety in Automated Trust Negotiation.
William H. Winsborough and Ninghui Li.
In Proceedings of IEEE Symposium on Security and Privacy, May 2004.
(Paper in PDF)
Superceded by [J06].
[C03e]
Oblivious Signature-Based Envelope.
Ninghui Li, Wenliang Du, and Dan Boneh.
In Proceedings of the 22nd ACM Symposium on Principles of Distributed
Computing (PODC 2003),
Boston, Massachusetts, July 2003. ACM Press, New York, New York, pp. 182--189.
(Paper in PDF)
Superceded by [J03].
[C03d]
Understanding SPKI/SDSI
Using First-Order Logic Ninghui Li and John C. Mitchell.
In Proceedings of the 16th IEEE Computer Security Foundations Workshop,
Pacific Grove, California, June 2003. IEEE Computer Society Press,
Los Alamitos, California, pp. 89--103.
(Paper in PDF)
Superceded by [J05].
[C03b]
RT: A Role-based Trust-management
Framework.
Ninghui Li and John C. Mitchell.
In Proceedings of The Third DARPA Information Survivability Conference and
Exposition (DISCEX III), Washington, D.C., April 2003.
IEEE Computer Society Press,
Los Alamitos, California, pp. 201--212.
(Paper in PDF)
[C02b]
Towards Practical Automated
Trust Negotiation.
William H. Winsborough and Ninghui Li.
In Proceedings of the Third International Workshop on Policies for
Distributed Systems and Networks (POLICY 2002), Monterey, California,
June 2002. IEEE Computer Society Press, Los Alamitos, California,
pp. 92-103.
(Paper in PDF)
[C01b]
Distributed Credential Chain
Discovery in Trust Management (Extended Abstract).
Ninghui Li, William H. Winsborough, and John C. Mitchell.
In Proceedings of the 8th ACM Conference on Computer and
Communications Security (CCS-8),
Philadelphia,
Pennsylvania, November 2001. ACM Press, New York, New York,
pp. 156-165.
Superseded by [J2].
[C00b]
Local Names In SPKI/SDSI.
Ninghui Li.
In Proceedings of the 13th IEEE Computer Security Foundations
Workshop (CSFW-13), Cambridge, UK, July 2000. IEEE Computer
Society Press, Los Alamitos, California, pp. 2-15.
(Paper in PDF)
[C00a]
A Practically Implementable and
Tractable Delegation Logic.
Ninghui Li, Benjamin N. Grosof, and Joan Feigenbaum.
In Proceedings of the 2000 IEEE Symposium on Security and Privacy,
Berkeley, California, May 2000. IEEE Computer Society Press, Los Alamitos,
California, pp. 27-42.
Superseded by [J1].