BibTeX records: Xinwen Zhang

download as .bib file

@inproceedings{DBLP:conf/cikm/LuoZWZ19,
  author    = {Yong Luo and
               Huaizheng Zhang and
               Yonggang Wen and
               Xinwen Zhang},
  title     = {ResumeGAN: An Optimized Deep Representation Learning Framework for
               Talent-Job Fit via Adversarial Learning},
  booktitle = {Proceedings of the 28th {ACM} International Conference on Information
               and Knowledge Management, {CIKM} 2019, Beijing, China, November 3-7,
               2019.},
  pages     = {1101--1110},
  year      = {2019},
  crossref  = {DBLP:conf/cikm/2019},
  url       = {https://doi.org/10.1145/3357384.3357899},
  doi       = {10.1145/3357384.3357899},
  timestamp = {Mon, 04 Nov 2019 11:08:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cikm/LuoZWZ19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuLWOZ18,
  author    = {Han Hu and
               Yong Luo and
               Yonggang Wen and
               Yew{-}Soon Ong and
               Xinwen Zhang},
  title     = {How to Find a Perfect Data Scientist: {A} Distance-Metric Learning
               Approach},
  journal   = {{IEEE} Access},
  volume    = {6},
  pages     = {60380--60395},
  year      = {2018},
  url       = {https://doi.org/10.1109/ACCESS.2018.2870535},
  doi       = {10.1109/ACCESS.2018.2870535},
  timestamp = {Sat, 01 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/access/HuLWOZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/ZhangWZ18,
  author    = {Weiwen Zhang and
               Yonggang Wen and
               Xinwen Zhang},
  title     = {Towards Virus Scanning as a Service in Mobile Cloud Computing: Energy-Efficient
               Dispatching Policy Under N-Version Protection},
  journal   = {{IEEE} Trans. Emerging Topics Comput.},
  volume    = {6},
  number    = {1},
  pages     = {122--134},
  year      = {2018},
  url       = {https://doi.org/10.1109/TETC.2015.2471852},
  doi       = {10.1109/TETC.2015.2471852},
  timestamp = {Fri, 23 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tetc/ZhangWZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/LuoZWWZ18,
  author    = {Yong Luo and
               Huaizheng Zhang and
               Yongjie Wang and
               Yonggang Wen and
               Xinwen Zhang},
  title     = {ResumeNet: {A} Learning-Based Framework for Automatic Resume Quality
               Assessment},
  booktitle = {{IEEE} International Conference on Data Mining, {ICDM} 2018, Singapore,
               November 17-20, 2018},
  pages     = {307--316},
  year      = {2018},
  crossref  = {DBLP:conf/icdm/2018},
  url       = {https://doi.org/10.1109/ICDM.2018.00046},
  doi       = {10.1109/ICDM.2018.00046},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdm/LuoZWWZ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-02832,
  author    = {Yong Luo and
               Huaizheng Zhang and
               Yongjie Wang and
               Yonggang Wen and
               Xinwen Zhang},
  title     = {ResumeNet: {A} Learning-based Framework for Automatic Resume Quality
               Assessment},
  journal   = {CoRR},
  volume    = {abs/1810.02832},
  year      = {2018},
  url       = {http://arxiv.org/abs/1810.02832},
  archivePrefix = {arXiv},
  eprint    = {1810.02832},
  timestamp = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1810-02832},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiSZX17,
  author    = {Qi Li and
               Ravi Sandhu and
               Xinwen Zhang and
               Mingwei Xu},
  title     = {Mandatory Content Access Control for Privacy Protection in Information
               Centric Networks},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {14},
  number    = {5},
  pages     = {494--506},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2494049},
  doi       = {10.1109/TDSC.2015.2494049},
  timestamp = {Wed, 24 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tdsc/LiSZX17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/GuLZSZF16,
  author    = {Yacong Gu and
               Qi Li and
               Hongtao Zhang and
               Purui Su and
               Xinwen Zhang and
               Dengguo Feng},
  title     = {Direct Resource Hijacking in Android},
  journal   = {{IEEE} Internet Computing},
  volume    = {20},
  number    = {5},
  pages     = {46--56},
  year      = {2016},
  url       = {https://doi.org/10.1109/MIC.2015.138},
  doi       = {10.1109/MIC.2015.138},
  timestamp = {Wed, 24 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/internet/GuLZSZF16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apweb/LiZYS16,
  author    = {Huakang Li and
               Xinwen Zhang and
               Yitao Yang and
               Guozi Sun},
  title     = {A Demonstration of Encrypted Logistics Information System},
  booktitle = {Web Technologies and Applications - 18th Asia-Pacific Web Conference,
               APWeb 2016, Suzhou, China, September 23-25, 2016. Proceedings, Part
               {II}},
  pages     = {525--528},
  year      = {2016},
  crossref  = {DBLP:conf/apweb/2016-2},
  url       = {https://doi.org/10.1007/978-3-319-45817-5\_57},
  doi       = {10.1007/978-3-319-45817-5\_57},
  timestamp = {Thu, 07 Nov 2019 15:14:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/apweb/LiZYS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangLYSC16,
  author    = {Xinwen Zhang and
               Huakang Li and
               Yitao Yang and
               Guozi Sun and
               Guangxuan Chen},
  title     = {{LIPPS:} Logistics Information Privacy Protection System Based on
               Encrypted {QR} Code},
  booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
               2016},
  pages     = {996--1000},
  year      = {2016},
  crossref  = {DBLP:conf/trustcom/2016},
  url       = {https://doi.org/10.1109/TrustCom.2016.0167},
  doi       = {10.1109/TrustCom.2016.0167},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/ZhangLYSC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scientometrics/AnLYZ15,
  author    = {Lu An and
               Xia Lin and
               Chuanming Yu and
               Xinwen Zhang},
  title     = {Measuring and visualizing the contributions of Chinese and American
               {LIS} research institutions to emerging themes and salient themes},
  journal   = {Scientometrics},
  volume    = {105},
  number    = {3},
  pages     = {1605--1634},
  year      = {2015},
  url       = {https://doi.org/10.1007/s11192-015-1640-4},
  doi       = {10.1007/s11192-015-1640-4},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scientometrics/AnLYZ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiZZS15,
  author    = {Qi Li and
               Xinwen Zhang and
               Xin Zhang and
               Purui Su},
  title     = {Invalidating Idealized {BGP} Security Proposals and Countermeasures},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {12},
  number    = {3},
  pages     = {298--311},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2345381},
  doi       = {10.1109/TDSC.2014.2345381},
  timestamp = {Wed, 24 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tdsc/LiZZS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MohaisenMZXK15,
  author    = {Aziz Mohaisen and
               Hesham Mekky and
               Xinwen Zhang and
               Haiyong Xie and
               Yongdae Kim},
  title     = {Timing Attacks on Access Privacy in Information Centric Networks and
               Countermeasures},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {12},
  number    = {6},
  pages     = {675--687},
  year      = {2015},
  url       = {https://doi.org/10.1109/TDSC.2014.2382592},
  doi       = {10.1109/TDSC.2014.2382592},
  timestamp = {Tue, 27 Mar 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tdsc/MohaisenMZXK15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZZSF15,
  author    = {Qi Li and
               Xinwen Zhang and
               Qingji Zheng and
               Ravi Sandhu and
               Xiaoming Fu},
  title     = {{LIVE:} Lightweight Integrity Verification and Content Access Control
               for Named Data Networking},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {10},
  number    = {2},
  pages     = {308--320},
  year      = {2015},
  url       = {https://doi.org/10.1109/TIFS.2014.2365742},
  doi       = {10.1109/TIFS.2014.2365742},
  timestamp = {Mon, 29 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/LiZZSF15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/XuZWS15,
  author    = {Lei Xu and
               Xinwen Zhang and
               Xiaoxin Wu and
               Weidong Shi},
  title     = {{ABSS:} An Attribute-based Sanitizable Signature for Integrity of
               Outsourced Database with Public Cloud},
  booktitle = {Proceedings of the 5th {ACM} Conference on Data and Application Security
               and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages     = {167--169},
  year      = {2015},
  crossref  = {DBLP:conf/codaspy/2015},
  url       = {https://doi.org/10.1145/2699026.2699135},
  doi       = {10.1145/2699026.2699135},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/XuZWS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ZhangZOCEJ15,
  author    = {Su Zhang and
               Xinwen Zhang and
               Xinming Ou and
               Liqun Chen and
               Nigel Edwards and
               Jing Jin},
  title     = {Assessing Attack Surface with Component-Based Package Dependency},
  booktitle = {Network and System Security - 9th International Conference, {NSS}
               2015, New York, NY, USA, November 3-5, 2015, Proceedings},
  pages     = {405--417},
  year      = {2015},
  crossref  = {DBLP:conf/nss/2015},
  url       = {https://doi.org/10.1007/978-3-319-25645-0\_29},
  doi       = {10.1007/978-3-319-25645-0\_29},
  timestamp = {Tue, 14 May 2019 10:00:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nss/ZhangZOCEJ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangERZNXZA15,
  author    = {Ruowen Wang and
               William Enck and
               Douglas S. Reeves and
               Xinwen Zhang and
               Peng Ning and
               Dingbang Xu and
               Wu Zhou and
               Ahmed M. Azab},
  title     = {EASEAndroid: Automatic Policy Analysis and Refinement for Security
               Enhanced Android via Large-Scale Semi-Supervised Learning},
  booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
               D.C., USA, August 12-14, 2015.},
  pages     = {351--366},
  year      = {2015},
  crossref  = {DBLP:conf/uss/2015},
  url       = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wang-ruowen},
  timestamp = {Mon, 18 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/uss/WangERZNXZA15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taas/ChenLWZZ14,
  author    = {Songqing Chen and
               Lei Liu and
               Xinyuan Wang and
               Xinwen Zhang and
               Zhao Zhang},
  title     = {A Host-Based Approach for Unknown Fast-Spreading Worm Detection and
               Containment},
  journal   = {{TAAS}},
  volume    = {8},
  number    = {4},
  pages     = {21:1--21:18},
  year      = {2014},
  url       = {https://doi.org/10.1145/2555615},
  doi       = {10.1145/2555615},
  timestamp = {Fri, 01 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/taas/ChenLWZZ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/ZhangSA14,
  author    = {Xinwen Zhang and
               Jean{-}Pierre Seifert and
               Onur Acii{\c{c}}mez},
  title     = {Design and Implementation of Efficient Integrity Protection for Open
               Mobile Platforms},
  journal   = {{IEEE} Trans. Mob. Comput.},
  volume    = {13},
  number    = {1},
  pages     = {188--201},
  year      = {2014},
  url       = {https://doi.org/10.1109/TMC.2012.232},
  doi       = {10.1109/TMC.2012.232},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tmc/ZhangSA14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhengZZZ14,
  author    = {Qingji Zheng and
               Wei Zhu and
               Jiafeng Zhu and
               Xinwen Zhang},
  title     = {Improved anonymous proxy re-encryption with {CCA} security},
  booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages     = {249--258},
  year      = {2014},
  crossref  = {DBLP:conf/ccs/2014asia},
  url       = {https://doi.org/10.1145/2590296.2590322},
  doi       = {10.1145/2590296.2590322},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ZhengZZZ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangZO14,
  author    = {Su Zhang and
               Xinwen Zhang and
               Xinming Ou},
  title     = {After we knew it: empirical study and modeling of cost-effectiveness
               of exploiting prevalent known vulnerabilities across IaaS cloud},
  booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages     = {317--328},
  year      = {2014},
  crossref  = {DBLP:conf/ccs/2014asia},
  url       = {https://doi.org/10.1145/2590296.2590300},
  doi       = {10.1145/2590296.2590300},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ZhangZO14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HeZK13,
  author    = {Xingze He and
               Xinwen Zhang and
               C.{-}C. Jay Kuo},
  title     = {A Distortion-Based Approach to Privacy-Preserving Metering in Smart
               Grids},
  journal   = {{IEEE} Access},
  volume    = {1},
  pages     = {67--78},
  year      = {2013},
  url       = {https://doi.org/10.1109/ACCESS.2013.2260815},
  doi       = {10.1109/ACCESS.2013.2260815},
  timestamp = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/access/HeZK13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/JinCZZ13,
  author    = {Hai Jin and
               Ge Cheng and
               Deqing Zou and
               Xinwen Zhang},
  title     = {Cherub: Fine-grained application protection with on-demand virtualization},
  journal   = {Computers {\&} Mathematics with Applications},
  volume    = {65},
  number    = {9},
  pages     = {1326--1338},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.camwa.2012.02.001},
  doi       = {10.1016/j.camwa.2012.02.001},
  timestamp = {Thu, 24 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cma/JinCZZ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/AlamZNAAAA13,
  author    = {Masoom Alam and
               Xinwen Zhang and
               Mohammad Nauman and
               Tamleek Ali and
               Muhammad Ali and
               Sajid Anwar and
               Quratulain Alam},
  title     = {Behavioral Attestation for Web Services using access policies},
  journal   = {Multimedia Tools Appl.},
  volume    = {66},
  number    = {2},
  pages     = {283--302},
  year      = {2013},
  url       = {https://doi.org/10.1007/s11042-011-0770-9},
  doi       = {10.1007/s11042-011-0770-9},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/mta/AlamZNAAAA13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhouZJ13,
  author    = {Wu Zhou and
               Xinwen Zhang and
               Xuxian Jiang},
  title     = {AppInk: watermarking android apps for repackaging deterrence},
  booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages     = {1--12},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013asia},
  url       = {https://doi.org/10.1145/2484313.2484315},
  doi       = {10.1145/2484313.2484315},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ZhouZJ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MohaisenZSXK13,
  author    = {Abedelaziz Mohaisen and
               Xinwen Zhang and
               Max Schuchard and
               Haiyong Xie and
               Yongdae Kim},
  title     = {Protecting access privacy of cached contents in information centric
               networks},
  booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages     = {173--178},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013asia},
  url       = {https://doi.org/10.1145/2484313.2484335},
  doi       = {10.1145/2484313.2484335},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/MohaisenZSXK13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudnet/RavindranLCZW13,
  author    = {Ravishankar Ravindran and
               Xuan Liu and
               Asit Chakraborti and
               Xinwen Zhang and
               Guoqiang Wang},
  title     = {Towards software defined {ICN} based edge-cloud services},
  booktitle = {{IEEE} 2nd International Conference on Cloud Networking, CloudNet
               2013, San Francisco, CA, USA, November 11-13, 2013},
  pages     = {227--235},
  year      = {2013},
  crossref  = {DBLP:conf/cloudnet/2013},
  url       = {https://doi.org/10.1109/CloudNet.2013.6710583},
  doi       = {10.1109/CloudNet.2013.6710583},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cloudnet/RavindranLCZW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/XiongZZY13,
  author    = {Huijun Xiong and
               Qingji Zheng and
               Xinwen Zhang and
               Danfeng Yao},
  title     = {CloudSafe: Securing data processing within vulnerable virtualization
               environments in the cloud},
  booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
               National Harbor, MD, USA, October 14-16, 2013},
  pages     = {172--180},
  year      = {2013},
  crossref  = {DBLP:conf/cns/2013},
  url       = {https://doi.org/10.1109/CNS.2013.6682705},
  doi       = {10.1109/CNS.2013.6682705},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cns/XiongZZY13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/RavindranBZCW13,
  author    = {Ravishankar Ravindran and
               Trisha Biswas and
               Xinwen Zhang and
               Asit Chakraborti and
               Guoqiang Wang},
  title     = {Information-centric networking based homenet},
  booktitle = {2013 {IFIP/IEEE} International Symposium on Integrated Network Management
               {(IM} 2013), Ghent, Belgium, May 27-31, 2013},
  pages     = {1102--1108},
  year      = {2013},
  crossref  = {DBLP:conf/im/2013},
  url       = {http://ieeexplore.ieee.org/document/6573146/},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/im/RavindranBZCW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/WangLCSZZ13,
  author    = {Shangping Wang and
               Lihua Liu and
               Juanjuan Chen and
               Jin Sun and
               Xinwen Zhang and
               Yaling Zhang},
  title     = {Lattice-Based Multi-party Concurrent Signatures Scheme},
  booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative
               Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages     = {568--572},
  year      = {2013},
  crossref  = {DBLP:conf/incos/2013},
  url       = {https://doi.org/10.1109/INCoS.2013.105},
  doi       = {10.1109/INCoS.2013.105},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/incos/WangLCSZZ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/BiswasCRZW13,
  author    = {Trisha Biswas and
               Asit Chakraborti and
               Ravishankar Ravindran and
               Xinwen Zhang and
               Guoqiang Wang},
  title     = {Contextualized information-centric home network},
  booktitle = {{ACM} {SIGCOMM} 2013 Conference, SIGCOMM'13, Hong Kong, China, August
               12-16, 2013},
  pages     = {461--462},
  year      = {2013},
  crossref  = {DBLP:conf/sigcomm/2013},
  url       = {https://doi.org/10.1145/2486001.2491691},
  doi       = {10.1145/2486001.2491691},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/BiswasCRZW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/WuZASX13,
  author    = {Ruoyu Wu and
               Xinwen Zhang and
               Gail{-}Joon Ahn and
               Hadi Sharifi and
               Haiyong Xie},
  title     = {ACaaS: Access Control as a Service for IaaS Cloud},
  booktitle = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom
               2013, Washington, DC, USA, 8-14 September, 2013},
  pages     = {423--428},
  year      = {2013},
  crossref  = {DBLP:conf/socialcom/2013},
  url       = {https://doi.org/10.1109/SocialCom.2013.66},
  doi       = {10.1109/SocialCom.2013.66},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/socialcom/WuZASX13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/displays/ZhangWJWWH12,
  author    = {Xinwen Zhang and
               Zhaoxin Wu and
               Bo Jiao and
               Dongdong Wang and
               Dawei Wang and
               Xun Hou},
  title     = {White organic light-emitting devices with a solution-processed small
               molecular emission layer},
  journal   = {Displays},
  volume    = {33},
  number    = {3},
  pages     = {129--132},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.displa.2012.03.004},
  doi       = {10.1016/j.displa.2012.03.004},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/displays/ZhangWJWWH12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/BanuriAKMAKYTAAZ12,
  author    = {Hammad Banuri and
               Masoom Alam and
               Shahryar Khan and
               Jawad Manzoor and
               Bahar Ali and
               Yasar Khan and
               Mohsin Yaseen and
               Mir Nauman Tahir and
               Tamleek Ali and
               Quratulain Alam and
               Xinwen Zhang},
  title     = {An Android runtime security policy enforcement framework},
  journal   = {Personal and Ubiquitous Computing},
  volume    = {16},
  number    = {6},
  pages     = {631--641},
  year      = {2012},
  url       = {https://doi.org/10.1007/s00779-011-0437-6},
  doi       = {10.1007/s00779-011-0437-6},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/puc/BanuriAKMAKYTAAZ12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuZHAS12,
  author    = {Wenjuan Xu and
               Xinwen Zhang and
               Hongxin Hu and
               Gail{-}Joon Ahn and
               Jean{-}Pierre Seifert},
  title     = {Remote Attestation with Domain-Based Integrity Model and Policy Analysis},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {9},
  number    = {3},
  pages     = {429--442},
  year      = {2012},
  url       = {https://doi.org/10.1109/TDSC.2011.61},
  doi       = {10.1109/TDSC.2011.61},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tdsc/XuZHAS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiXWZLX12,
  author    = {Qi Li and
               Mingwei Xu and
               Jianping Wu and
               Xinwen Zhang and
               Patrick P. C. Lee and
               Ke Xu},
  title     = {Enhancing the Trust of Internet Routing With Lightweight Route Attestation},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {7},
  number    = {2},
  pages     = {691--703},
  year      = {2012},
  url       = {https://doi.org/10.1109/TIFS.2011.2177822},
  doi       = {10.1109/TIFS.2011.2177822},
  timestamp = {Wed, 24 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/LiXWZLX12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/RavindranWZC12,
  author    = {Ravishankar Ravindran and
               Guoqiang Wang and
               Xinwen Zhang and
               Asit Chakraborti},
  title     = {Supporting dual-mode forwarding in content-centric network},
  booktitle = {{IEEE} International Conference on Advanced Networks and Telecommuncations
               Systems, {ANTS} 2012, Bangalore, India, 16-19 December, 2012},
  pages     = {55--60},
  year      = {2012},
  crossref  = {DBLP:conf/IEEEants/2012},
  url       = {https://doi.org/10.1109/ANTS.2012.6524228},
  doi       = {10.1109/ANTS.2012.6524228},
  timestamp = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEants/RavindranWZC12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuWZ12,
  author    = {Lei Xu and
               Xiaoxin Wu and
               Xinwen Zhang},
  title     = {{CL-PRE:} a certificateless proxy re-encryption scheme for secure
               data sharing with public cloud},
  booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security,
               {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages     = {87--88},
  year      = {2012},
  crossref  = {DBLP:conf/ccs/2012asia},
  url       = {https://doi.org/10.1145/2414456.2414507},
  doi       = {10.1145/2414456.2414507},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/XuWZ12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MohaisenZSXK12,
  author    = {Abedelaziz Mohaisen and
               Xinwen Zhang and
               Max Schuchard and
               Haiyong Xie and
               Yongdae Kim},
  title     = {Protecting access privacy of cached contents in information centric
               networks},
  booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  pages     = {1001--1003},
  year      = {2012},
  crossref  = {DBLP:conf/ccs/2012},
  url       = {https://doi.org/10.1145/2382196.2382305},
  doi       = {10.1145/2382196.2382305},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/MohaisenZSXK12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangD12,
  author    = {Xinwen Zhang and
               Xuhua Ding},
  title     = {{STC} 2012: the seventh {ACM} workshop on scalable trusted computing},
  booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  pages     = {1058--1059},
  year      = {2012},
  crossref  = {DBLP:conf/ccs/2012},
  url       = {https://doi.org/10.1145/2382196.2382328},
  doi       = {10.1145/2382196.2382328},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ZhangD12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/ShiLSWZ12,
  author    = {Weidong Shi and
               Jong{-}Hyuk Lee and
               Taeweon Suh and
               Dong Hyuk Woo and
               Xinwen Zhang},
  title     = {Architectural support of multiple hypervisors over single platform
               for enhancing cloud computing security},
  booktitle = {Proceedings of the Computing Frontiers Conference, CF'12, Caligari,
               Italy - May 15 - 17, 2012},
  pages     = {75--84},
  year      = {2012},
  crossref  = {DBLP:conf/cf/2012},
  url       = {https://doi.org/10.1145/2212908.2212920},
  doi       = {10.1145/2212908.2212920},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cf/ShiLSWZ12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/XiongZYWW12,
  author    = {Huijun Xiong and
               Xinwen Zhang and
               Danfeng Yao and
               Xiaoxin Wu and
               Yonggang Wen},
  title     = {Towards end-to-end secure content storage and delivery with public
               cloud},
  booktitle = {Second {ACM} Conference on Data and Application Security and Privacy,
               {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages     = {257--266},
  year      = {2012},
  crossref  = {DBLP:conf/codaspy/2012},
  url       = {https://doi.org/10.1145/2133601.2133633},
  doi       = {10.1145/2133601.2133633},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/XiongZYWW12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/RavindranLZW12,
  author    = {Ravishankar Ravindran and
               Samantha Lo and
               Xinwen Zhang and
               Guoqiang Wang},
  title     = {Supporting seamless mobility in named data networking},
  booktitle = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  pages     = {5854--5869},
  year      = {2012},
  crossref  = {DBLP:conf/icc/2012},
  url       = {https://doi.org/10.1109/ICC.2012.6364701},
  doi       = {10.1109/ICC.2012.6364701},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icc/RavindranLZW12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/KostaAHMZ12,
  author    = {Sokol Kosta and
               Andrius Aucinas and
               Pan Hui and
               Richard Mortier and
               Xinwen Zhang},
  title     = {ThinkAir: Dynamic resource allocation and parallel execution in the
               cloud for mobile code offloading},
  booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
               25-30, 2012},
  pages     = {945--953},
  year      = {2012},
  crossref  = {DBLP:conf/infocom/2012},
  url       = {https://doi.org/10.1109/INFCOM.2012.6195845},
  doi       = {10.1109/INFCOM.2012.6195845},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/KostaAHMZ12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiuZYC12,
  author    = {Lei Liu and
               Xinwen Zhang and
               Guanhua Yan and
               Songqing Chen},
  title     = {Chrome Extensions: Threat Analysis and Countermeasures},
  booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS}
               2012, San Diego, California, USA, February 5-8, 2012},
  year      = {2012},
  crossref  = {DBLP:conf/ndss/2012},
  url       = {https://www.ndss-symposium.org/ndss2012/chrome-extensions-threat-analysis-and-countermeasures},
  timestamp = {Fri, 01 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/LiuZYC12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/petra/ZhuZZLL12,
  author    = {Jiafeng Zhu and
               Jingji Zheng and
               Xinwen Zhang and
               Zhengyi Le and
               Min Luo},
  title     = {On-demand security service},
  booktitle = {The 5th International Conference on PErvasive Technologies Related
               to Assistive Environments, {PETRA} 2012, Heraklion, Crete, Greece,
               June 6-9, 2012},
  pages     = {7},
  year      = {2012},
  crossref  = {DBLP:conf/petra/2012},
  url       = {https://doi.org/10.1145/2413097.2413106},
  doi       = {10.1145/2413097.2413106},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/petra/ZhuZZLL12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QinHZ12a,
  author    = {Yang Qin and
               Dijiang Huang and
               Xinwen Zhang},
  title     = {VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks},
  booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2012, Liverpool, United
               Kingdom, June 25-27, 2012},
  pages     = {1438--1445},
  year      = {2012},
  crossref  = {DBLP:conf/trustcom/2012},
  url       = {https://doi.org/10.1109/TrustCom.2012.16},
  doi       = {10.1109/TrustCom.2012.16},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/QinHZ12a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2012,
  editor    = {Stefan Katzenbeisser and
               Edgar R. Weippl and
               L. Jean Camp and
               Melanie Volkamer and
               Mike K. Reiter and
               Xinwen Zhang},
  title     = {Trust and Trustworthy Computing - 5th International Conference, {TRUST}
               2012, Vienna, Austria, June 13-15, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7344},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-30921-2},
  doi       = {10.1007/978-3-642-30921-2},
  isbn      = {978-3-642-30920-5},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1206-3717,
  author    = {Qingji Zheng and
               Xinwen Zhang},
  title     = {Multiparty Cloud Computation},
  journal   = {CoRR},
  volume    = {abs/1206.3717},
  year      = {2012},
  url       = {http://arxiv.org/abs/1206.3717},
  archivePrefix = {arXiv},
  eprint    = {1206.3717},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1206-3717},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JinAHCZ11,
  author    = {Jing Jin and
               Gail{-}Joon Ahn and
               Hongxin Hu and
               Michael J. Covington and
               Xinwen Zhang},
  title     = {Patient-centric authorization framework for electronic healthcare
               services},
  journal   = {Computers {\&} Security},
  volume    = {30},
  number    = {2-3},
  pages     = {116--127},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.cose.2010.09.001},
  doi       = {10.1016/j.cose.2010.09.001},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/JinAHCZ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/ZhangKJG11,
  author    = {Xinwen Zhang and
               Anugeetha Kunjithapatham and
               Sangoh Jeong and
               Simon Gibbs},
  title     = {Towards an Elastic Application Model for Augmenting the Computing
               Capabilities of Mobile Devices with Cloud Computing},
  journal   = {{MONET}},
  volume    = {16},
  number    = {3},
  pages     = {270--284},
  year      = {2011},
  url       = {https://doi.org/10.1007/s11036-011-0305-7},
  doi       = {10.1007/s11036-011-0305-7},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/monet/ZhangKJG11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/XuWZ11,
  author    = {Min Xu and
               Duminda Wijesekera and
               Xinwen Zhang},
  title     = {Runtime Administration of an {RBAC} Profile for {XACML}},
  journal   = {{IEEE} Trans. Services Computing},
  volume    = {4},
  number    = {4},
  pages     = {286--299},
  year      = {2011},
  url       = {https://doi.org/10.1109/TSC.2010.27},
  doi       = {10.1109/TSC.2010.27},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tsc/XuWZ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/RavindranWZ11,
  author    = {Ravishankar Ravindran and
               Guoqiang Wang and
               Xinwen Zhang},
  title     = {Towards Secure Mobile Virtual Group in information-centric network},
  booktitle = {Fifth {IEEE} International Conference on Advanced Telecommunication
               Systems and Networks, {ANTS} 2011, December 18-21, 2011 Bengaluru,
               India},
  pages     = {1--3},
  year      = {2011},
  crossref  = {DBLP:conf/IEEEants/2011},
  url       = {https://doi.org/10.1109/ANTS.2011.6163663},
  doi       = {10.1109/ANTS.2011.6163663},
  timestamp = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEants/RavindranWZ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiXWZLX11,
  author    = {Qi Li and
               Mingwei Xu and
               Jianping Wu and
               Xinwen Zhang and
               Patrick P. C. Lee and
               Ke Xu},
  title     = {Enhancing the trust of internet routing with lightweight route attestation},
  booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
               2011},
  pages     = {92--101},
  year      = {2011},
  crossref  = {DBLP:conf/ccs/2011asia},
  url       = {https://doi.org/10.1145/1966913.1966927},
  doi       = {10.1145/1966913.1966927},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/LiXWZLX11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WuXZ11,
  author    = {Xiaoxin Wu and
               Lei Xu and
               Xinwen Zhang},
  title     = {Poster: a certificateless proxy re-encryption scheme for cloud-based
               data sharing},
  booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications
               Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages     = {869--872},
  year      = {2011},
  crossref  = {DBLP:conf/ccs/2011},
  url       = {https://dl.acm.org/citation.cfm?id=2093514},
  timestamp = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/WuXZ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/ZhangCXWSW11,
  author    = {Xinwen Zhang and
               Katharine Chang and
               Huijun Xiong and
               Yonggang Wen and
               Guangyu Shi and
               Guoqiang Wang},
  title     = {Towards name-based trust and security for content-centric network},
  booktitle = {Proceedings of the 19th annual {IEEE} International Conference on
               Network Protocols, {ICNP} 2011, Vancouver, BC, Canada, October 17-20,
               2011},
  pages     = {1--6},
  year      = {2011},
  crossref  = {DBLP:conf/icnp/2011},
  url       = {https://doi.org/10.1109/ICNP.2011.6089053},
  doi       = {10.1109/ICNP.2011.6089053},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icnp/ZhangCXWSW11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/AlamZKA11,
  author    = {Masoom Alam and
               Xinwen Zhang and
               Kamran Khan and
               Gohar Ali},
  title     = {xDAuth: a scalable and lightweight framework for cross domain access
               control and delegation},
  booktitle = {16th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2011, Innsbruck, Austria, June 15-17, 2011, Proceedings},
  pages     = {31--40},
  year      = {2011},
  crossref  = {DBLP:conf/sacmat/2011},
  url       = {https://doi.org/10.1145/1998441.1998447},
  doi       = {10.1145/1998441.1998447},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/AlamZKA11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/XiongZZY11,
  author    = {Huijun Xiong and
               Xinwen Zhang and
               Wei Zhu and
               Danfeng Yao},
  title     = {CloudSeal: End-to-End Content Protection in Cloud-Based Storage and
               Delivery Services},
  booktitle = {Security and Privacy in Communication Networks - 7th International
               {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
               Revised Selected Papers},
  pages     = {491--500},
  year      = {2011},
  crossref  = {DBLP:conf/securecomm/2011},
  url       = {https://doi.org/10.1007/978-3-642-31909-9\_30},
  doi       = {10.1007/978-3-642-31909-9\_30},
  timestamp = {Tue, 23 May 2017 01:12:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/XiongZZY11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/ChangZWS11,
  author    = {Katharine Chang and
               Xinwen Zhang and
               Guoqiang Wang and
               Kang G. Shin},
  title     = {{TGIS:} Booting Trust for Secure Information Sharing in Dynamic Group
               Collaborations},
  booktitle = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT),
               2011 {IEEE} Third International Conference on and 2011 {IEEE} Third
               International Conference on Social Computing (SocialCom), Boston,
               MA, USA, 9-11 Oct., 2011},
  pages     = {1020--1025},
  year      = {2011},
  crossref  = {DBLP:conf/socialcom/2011},
  url       = {https://doi.org/10.1109/PASSAT/SocialCom.2011.201},
  doi       = {10.1109/PASSAT/SocialCom.2011.201},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/socialcom/ChangZWS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/LiuZC11,
  author    = {Lei Liu and
               Xinwen Zhang and
               Songqing Chen},
  title     = {Botnet with Browser Extensions},
  booktitle = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT),
               2011 {IEEE} Third International Conference on and 2011 {IEEE} Third
               International Conference on Social Computing (SocialCom), Boston,
               MA, USA, 9-11 Oct., 2011},
  pages     = {1089--1094},
  year      = {2011},
  crossref  = {DBLP:conf/socialcom/2011},
  url       = {https://doi.org/10.1109/PASSAT/SocialCom.2011.25},
  doi       = {10.1109/PASSAT/SocialCom.2011.25},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/socialcom/LiuZC11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/ZhouZJF11,
  author    = {Yajin Zhou and
               Xinwen Zhang and
               Xuxian Jiang and
               Vincent W. Freeh},
  title     = {Taming Information-Stealing Smartphone Applications (on Android)},
  booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
               2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  pages     = {93--107},
  year      = {2011},
  crossref  = {DBLP:conf/trust/2011},
  url       = {https://doi.org/10.1007/978-3-642-21599-5\_7},
  doi       = {10.1007/978-3-642-21599-5\_7},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/ZhouZJF11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011stc,
  editor    = {Yan Chen and
               Shouhuai Xu and
               Ahmad{-}Reza Sadeghi and
               Xinwen Zhang},
  title     = {Proceedings of the sixth {ACM} workshop on Scalable trusted computing,
               STC@CCS 2011, Chicago, Illinois, USA, October 17, 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {https://doi.org/10.1145/2046582},
  doi       = {10.1145/2046582},
  isbn      = {978-1-4503-1001-7},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2011stc},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1105-3232,
  author    = {Sokol Kosta and
               Andrius Aucinas and
               Pan Hui and
               Richard Mortier and
               Xinwen Zhang},
  title     = {Unleashing the Power of Mobile Cloud Computing using ThinkAir},
  journal   = {CoRR},
  volume    = {abs/1105.3232},
  year      = {2011},
  url       = {http://arxiv.org/abs/1105.3232},
  archivePrefix = {arXiv},
  eprint    = {1105.3232},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1105-3232},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ChengJZZ10,
  author    = {Ge Cheng and
               Hai Jin and
               Deqing Zou and
               Xinwen Zhang},
  title     = {Building dynamic and transparent integrity measurement and protection
               for virtualized platform in cloud computing},
  journal   = {Concurrency and Computation: Practice and Experience},
  volume    = {22},
  number    = {13},
  pages     = {1893--1910},
  year      = {2010},
  url       = {https://doi.org/10.1002/cpe.1614},
  doi       = {10.1002/cpe.1614},
  timestamp = {Thu, 24 May 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/concurrency/ChengJZZ10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jwsr/AlamNZAH10,
  author    = {Masoom Alam and
               Mohammad Nauman and
               Xinwen Zhang and
               Tamleek Ali and
               Patrick C. K. Hung},
  title     = {Behavioral Attestation for Web Services Based Business Processes},
  journal   = {Int. J. Web Service Res.},
  volume    = {7},
  number    = {3},
  pages     = {52--72},
  year      = {2010},
  url       = {https://doi.org/10.4018/jwsr.2010070103},
  doi       = {10.4018/jwsr.2010070103},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jwsr/AlamNZAH10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NaumanKZ10,
  author    = {Mohammad Nauman and
               Sohail Khan and
               Xinwen Zhang},
  title     = {Apex: extending Android permission model and enforcement with user-defined
               runtime constraints},
  booktitle = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
               2010},
  pages     = {328--332},
  year      = {2010},
  crossref  = {DBLP:conf/ccs/2010asia},
  url       = {https://doi.org/10.1145/1755688.1755732},
  doi       = {10.1145/1755688.1755732},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/NaumanKZ10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/XuAHZS10,
  author    = {Wenjuan Xu and
               Gail{-}Joon Ahn and
               Hongxin Hu and
               Xinwen Zhang and
               Jean{-}Pierre Seifert},
  title     = {DR@FT: Efficient Remote Attestation Framework for Dynamic Systems},
  booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
               in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  pages     = {182--198},
  year      = {2010},
  crossref  = {DBLP:conf/esorics/2010},
  url       = {https://doi.org/10.1007/978-3-642-15497-3\_12},
  doi       = {10.1007/978-3-642-15497-3\_12},
  timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/XuAHZS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhangSA10,
  author    = {Xinwen Zhang and
               Jean{-}Pierre Seifert and
               Onur Acii{\c{c}}mez},
  title     = {{SEIP:} Simple and Efficient Integrity Protection for Open Mobile
               Platforms},
  booktitle = {Information and Communications Security - 12th International Conference,
               {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  pages     = {107--125},
  year      = {2010},
  crossref  = {DBLP:conf/icics/2010},
  url       = {https://doi.org/10.1007/978-3-642-17650-0\_9},
  doi       = {10.1007/978-3-642-17650-0\_9},
  timestamp = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/ZhangSA10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/AliNZ10,
  author    = {Tamleek Ali and
               Mohammad Nauman and
               Xinwen Zhang},
  title     = {On Leveraging Stochastic Models for Remote Attestation},
  booktitle = {Trusted Systems - Second International Conference, {INTRUST} 2010,
               Beijing, China, December 13-15, 2010, Revised Selected Papers},
  pages     = {290--301},
  year      = {2010},
  crossref  = {DBLP:conf/intrust/2010},
  url       = {https://doi.org/10.1007/978-3-642-25283-9\_19},
  doi       = {10.1007/978-3-642-25283-9\_19},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/intrust/AliNZ10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicase/ZhangJGK10,
  author    = {Xinwen Zhang and
               Won Jong Jeon and
               Simon Gibbs and
               Anugeetha Kunjithapatham},
  title     = {Elastic {HTML5:} Workload Offloading Using Cloud-Based Web Workers
               and Storages for Mobile Devices},
  booktitle = {Mobile Computing, Applications, and Services - Second International
               {ICST} Conference, MobiCASE 2010, Santa Clara, CA, USA, October 25-28,
               2010, Revised Selected Papers},
  pages     = {373--381},
  year      = {2010},
  crossref  = {DBLP:conf/mobicase/2010},
  url       = {https://doi.org/10.1007/978-3-642-29336-8\_26},
  doi       = {10.1007/978-3-642-29336-8\_26},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mobicase/ZhangJGK10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobilware/ZhangJKG10,
  author    = {Xinwen Zhang and
               Sangoh Jeong and
               Anugeetha Kunjithapatham and
               Simon Gibbs},
  title     = {Towards an Elastic Application Model for Augmenting Computing Capabilities
               of Mobile Platforms},
  booktitle = {Mobile Wireless Middleware, Operating Systems, and Applications -
               Third International Conference, Mobilware 2010, Chicago, IL, USA,
               June 30 - July 2, 2010. Revised Selected Papers},
  pages     = {161--174},
  year      = {2010},
  crossref  = {DBLP:conf/mobilware/2010},
  url       = {https://doi.org/10.1007/978-3-642-17758-3\_12},
  doi       = {10.1007/978-3-642-17758-3\_12},
  timestamp = {Fri, 27 Oct 2017 16:28:24 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mobilware/ZhangJKG10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/SchiffmanZG10,
  author    = {Joshua Schiffman and
               Xinwen Zhang and
               Simon Gibbs},
  title     = {DAuth: Fine-Grained Authorization Delegation for Distributed Web Application
               Consumers},
  booktitle = {{POLICY} 2010, {IEEE} International Symposium on Policies for Distributed
               Systems and Networks, Fairfax, VA, USA, 21-23 July 2010},
  pages     = {95--102},
  year      = {2010},
  crossref  = {DBLP:conf/policy/2010},
  url       = {https://doi.org/10.1109/POLICY.2010.12},
  doi       = {10.1109/POLICY.2010.12},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/policy/SchiffmanZG10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/AlamZNKA10,
  author    = {Masoom Alam and
               Xinwen Zhang and
               Mohammad Nauman and
               Sohail Khan and
               Quratulain Alam},
  title     = {MAuth: {A} Fine-Grained and User-centric Permission Delegation Framework
               for Multi-mashup Web Services},
  booktitle = {6th World Congress on Services, {SERVICES} 2010, Miami, Florida, USA,
               July 5-10, 2010},
  pages     = {56--63},
  year      = {2010},
  crossref  = {DBLP:conf/services/2010},
  url       = {https://doi.org/10.1109/SERVICES.2010.112},
  doi       = {10.1109/SERVICES.2010.112},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/services/AlamZNKA10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sose/HuangZKL10,
  author    = {Dijiang Huang and
               Xinwen Zhang and
               Myong H. Kang and
               Jim Luo},
  title     = {MobiCloud: Building Secure Cloud Framework for Mobile Computing and
               Communication},
  booktitle = {The Fifth {IEEE} International Symposium on Service-Oriented System
               Engineering, {SOSE} 2010, June 4-5, 2010, Nanjing, China},
  pages     = {27--34},
  year      = {2010},
  crossref  = {DBLP:conf/sose/2010},
  url       = {https://doi.org/10.1109/SOSE.2010.20},
  doi       = {10.1109/SOSE.2010.20},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sose/HuangZKL10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/XiangJZZWZ10,
  author    = {Guofu Xiang and
               Hai Jin and
               Deqing Zou and
               Xinwen Zhang and
               Sha Wen and
               Feng Zhao},
  title     = {VMDriver: {A} Driver-Based Monitoring Mechanism for Virtualization},
  booktitle = {29th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2010),
               New Delhi, Punjab, India, October 31 - November 3, 2010},
  pages     = {72--81},
  year      = {2010},
  crossref  = {DBLP:conf/srds/2010},
  url       = {https://doi.org/10.1109/SRDS.2010.38},
  doi       = {10.1109/SRDS.2010.38},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/srds/XiangJZZWZ10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/NaumanKZS10,
  author    = {Mohammad Nauman and
               Sohail Khan and
               Xinwen Zhang and
               Jean{-}Pierre Seifert},
  title     = {Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation
               for the Android Platform},
  booktitle = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
               2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  pages     = {1--15},
  year      = {2010},
  crossref  = {DBLP:conf/trust/2010},
  url       = {https://doi.org/10.1007/978-3-642-13869-0\_1},
  doi       = {10.1007/978-3-642-13869-0\_1},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/NaumanKZS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/XieZSZ10,
  author    = {Liang Xie and
               Xinwen Zhang and
               Jean{-}Pierre Seifert and
               Sencun Zhu},
  title     = {pBMDS: a behavior-based malware detection system for cellphone devices},
  booktitle = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
               {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  pages     = {37--48},
  year      = {2010},
  crossref  = {DBLP:conf/wisec/2010},
  url       = {https://doi.org/10.1145/1741866.1741874},
  doi       = {10.1145/1741866.1741874},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/XieZSZ10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiZXW09,
  author    = {Qi Li and
               Xinwen Zhang and
               Mingwei Xu and
               Jianping Wu},
  title     = {Towards secure dynamic collaborations with group-based {RBAC} model},
  journal   = {Computers {\&} Security},
  volume    = {28},
  number    = {5},
  pages     = {260--275},
  year      = {2009},
  url       = {https://doi.org/10.1016/j.cose.2008.12.004},
  doi       = {10.1016/j.cose.2008.12.004},
  timestamp = {Wed, 24 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/LiZXW09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ancs/LiuZYC09,
  author    = {Lei Liu and
               Xinwen Zhang and
               Guanhua Yan and
               Songqing Chen},
  title     = {Exploitation and threat analysis of open mobile devices},
  booktitle = {Proceedings of the 2009 {ACM/IEEE} Symposium on Architecture for Networking
               and Communications Systems, {ANCS} 2009, Princeton, New Jersey, USA,
               October 19-20, 2009},
  pages     = {20--29},
  year      = {2009},
  crossref  = {DBLP:conf/ancs/2009},
  url       = {https://doi.org/10.1145/1882486.1882493},
  doi       = {10.1145/1882486.1882493},
  timestamp = {Fri, 01 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ancs/LiuZYC09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangSGKJ09,
  author    = {Xinwen Zhang and
               Joshua Schiffman and
               Simon Gibbs and
               Anugeetha Kunjithapatham and
               Sangoh Jeong},
  title     = {Securing elastic applications on mobile devices for cloud computing},
  booktitle = {Proceedings of the first {ACM} Cloud Computing Security Workshop,
               {CCSW} 2009, Chicago, IL, USA, November 13, 2009},
  pages     = {127--134},
  year      = {2009},
  crossref  = {DBLP:conf/ccs/2009ccsw},
  url       = {https://doi.org/10.1145/1655008.1655026},
  doi       = {10.1145/1655008.1655026},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ZhangSGKJ09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/KattHZ09,
  author    = {Basel Katt and
               Michael Hafner and
               Xinwen Zhang},
  title     = {Building a stateful reference monitor with coloured petri nets},
  booktitle = {The 5th International Conference on Collaborative Computing: Networking,
               Applications and Worksharing, CollaborateCom 2009, Washington DC,
               USA, November 11-14, 2009},
  pages     = {1--10},
  year      = {2009},
  crossref  = {DBLP:conf/colcom/2009},
  url       = {https://doi.org/10.4108/ICST.COLLABORATECOM2009.8375},
  doi       = {10.4108/ICST.COLLABORATECOM2009.8375},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/colcom/KattHZ09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/KattHZ09a,
  author    = {Basel Katt and
               Michael Hafner and
               Xinwen Zhang},
  title     = {A usage control policy specification with Petri nets},
  booktitle = {The 5th International Conference on Collaborative Computing: Networking,
               Applications and Worksharing, CollaborateCom 2009, Washington DC,
               USA, November 11-14, 2009},
  pages     = {1--8},
  year      = {2009},
  crossref  = {DBLP:conf/colcom/2009},
  url       = {https://doi.org/10.4108/ICST.COLLABORATECOM2009.8394},
  doi       = {10.4108/ICST.COLLABORATECOM2009.8394},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/colcom/KattHZ09a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/XuZA09,
  author    = {Wenjuan Xu and
               Xinwen Zhang and
               Gail{-}Joon Ahn},
  title     = {Towards System Integrity Protection with Graph-Based Policy Analysis},
  booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
               Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  pages     = {65--80},
  year      = {2009},
  crossref  = {DBLP:conf/dbsec/2009},
  url       = {https://doi.org/10.1007/978-3-642-03007-9\_5},
  doi       = {10.1007/978-3-642-03007-9\_5},
  timestamp = {Tue, 14 May 2019 10:00:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/XuZA09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/grid/ChengJZZLYX09,
  author    = {Ge Cheng and
               Hai Jin and
               Deqing Zou and
               Xinwen Zhang and
               Min Li and
               Chen Yu and
               Guofu Xiang},
  title     = {Building dynamic integrity protection for multiple independent authorities
               in virtualization-based infrastructure},
  booktitle = {Proceedings of the 2009 10th {IEEE/ACM} International Conference on
               Grid Computing, October 13-15, 2009, Banff, Alberta, Canada},
  pages     = {113--119},
  year      = {2009},
  crossref  = {DBLP:conf/grid/2009},
  url       = {https://doi.org/10.1109/GRID.2009.5353079},
  doi       = {10.1109/GRID.2009.5353079},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/grid/ChengJZZLYX09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/AlamNZAH09,
  author    = {Masoom Alam and
               Mohammad Nauman and
               Xinwen Zhang and
               Tamleek Ali and
               Patrick C. K. Hung},
  title     = {Behavioral Attestation for Business Processes},
  booktitle = {{IEEE} International Conference on Web Services, {ICWS} 2009, Los
               Angeles, CA, USA, 6-10 July 2009},
  pages     = {343--350},
  year      = {2009},
  crossref  = {DBLP:conf/icws/2009},
  url       = {https://doi.org/10.1109/ICWS.2009.139},
  doi       = {10.1109/ICWS.2009.139},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icws/AlamNZAH09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec/ZhangAS09,
  author    = {Xinwen Zhang and
               Onur Acii{\c{c}}mez and
               Jean{-}Pierre Seifert},
  title     = {Building Efficient Integrity Measurement and Attestation for Mobile
               Phone Platforms},
  booktitle = {Security and Privacy in Mobile Information and Communication Systems,
               First International {ICST} Conference, MobiSec 2009, Turin, Italy,
               June 3-5, 2009, Revised Selected Papers},
  pages     = {71--82},
  year      = {2009},
  crossref  = {DBLP:conf/mobisec/2009},
  url       = {https://doi.org/10.1007/978-3-642-04434-2\_7},
  doi       = {10.1007/978-3-642-04434-2\_7},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mobisec/ZhangAS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/KattZH09,
  author    = {Basel Katt and
               Xinwen Zhang and
               Michael Hafner},
  title     = {Towards a Usage Control Policy Specification with Petri Nets},
  booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2009, Confederated
               International Conferences, CoopIS, DOA, IS, and {ODBASE} 2009, Vilamoura,
               Portugal, November 1-6, 2009, Proceedings, Part {II}},
  pages     = {905--912},
  year      = {2009},
  crossref  = {DBLP:conf/otm/2009-2},
  url       = {https://doi.org/10.1007/978-3-642-05151-7\_11},
  doi       = {10.1007/978-3-642-05151-7\_11},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/otm/KattZH09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/XuWZC09,
  author    = {Min Xu and
               Duminda Wijesekera and
               Xinwen Zhang and
               Deshan Cooray},
  title     = {Towards Session-Aware {RBAC} Administration and Enforcement with {XACML}},
  booktitle = {{POLICY} 2009, {IEEE} International Symposium on Policies for Distributed
               Systems and Networks, London, UK, 20-22 July 2009},
  pages     = {9--16},
  year      = {2009},
  crossref  = {DBLP:conf/policy/2009},
  url       = {https://doi.org/10.1109/POLICY.2009.27},
  doi       = {10.1109/POLICY.2009.27},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/policy/XuWZC09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LiuYZC09,
  author    = {Lei Liu and
               Guanhua Yan and
               Xinwen Zhang and
               Songqing Chen},
  title     = {VirusMeter: Preventing Your Cellphone from Spies},
  booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium,
               {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  pages     = {244--264},
  year      = {2009},
  crossref  = {DBLP:conf/raid/2009},
  url       = {https://doi.org/10.1007/978-3-642-04342-0\_13},
  doi       = {10.1007/978-3-642-04342-0\_13},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/LiuYZC09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/JinAHCZ09,
  author    = {Jing Jin and
               Gail{-}Joon Ahn and
               Hongxin Hu and
               Michael J. Covington and
               Xinwen Zhang},
  title     = {Patient-centric authorization framework for sharing electronic health
               records},
  booktitle = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2009, Stresa, Italy, June 3-5, 2009, Proceedings},
  pages     = {125--134},
  year      = {2009},
  crossref  = {DBLP:conf/sacmat/2009},
  url       = {https://doi.org/10.1145/1542207.1542228},
  doi       = {10.1145/1542207.1542228},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/JinAHCZ09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/XieZCJZ09,
  author    = {Liang Xie and
               Xinwen Zhang and
               Ashwin Chaugule and
               Trent Jaeger and
               Sencun Zhu},
  title     = {Designing System-Level Defenses against Cellphone Malware},
  booktitle = {28th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2009),
               Niagara Falls, New York, USA, September 27-30, 2009},
  pages     = {83--90},
  year      = {2009},
  crossref  = {DBLP:conf/srds/2009},
  url       = {https://doi.org/10.1109/SRDS.2009.21},
  doi       = {10.1109/SRDS.2009.21},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/srds/XieZCJZ09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/NaumanAZA09,
  author    = {Mohammad Nauman and
               Masoom Alam and
               Xinwen Zhang and
               Tamleek Ali},
  title     = {Remote Attestation of Attribute Updates and Information Flows in a
               {UCON} System},
  booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
               UK, April 6-8, 2009, Proceedings},
  pages     = {63--80},
  year      = {2009},
  crossref  = {DBLP:conf/trust/2009},
  url       = {https://doi.org/10.1007/978-3-642-00587-9\_5},
  doi       = {10.1007/978-3-642-00587-9\_5},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/NaumanAZA09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhangNCS08,
  author    = {Xinwen Zhang and
               Masayuki Nakae and
               Michael J. Covington and
               Ravi S. Sandhu},
  title     = {Toward a Usage-Based Security Framework for Collaborative Computing
               Systems},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {11},
  number    = {1},
  pages     = {3:1--3:36},
  year      = {2008},
  url       = {https://doi.org/10.1145/1330295.1330298},
  doi       = {10.1145/1330295.1330298},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/ZhangNCS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AlamSLZ08,
  author    = {Masoom Alam and
               Jean{-}Pierre Seifert and
               Qi Li and
               Xinwen Zhang},
  title     = {Usage control platformization via trustworthy SELinux},
  booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
               2008},
  pages     = {245--248},
  year      = {2008},
  crossref  = {DBLP:conf/ccs/2008asia},
  url       = {https://doi.org/10.1145/1368310.1368345},
  doi       = {10.1145/1368310.1368345},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AlamSLZ08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/JinACZ08,
  author    = {Jing Jin and
               Gail{-}Joon Ahn and
               Michael J. Covington and
               Xinwen Zhang},
  title     = {Access Control Model for Sharing Composite Electronic Health Records},
  booktitle = {Collaborative Computing: Networking, Applications and Worksharing,
               4th International Conference, CollaborateCom 2008, Orlando, FL, USA,
               November 13-16, 2008, Revised Selected Papers},
  pages     = {340--354},
  year      = {2008},
  crossref  = {DBLP:conf/colcom/2008},
  url       = {https://doi.org/10.1007/978-3-642-03354-4\_25},
  doi       = {10.1007/978-3-642-03354-4\_25},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/colcom/JinACZ08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/LiXZ08a,
  author    = {Qi Li and
               Mingwei Xu and
               Xinwen Zhang},
  title     = {Towards a Group-Based {RBAC} Model and Decentralized User-Role Administration},
  booktitle = {28th {IEEE} International Conference on Distributed Computing Systems
               Workshops {(ICDCS} 2008 Workshops), 17-20 June 2008, Beijing, China},
  pages     = {441--446},
  year      = {2008},
  crossref  = {DBLP:conf/icdcsw/2008},
  url       = {https://doi.org/10.1109/ICDCS.Workshops.2008.26},
  doi       = {10.1109/ICDCS.Workshops.2008.26},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcsw/LiXZ08a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/LiXZ08,
  author    = {Qi Li and
               Mingwei Xu and
               Xinwen Zhang},
  title     = {Access control in Group Communication Systems},
  booktitle = {Proceedings of the 13th {IEEE} Symposium on Computers and Communications
               {(ISCC} 2008), July 6-9, Marrakech, Morocco},
  pages     = {380--385},
  year      = {2008},
  crossref  = {DBLP:conf/iscc/2008},
  url       = {https://doi.org/10.1109/ISCC.2008.4625718},
  doi       = {10.1109/ISCC.2008.4625718},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iscc/LiXZ08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/AhnXZ08,
  author    = {Gail{-}Joon Ahn and
               Wenjuan Xu and
               Xinwen Zhang},
  title     = {Systematic Policy Analysis for High-Assurance Services in SELinux},
  booktitle = {9th {IEEE} International Workshop on Policies for Distributed Systems
               and Networks {(POLICY} 2008), 2-4 June 2008, Palisades, New York,
               {USA}},
  pages     = {3--10},
  year      = {2008},
  crossref  = {DBLP:conf/policy/2008},
  url       = {https://doi.org/10.1109/POLICY.2008.18},
  doi       = {10.1109/POLICY.2008.18},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/policy/AhnXZ08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/KattZBHS08,
  author    = {Basel Katt and
               Xinwen Zhang and
               Ruth Breu and
               Michael Hafner and
               Jean{-}Pierre Seifert},
  title     = {A general obligation model and continuity: enhanced policy enforcement
               engine for usage control},
  booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages     = {123--132},
  year      = {2008},
  crossref  = {DBLP:conf/sacmat/2008},
  url       = {https://doi.org/10.1145/1377836.1377856},
  doi       = {10.1145/1377836.1377856},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/KattZBHS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/AlamZNAS08,
  author    = {Masoom Alam and
               Xinwen Zhang and
               Mohammad Nauman and
               Tamleek Ali and
               Jean{-}Pierre Seifert},
  title     = {Model-based behavioral attestation},
  booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages     = {175--184},
  year      = {2008},
  crossref  = {DBLP:conf/sacmat/2008},
  url       = {https://doi.org/10.1145/1377836.1377864},
  doi       = {10.1145/1377836.1377864},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/AlamZNAS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sutc/ZhangSS08,
  author    = {Xinwen Zhang and
               Jean{-}Pierre Seifert and
               Ravi S. Sandhu},
  title     = {Security Enforcement Model for Distributed Usage Control},
  booktitle = {{IEEE} International Conference on Sensor Networks, Ubiquitous, and
               Trustworthy Computing {(SUTC} 2008), 11-13 June 2008, Taichung, Taiwan},
  pages     = {10--18},
  year      = {2008},
  crossref  = {DBLP:conf/sutc/2008},
  url       = {https://doi.org/10.1109/SUTC.2008.79},
  doi       = {10.1109/SUTC.2008.79},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sutc/ZhangSS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/AlamZNA08,
  author    = {Masoom Alam and
               Xinwen Zhang and
               Mohammad Nauman and
               Tamleek Ali},
  title     = {Behavioral attestation for web services {(BA4WS)}},
  booktitle = {Proceedings of the 5th {ACM} Workshop On Secure Web Services, {SWS}
               2008, Alexandria, VA, USA, October 31, 2008},
  pages     = {21--28},
  year      = {2008},
  crossref  = {DBLP:conf/sws/2008},
  url       = {https://doi.org/10.1145/1456492.1456496},
  doi       = {10.1145/1456492.1456496},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sws/AlamZNA08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangAS07,
  author    = {Xinwen Zhang and
               Onur Acii{\c{c}}mez and
               Jean{-}Pierre Seifert},
  title     = {A trusted mobile phone reference architecturevia secure kernel},
  booktitle = {Proceedings of the 2nd {ACM} Workshop on Scalable Trusted Computing,
               {STC} 2007, Alexandria, VA, USA, November 2, 2007},
  pages     = {7--14},
  year      = {2007},
  crossref  = {DBLP:conf/ccs/2007stc},
  url       = {https://doi.org/10.1145/1314354.1314359},
  doi       = {10.1145/1314354.1314359},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ZhangAS07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangCCS07,
  author    = {Xinwen Zhang and
               Michael J. Covington and
               Songqing Chen and
               Ravi S. Sandhu},
  title     = {SecureBus: towards application-transparent trusted computing with
               mandatory access control},
  booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages     = {117--126},
  year      = {2007},
  crossref  = {DBLP:conf/ccs/2007asia},
  url       = {https://doi.org/10.1145/1229285.1229304},
  doi       = {10.1145/1229285.1229304},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ZhangCCS07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ZhaoSZQ07,
  author    = {Baoxian Zhao and
               Ravi S. Sandhu and
               Xinwen Zhang and
               Xiaolin Qin},
  title     = {Towards a Times-Based Usage Control Model},
  booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
               Conference on Data and Applications Security, Redondo Beach, CA, USA,
               July 8-11, 2007, Proceedings},
  pages     = {227--242},
  year      = {2007},
  crossref  = {DBLP:conf/dbsec/2007},
  url       = {https://doi.org/10.1007/978-3-540-73538-0\_17},
  doi       = {10.1007/978-3-540-73538-0\_17},
  timestamp = {Tue, 14 May 2019 10:00:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/ZhaoSZQ07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/AlamSZ07,
  author    = {Masoom Alam and
               Jean{-}Pierre Seifert and
               Xinwen Zhang},
  title     = {A Model-Driven Framework for Trusted Computing Based Systems},
  booktitle = {11th {IEEE} International Enterprise Distributed Object Computing
               Conference {(EDOC} 2007), 15-19 October 2007, Annapolis, Maryland,
               {USA}},
  pages     = {75--86},
  year      = {2007},
  crossref  = {DBLP:conf/edoc/2007},
  url       = {https://doi.org/10.1109/EDOC.2007.52},
  doi       = {10.1109/EDOC.2007.52},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/edoc/AlamSZ07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hase/ZhangLSX07,
  author    = {Xinwen Zhang and
               Qi Li and
               Jean{-}Pierre Seifert and
               Mingwei Xu},
  title     = {Flexible Authorization with Decentralized Access Control Model for
               Grid Computing},
  booktitle = {Tenth {IEEE} International Symposium on High Assurance Systems Engineering
               {(HASE} 2007), November 14-16, 2007, Dallas, Texas, {USA}},
  pages     = {156--165},
  year      = {2007},
  crossref  = {DBLP:conf/hase/2007},
  url       = {https://doi.org/10.1109/HASE.2007.29},
  doi       = {10.1109/HASE.2007.29},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hase/ZhangLSX07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/XuJSZ07,
  author    = {Min Xu and
               Xuxian Jiang and
               Ravi S. Sandhu and
               Xinwen Zhang},
  title     = {Towards a VMM-based usage control framework for {OS} kernel integrity
               protection},
  booktitle = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings},
  pages     = {71--80},
  year      = {2007},
  crossref  = {DBLP:conf/sacmat/2007},
  url       = {https://doi.org/10.1145/1266840.1266852},
  doi       = {10.1145/1266840.1266852},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/XuJSZ07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/AgreiterABHPSZ07,
  author    = {Berthold Agreiter and
               Muhammad Alam and
               Ruth Breu and
               Michael Hafner and
               Alexander Pretschner and
               Jean{-}Pierre Seifert and
               Xinwen Zhang},
  title     = {A technical architecture for enforcing usage control requirements
               in service-oriented architectures},
  booktitle = {Proceedings of the 4th {ACM} Workshop On Secure Web Services, {SWS}
               2007, Fairfax, VA, USA, November 2, 2007},
  pages     = {18--25},
  year      = {2007},
  crossref  = {DBLP:conf/sws/2007},
  url       = {https://doi.org/10.1145/1314418.1314422},
  doi       = {10.1145/1314418.1314422},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sws/AgreiterABHPSZ07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/SandhuZRC06,
  author    = {Ravi S. Sandhu and
               Xinwen Zhang and
               Kumar Ranganathan and
               Michael J. Covington},
  title     = {Client-side access control enforcement using trusted computing and
               {PEI} models},
  journal   = {J. High Speed Networks},
  volume    = {15},
  number    = {3},
  pages     = {229--245},
  year      = {2006},
  url       = {http://content.iospress.com/articles/journal-of-high-speed-networks/jhs288},
  timestamp = {Mon, 18 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jhsn/SandhuZRC06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/OhSZ06,
  author    = {Sejong Oh and
               Ravi S. Sandhu and
               Xinwen Zhang},
  title     = {An effective role administration model using organization structure},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {9},
  number    = {2},
  pages     = {113--137},
  year      = {2006},
  url       = {https://doi.org/10.1145/1151414.1151415},
  doi       = {10.1145/1151414.1151415},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/OhSZ06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ancs/ChenWLZ06,
  author    = {Songqing Chen and
               Xinyuan Wang and
               Lei Liu and
               Xinwen Zhang},
  title     = {WormTerminator: an effective containment of unknown and polymorphic
               fast spreading worms},
  booktitle = {Proceedings of the 2006 {ACM/IEEE} Symposium on Architecture for Networking
               and Communications Systems, {ANCS} 2006, San Jose, California, USA,
               December 3-5, 2006},
  pages     = {173--182},
  year      = {2006},
  crossref  = {DBLP:conf/ancs/2006},
  url       = {https://doi.org/10.1145/1185347.1185371},
  doi       = {10.1145/1185347.1185371},
  timestamp = {Fri, 01 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ancs/ChenWLZ06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SandhuRZ06,
  author    = {Ravi S. Sandhu and
               Kumar Ranganathan and
               Xinwen Zhang},
  title     = {Secure information sharing enabled by Trusted Computing and {PEI}
               models},
  booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
               2006},
  pages     = {2--12},
  year      = {2006},
  crossref  = {DBLP:conf/ccs/2006},
  url       = {https://doi.org/10.1145/1128817.1128820},
  doi       = {10.1145/1128817.1128820},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/SandhuRZ06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangSP06,
  author    = {Xinwen Zhang and
               Ravi S. Sandhu and
               Francesco Parisi{-}Presicce},
  title     = {Safety analysis of usage control authorization models},
  booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
               2006},
  pages     = {243--254},
  year      = {2006},
  crossref  = {DBLP:conf/ccs/2006},
  url       = {https://doi.org/10.1145/1128817.1128853},
  doi       = {10.1145/1128817.1128853},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ZhangSP06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NakaeZS06,
  author    = {Masayuki Nakae and
               Xinwen Zhang and
               Ravi S. Sandhu},
  title     = {A general design towards secure ad-hoc collaboration},
  booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
               2006},
  pages     = {358},
  year      = {2006},
  crossref  = {DBLP:conf/ccs/2006},
  url       = {https://doi.org/10.1145/1128817.1128874},
  doi       = {10.1145/1128817.1128874},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/NakaeZS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/LiZQX06,
  author    = {Qi Li and
               Xinwen Zhang and
               Sihan Qing and
               Mingwei Xu},
  title     = {Supporting Ad-hoc Collaboration with Group-based {RBAC} Model},
  booktitle = {2nd International {ICST} Conference on Collaborative Computing: Networking,
               Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA,
               November 17-20, 2006},
  year      = {2006},
  crossref  = {DBLP:conf/colcom/2006},
  url       = {https://doi.org/10.1109/COLCOM.2006.361887},
  doi       = {10.1109/COLCOM.2006.361887},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/colcom/LiZQX06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/ZhangZS06,
  author    = {Zhixiong Zhang and
               Xinwen Zhang and
               Ravi Sandhu},
  title     = {{ROBAC:} Scalable Role and Organization Based Access Control Models},
  booktitle = {2nd International {ICST} Conference on Collaborative Computing: Networking,
               Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA,
               November 17-20, 2006},
  year      = {2006},
  crossref  = {DBLP:conf/colcom/2006},
  url       = {https://doi.org/10.1109/COLCOM.2006.361879},
  doi       = {10.1109/COLCOM.2006.361879},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/colcom/ZhangZS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhangPS06,
  author    = {Xinwen Zhang and
               Francesco Parisi{-}Presicce and
               Ravi S. Sandhu},
  title     = {Towards Remote Policy Enforcement for Runtime Protection of Mobile
               Code Using Trusted Computing},
  booktitle = {Advances in Information and Computer Security, First International
               Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
               Proceedings},
  pages     = {179--195},
  year      = {2006},
  crossref  = {DBLP:conf/iwsec/2006},
  url       = {https://doi.org/10.1007/11908739\_13},
  doi       = {10.1007/11908739\_13},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/ZhangPS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ZhangNCS06,
  author    = {Xinwen Zhang and
               Masayuki Nakae and
               Michael J. Covington and
               Ravi S. Sandhu},
  title     = {A usage-based authorization framework for collaborative computing
               systems},
  booktitle = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings},
  pages     = {180--189},
  year      = {2006},
  crossref  = {DBLP:conf/sacmat/2006},
  url       = {https://doi.org/10.1145/1133058.1133084},
  doi       = {10.1145/1133058.1133084},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/ZhangNCS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecra/LiZ05,
  author    = {Yingjiu Li and
               Xinwen Zhang},
  title     = {Securing credit card transactions with one-time payment scheme},
  journal   = {Electronic Commerce Research and Applications},
  volume    = {4},
  number    = {4},
  pages     = {413--426},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.elerap.2005.06.002},
  doi       = {10.1016/j.elerap.2005.06.002},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ecra/LiZ05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/ZhangCS05,
  author    = {Xinwen Zhang and
               Songqing Chen and
               Ravi S. Sandhu},
  title     = {Enhancing Data Authenticity and Integrity in {P2P} Systems},
  journal   = {{IEEE} Internet Computing},
  volume    = {9},
  number    = {6},
  pages     = {42--49},
  year      = {2005},
  url       = {https://doi.org/10.1109/MIC.2005.124},
  doi       = {10.1109/MIC.2005.124},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/internet/ZhangCS05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ZhangPSP05,
  author    = {Xinwen Zhang and
               Francesco Parisi{-}Presicce and
               Ravi S. Sandhu and
               Jaehong Park},
  title     = {Formal model and policy specification of usage control},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {8},
  number    = {4},
  pages     = {351--387},
  year      = {2005},
  url       = {https://doi.org/10.1145/1108906.1108908},
  doi       = {10.1145/1108906.1108908},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/ZhangPSP05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ZhangLN05,
  author    = {Xinwen Zhang and
               Yingjiu Li and
               Divya Nalla},
  title     = {An attribute-based access matrix model},
  booktitle = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC),
               Santa Fe, New Mexico, USA, March 13-17, 2005},
  pages     = {359--363},
  year      = {2005},
  crossref  = {DBLP:conf/sac/2005},
  url       = {https://doi.org/10.1145/1066677.1066760},
  doi       = {10.1145/1066677.1066760},
  timestamp = {Tue, 06 Nov 2018 11:06:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sac/ZhangLN05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/SandhuZ05,
  author    = {Ravi S. Sandhu and
               Xinwen Zhang},
  title     = {Peer-to-peer access control architecture using trusted computing technology},
  booktitle = {10th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2005, Stockholm, Sweden, June 1-3, 2005, Proceedings},
  pages     = {147--158},
  year      = {2005},
  crossref  = {DBLP:conf/sacmat/2005},
  url       = {https://doi.org/10.1145/1063979.1064005},
  doi       = {10.1145/1063979.1064005},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/SandhuZ05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ParkZS04,
  author    = {Jaehong Park and
               Xinwen Zhang and
               Ravi S. Sandhu},
  title     = {Attribute Mutability in Usage Control},
  booktitle = {Research Directions in Data and Applications Security XVIII, {IFIP}
               {TC11/WG} 11.3 Eighteenth Annual Conference on Data and Applications
               Security, July 25-28, 2004, Sitges, Catalonia, Spain},
  pages     = {15--29},
  year      = {2004},
  crossref  = {DBLP:conf/dbsec/2004},
  url       = {https://doi.org/10.1007/1-4020-8128-6\_2},
  doi       = {10.1007/1-4020-8128-6\_2},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/ParkZS04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ride/LiZ04,
  author    = {Yingjiu Li and
               Xinwen Zhang},
  title     = {A Security-Enhanced One-Time Payment Scheme for Credit Card},
  booktitle = {14th International Workshop on Research Issues in Data Engineering
               {(RIDE-WS-ECEG} 2004), Web Services for E-Commerce and E-Government
               Applications, 28-29 March 2004, Boston, MA, {USA}},
  pages     = {40--47},
  year      = {2004},
  crossref  = {DBLP:conf/ride/2004},
  url       = {https://doi.org/10.1109/RIDE.2004.1281701},
  doi       = {10.1109/RIDE.2004.1281701},
  timestamp = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ride/LiZ04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ZhangPPS04,
  author    = {Xinwen Zhang and
               Jaehong Park and
               Francesco Parisi{-}Presicce and
               Ravi S. Sandhu},
  title     = {A logical specification for usage control},
  booktitle = {9th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings},
  pages     = {1--10},
  year      = {2004},
  crossref  = {DBLP:conf/sacmat/2004},
  url       = {https://doi.org/10.1145/990036.990038},
  doi       = {10.1145/990036.990038},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/ZhangPPS04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ZhangPS03,
  author    = {Xinwen Zhang and
               Jaehong Park and
               Ravi S. Sandhu},
  title     = {Schema Based {XML} Security: {RBAC} Approach},
  booktitle = {Data and Applications Security {XVII:} Status and Prospects, {IFIP}
               {TC-11} {WG} 11.3 Seventeenth Annual Working Conference on Data and
               Application Security, August4-6, 2003, Estes Park, Colorado, {USA}},
  pages     = {330--343},
  year      = {2003},
  crossref  = {DBLP:conf/dbsec/2003},
  url       = {https://doi.org/10.1007/1-4020-8070-0\_24},
  doi       = {10.1007/1-4020-8070-0\_24},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/ZhangPS03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ZhangOS03,
  author    = {Xinwen Zhang and
               Sejong Oh and
               Ravi S. Sandhu},
  title     = {{PBDM:} a flexible delegation model in {RBAC}},
  booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings},
  pages     = {149--157},
  year      = {2003},
  crossref  = {DBLP:conf/sacmat/2003},
  url       = {https://doi.org/10.1145/775412.775431},
  doi       = {10.1145/775412.775431},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/ZhangOS03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cikm/2019,
  editor    = {Wenwu Zhu and
               Dacheng Tao and
               Xueqi Cheng and
               Peng Cui and
               Elke A. Rundensteiner and
               David Carmel and
               Qi He and
               Jeffrey Xu Yu},
  title     = {Proceedings of the 28th {ACM} International Conference on Information
               and Knowledge Management, {CIKM} 2019, Beijing, China, November 3-7,
               2019},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://dl.acm.org/citation.cfm?id=3357384},
  isbn      = {978-1-4503-6976-3},
  timestamp = {Mon, 04 Nov 2019 11:08:42 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cikm/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdm/2018,
  title     = {{IEEE} International Conference on Data Mining, {ICDM} 2018, Singapore,
               November 17-20, 2018},
  publisher = {{IEEE} Computer Society},
  year      = {2018},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/8591042/proceeding},
  isbn      = {978-1-5386-9159-5},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdm/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/apweb/2016-2,
  editor    = {Feifei Li and
               Kyuseok Shim and
               Kai Zheng and
               Guanfeng Liu},
  title     = {Web Technologies and Applications - 18th Asia-Pacific Web Conference,
               APWeb 2016, Suzhou, China, September 23-25, 2016. Proceedings, Part
               {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9932},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-45817-5},
  doi       = {10.1007/978-3-319-45817-5},
  isbn      = {978-3-319-45816-8},
  timestamp = {Thu, 07 Nov 2019 15:14:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/apweb/2016-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2016,
  title     = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
               2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7845250/proceeding},
  isbn      = {978-1-5090-3205-1},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2015,
  editor    = {Jaehong Park and
               Anna Cinzia Squicciarini},
  title     = {Proceedings of the 5th {ACM} Conference on Data and Application Security
               and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2699026},
  isbn      = {978-1-4503-3191-3},
  timestamp = {Fri, 27 Feb 2015 11:13:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2015,
  editor    = {Meikang Qiu and
               Shouhuai Xu and
               Moti Yung and
               Haibo Zhang},
  title     = {Network and System Security - 9th International Conference, {NSS}
               2015, New York, NY, USA, November 3-5, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9408},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-25645-0},
  doi       = {10.1007/978-3-319-25645-0},
  isbn      = {978-3-319-25644-3},
  timestamp = {Tue, 14 May 2019 10:00:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nss/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2015,
  editor    = {Jaeyeon Jung and
               Thorsten Holz},
  title     = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
               D.C., USA, August 12-14, 2015},
  publisher = {{USENIX} Association},
  year      = {2015},
  url       = {https://www.usenix.org/conference/usenixsecurity15},
  timestamp = {Fri, 19 Aug 2016 15:38:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014asia,
  editor    = {Shiho Moriai and
               Trent Jaeger and
               Kouichi Sakurai},
  title     = {9th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2590296},
  isbn      = {978-1-4503-2800-5},
  timestamp = {Tue, 21 Nov 2017 18:32:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2014asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013asia,
  editor    = {Kefei Chen and
               Qi Xie and
               Weidong Qiu and
               Ninghui Li and
               Wen{-}Guey Tzeng},
  title     = {8th {ACM} Symposium on Information, Computer and Communications Security,
               {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2484313},
  isbn      = {978-1-4503-1767-2},
  timestamp = {Tue, 21 Nov 2017 18:32:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2013asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cloudnet/2013,
  editor    = {Xiaoming Fu and
               Puneet Sharma and
               Dijiang Huang and
               Deep Medhi},
  title     = {{IEEE} 2nd International Conference on Cloud Networking, CloudNet
               2013, San Francisco, CA, USA, November 11-13, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6693291/proceeding},
  isbn      = {978-1-4799-0566-9},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cloudnet/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2013,
  title     = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
               National Harbor, MD, USA, October 14-16, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6675898/proceeding},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cns/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/im/2013,
  editor    = {Filip De Turck and
               Yixin Diao and
               Choong Seon Hong and
               Deep Medhi and
               Ramin Sadre},
  title     = {2013 {IFIP/IEEE} International Symposium on Integrated Network Management
               {(IM} 2013), Ghent, Belgium, May 27-31, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6560458/proceeding},
  isbn      = {978-1-4673-5229-1},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/im/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/incos/2013,
  title     = {2013 5th International Conference on Intelligent Networking and Collaborative
               Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6630246/proceeding},
  isbn      = {978-0-7695-4988-0},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/incos/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigcomm/2013,
  editor    = {Dah Ming Chiu and
               Jia Wang and
               Paul Barford and
               Srinivasan Seshan},
  title     = {{ACM} {SIGCOMM} 2013 Conference, SIGCOMM'13, Hong Kong, China, August
               12-16, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2486001},
  isbn      = {978-1-4503-2056-6},
  timestamp = {Wed, 20 Jun 2018 15:57:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sigcomm/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/socialcom/2013,
  title     = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom
               2013, Washington, DC, USA, 8-14 September, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6693161/proceeding},
  isbn      = {978-0-7695-5137-1},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/socialcom/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEants/2012,
  title     = {{IEEE} International Conference on Advanced Networks and Telecommuncations
               Systems, {ANTS} 2012, Bangalore, India, 16-19 December, 2012},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6521480/proceeding},
  isbn      = {978-1-4673-5130-0},
  timestamp = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEants/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012asia,
  editor    = {Heung Youl Youm and
               Yoojae Won},
  title     = {7th {ACM} Symposium on Information, Compuer and Communications Security,
               {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2414456},
  isbn      = {978-1-4503-1648-4},
  timestamp = {Tue, 21 Nov 2017 18:32:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2012asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012,
  editor    = {Ting Yu and
               George Danezis and
               Virgil D. Gligor},
  title     = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2382196},
  isbn      = {978-1-4503-1651-4},
  timestamp = {Tue, 16 Oct 2012 19:02:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cf/2012,
  editor    = {John Feo and
               Paolo Faraboschi and
               Oreste Villa},
  title     = {Proceedings of the Computing Frontiers Conference, CF'12, Caligari,
               Italy - May 15 - 17, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2212908},
  isbn      = {978-1-4503-1215-8},
  timestamp = {Wed, 23 May 2012 08:32:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cf/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2012,
  editor    = {Elisa Bertino and
               Ravi S. Sandhu},
  title     = {Second {ACM} Conference on Data and Application Security and Privacy,
               {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2133601},
  isbn      = {978-1-4503-1091-8},
  timestamp = {Tue, 20 Mar 2012 08:30:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icc/2012,
  title     = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6350935/proceeding},
  isbn      = {978-1-4577-2052-9},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icc/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infocom/2012,
  editor    = {Albert G. Greenberg and
               Kazem Sohraby},
  title     = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
               25-30, 2012},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6189419/proceeding},
  isbn      = {978-1-4673-0773-4},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2012,
  title     = {19th Annual Network and Distributed System Security Symposium, {NDSS}
               2012, San Diego, California, USA, February 5-8, 2012},
  publisher = {The Internet Society},
  year      = {2012},
  url       = {https://www.ndss-symposium.org/ndss2012/},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/petra/2012,
  editor    = {Fillia Makedon},
  title     = {The 5th International Conference on PErvasive Technologies Related
               to Assistive Environments, {PETRA} 2012, Heraklion, Crete, Greece,
               June 6-9, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2413097},
  isbn      = {978-1-4503-1300-1},
  timestamp = {Thu, 13 Dec 2012 11:28:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/petra/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2012,
  editor    = {Geyong Min and
               Yulei Wu and
               Lei (Chris) Liu and
               Xiaolong Jin and
               Stephen A. Jarvis and
               Ahmed Yassin Al{-}Dubai},
  title     = {11th {IEEE} International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2012, Liverpool, United
               Kingdom, June 25-27, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6294581/proceeding},
  isbn      = {978-1-4673-2172-3},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEants/2011,
  title     = {Fifth {IEEE} International Conference on Advanced Telecommunication
               Systems and Networks, {ANTS} 2011, December 18-21, 2011 Bengaluru,
               India},
  publisher = {{IEEE}},
  year      = {2011},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6156052/proceeding},
  timestamp = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEants/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011asia,
  editor    = {Bruce S. N. Cheung and
               Lucas Chi Kwong Hui and
               Ravi S. Sandhu and
               Duncan S. Wong},
  title     = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
               2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0564-8},
  timestamp = {Tue, 21 Nov 2017 18:32:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2011asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011,
  editor    = {Yan Chen and
               George Danezis and
               Vitaly Shmatikov},
  title     = {Proceedings of the 18th {ACM} Conference on Computer and Communications
               Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0948-6},
  timestamp = {Thu, 20 Oct 2011 19:38:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icnp/2011,
  title     = {Proceedings of the 19th annual {IEEE} International Conference on
               Network Protocols, {ICNP} 2011, Vancouver, BC, Canada, October 17-20,
               2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6085960/proceeding},
  isbn      = {978-1-4577-1392-7},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icnp/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2011,
  editor    = {Ruth Breu and
               Jason Crampton and
               Jorge Lobo},
  title     = {16th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2011, Innsbruck, Austria, June 15-17, 2011, Proceedings},
  publisher = {{ACM}},
  year      = {2011},
  url       = {https://doi.org/10.1145/1998441},
  doi       = {10.1145/1998441},
  isbn      = {978-1-4503-0688-1},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2011,
  editor    = {Muttukrishnan Rajarajan and
               Fred Piper and
               Haining Wang and
               George Kesidis},
  title     = {Security and Privacy in Communication Networks - 7th International
               {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
               Revised Selected Papers},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {96},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31909-9},
  doi       = {10.1007/978-3-642-31909-9},
  isbn      = {978-3-642-31908-2},
  timestamp = {Tue, 23 May 2017 01:12:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/socialcom/2011,
  title     = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT),
               2011 {IEEE} Third International Conference on and 2011 {IEEE} Third
               International Conference on Social Computing (SocialCom), Boston,
               MA, USA, 9-11 Oct., 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6112285/proceeding},
  isbn      = {978-1-4577-1931-8},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/socialcom/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2011,
  editor    = {Jonathan M. McCune and
               Boris Balacheff and
               Adrian Perrig and
               Ahmad{-}Reza Sadeghi and
               M. Angela Sasse and
               Yolanta Beres},
  title     = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
               2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6740},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21599-5},
  doi       = {10.1007/978-3-642-21599-5},
  isbn      = {978-3-642-21598-8},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2010asia,
  editor    = {Dengguo Feng and
               David A. Basin and
               Peng Liu},
  title     = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
               2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-60558-936-7},
  timestamp = {Tue, 21 Nov 2017 18:32:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2010asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2010,
  editor    = {Dimitris Gritzalis and
               Bart Preneel and
               Marianthi Theoharidou},
  title     = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
               in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6345},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15497-3},
  doi       = {10.1007/978-3-642-15497-3},
  isbn      = {978-3-642-15496-6},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2010,
  editor    = {Miguel Soriano and
               Sihan Qing and
               Javier L{\'{o}}pez},
  title     = {Information and Communications Security - 12th International Conference,
               {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6476},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17650-0},
  doi       = {10.1007/978-3-642-17650-0},
  isbn      = {978-3-642-17649-4},
  timestamp = {Thu, 29 Aug 2019 08:10:01 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/intrust/2010,
  editor    = {Liqun Chen and
               Moti Yung},
  title     = {Trusted Systems - Second International Conference, {INTRUST} 2010,
               Beijing, China, December 13-15, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6802},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25283-9},
  doi       = {10.1007/978-3-642-25283-9},
  isbn      = {978-3-642-25282-2},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/intrust/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobicase/2010,
  editor    = {Martin L. Griss and
               Guang Yang},
  title     = {Mobile Computing, Applications, and Services - Second International
               {ICST} Conference, MobiCASE 2010, Santa Clara, CA, USA, October 25-28,
               2010, Revised Selected Papers},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {76},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29336-8},
  doi       = {10.1007/978-3-642-29336-8},
  isbn      = {978-3-642-29335-1},
  timestamp = {Thu, 25 May 2017 00:43:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mobicase/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobilware/2010,
  editor    = {Ying Cai and
               Thomas Magedanz and
               Minglu Li and
               Jinchun Xia and
               Carlo Giannelli},
  title     = {Mobile Wireless Middleware, Operating Systems, and Applications -
               Third International Conference, Mobilware 2010, Chicago, IL, USA,
               June 30 - July 2, 2010. Revised Selected Papers},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {48},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17758-3},
  doi       = {10.1007/978-3-642-17758-3},
  isbn      = {978-3-642-17757-6},
  timestamp = {Fri, 27 Oct 2017 16:28:24 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mobilware/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/policy/2010,
  title     = {{POLICY} 2010, {IEEE} International Symposium on Policies for Distributed
               Systems and Networks, Fairfax, VA, USA, 21-23 July 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5628341/proceeding},
  isbn      = {978-1-4244-8206-1},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/policy/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/services/2010,
  title     = {6th World Congress on Services, {SERVICES} 2010, Miami, Florida, USA,
               July 5-10, 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5575322/proceeding},
  isbn      = {978-0-7695-4129-7},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/services/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sose/2010,
  title     = {The Fifth {IEEE} International Symposium on Service-Oriented System
               Engineering, {SOSE} 2010, June 4-5, 2010, Nanjing, China},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5569877/proceeding},
  isbn      = {978-0-7695-4081-8},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sose/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/srds/2010,
  title     = {29th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2010),
               New Delhi, Punjab, India, October 31 - November 3, 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5623378/proceeding},
  isbn      = {978-0-7695-4250-8},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/srds/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2010,
  editor    = {Alessandro Acquisti and
               Sean W. Smith and
               Ahmad{-}Reza Sadeghi},
  title     = {Trust and Trustworthy Computing, Third International Conference, {TRUST}
               2010, Berlin, Germany, June 21-23, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6101},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13869-0},
  doi       = {10.1007/978-3-642-13869-0},
  isbn      = {978-3-642-13868-3},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2010,
  editor    = {Susanne Wetzel and
               Cristina Nita{-}Rotaru and
               Frank Stajano},
  title     = {Proceedings of the Third {ACM} Conference on Wireless Network Security,
               {WISEC} 2010, Hoboken, New Jersey, USA, March 22-24, 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-60558-923-7},
  timestamp = {Wed, 24 Mar 2010 08:15:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ancs/2009,
  editor    = {Peter Z. Onufryk and
               K. K. Ramakrishnan and
               Patrick Crowley and
               John Wroclawski},
  title     = {Proceedings of the 2009 {ACM/IEEE} Symposium on Architecture for Networking
               and Communications Systems, {ANCS} 2009, Princeton, New Jersey, USA,
               October 19-20, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-630-4},
  timestamp = {Thu, 16 Dec 2010 13:10:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ancs/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009ccsw,
  editor    = {Radu Sion and
               Dawn Song},
  title     = {Proceedings of the first {ACM} Cloud Computing Security Workshop,
               {CCSW} 2009, Chicago, IL, USA, November 13, 2009},
  publisher = {{ACM}},
  year      = {2009},
  url       = {http://dl.acm.org/citation.cfm?id=1655008},
  isbn      = {978-1-60558-784-4},
  timestamp = {Wed, 25 Jan 2012 19:34:16 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2009ccsw},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/colcom/2009,
  editor    = {James B. D. Joshi and
               Tao Zhang},
  title     = {The 5th International Conference on Collaborative Computing: Networking,
               Applications and Worksharing, CollaborateCom 2009, Washington DC,
               USA, November 11-14, 2009},
  publisher = {{ICST} / {IEEE}},
  year      = {2009},
  url       = {http://eudl.eu/proceedings/COLLABORATECOM/2009},
  isbn      = {978-963-9799-76-9},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/colcom/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2009,
  editor    = {Ehud Gudes and
               Jaideep Vaidya},
  title     = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
               Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5645},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-03007-9},
  doi       = {10.1007/978-3-642-03007-9},
  isbn      = {978-3-642-03006-2},
  timestamp = {Tue, 14 May 2019 10:00:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/grid/2009,
  title     = {Proceedings of the 2009 10th {IEEE/ACM} International Conference on
               Grid Computing, October 13-15, 2009, Banff, Alberta, Canada},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5347304/proceeding},
  isbn      = {978-1-4244-5148-7},
  timestamp = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/grid/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icws/2009,
  title     = {{IEEE} International Conference on Web Services, {ICWS} 2009, Los
               Angeles, CA, USA, 6-10 July 2009},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5175785/proceeding},
  isbn      = {978-0-7695-3709-2},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icws/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobisec/2009,
  editor    = {Andreas U. Schmidt and
               Shiguo Lian},
  title     = {Security and Privacy in Mobile Information and Communication Systems,
               First International {ICST} Conference, MobiSec 2009, Turin, Italy,
               June 3-5, 2009, Revised Selected Papers},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {17},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04434-2},
  doi       = {10.1007/978-3-642-04434-2},
  isbn      = {978-3-642-04433-5},
  timestamp = {Fri, 26 May 2017 00:49:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mobisec/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/otm/2009-2,
  editor    = {Robert Meersman and
               Tharam S. Dillon and
               Pilar Herrero},
  title     = {On the Move to Meaningful Internet Systems: {OTM} 2009, Confederated
               International Conferences, CoopIS, DOA, IS, and {ODBASE} 2009, Vilamoura,
               Portugal, November 1-6, 2009, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {5871},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-05151-7},
  doi       = {10.1007/978-3-642-05151-7},
  isbn      = {978-3-642-05150-0},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/otm/2009-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/policy/2009,
  title     = {{POLICY} 2009, {IEEE} International Symposium on Policies for Distributed
               Systems and Networks, London, UK, 20-22 July 2009},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5197366/proceeding},
  isbn      = {978-0-7695-3742-9},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/policy/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2009,
  editor    = {Engin Kirda and
               Somesh Jha and
               Davide Balzarotti},
  title     = {Recent Advances in Intrusion Detection, 12th International Symposium,
               {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5758},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04342-0},
  doi       = {10.1007/978-3-642-04342-0},
  isbn      = {978-3-642-04341-3},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/raid/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2009,
  editor    = {Barbara Carminati and
               James Joshi},
  title     = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2009, Stresa, Italy, June 3-5, 2009, Proceedings},
  publisher = {{ACM}},
  year      = {2009},
  url       = {https://doi.org/10.1145/1542207},
  doi       = {10.1145/1542207},
  isbn      = {978-1-60558-537-6},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/srds/2009,
  title     = {28th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2009),
               Niagara Falls, New York, USA, September 27-30, 2009},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5283050/proceeding},
  isbn      = {978-0-7695-3826-6},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/srds/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2009,
  editor    = {Liqun Chen and
               Chris J. Mitchell and
               Andrew P. Martin},
  title     = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
               UK, April 6-8, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5471},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00587-9},
  doi       = {10.1007/978-3-642-00587-9},
  isbn      = {978-3-642-00586-2},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008asia,
  editor    = {Masayuki Abe and
               Virgil D. Gligor},
  title     = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
               2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-59593-979-1},
  timestamp = {Tue, 21 Nov 2017 18:32:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2008asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/colcom/2008,
  editor    = {Elisa Bertino and
               James B. D. Joshi},
  title     = {Collaborative Computing: Networking, Applications and Worksharing,
               4th International Conference, CollaborateCom 2008, Orlando, FL, USA,
               November 13-16, 2008, Revised Selected Papers},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {10},
  publisher = {Springer / {ICST}},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-03354-4},
  doi       = {10.1007/978-3-642-03354-4},
  isbn      = {978-3-642-03353-7},
  timestamp = {Sun, 21 May 2017 00:20:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/colcom/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcsw/2008,
  title     = {28th {IEEE} International Conference on Distributed Computing Systems
               Workshops {(ICDCS} 2008 Workshops), 17-20 June 2008, Beijing, China},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/4577720/proceeding},
  isbn      = {978-0-7695-3173-1},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdcsw/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iscc/2008,
  title     = {Proceedings of the 13th {IEEE} Symposium on Computers and Communications
               {(ISCC} 2008), July 6-9, Marrakech, Morocco},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/4607772/proceeding},
  isbn      = {978-1-4244-2702-4},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iscc/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/policy/2008,
  title     = {9th {IEEE} International Workshop on Policies for Distributed Systems
               and Networks {(POLICY} 2008), 2-4 June 2008, Palisades, New York,
               {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/4556560/proceeding},
  isbn      = {978-0-7695-3133-5},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/policy/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2008,
  editor    = {Indrakshi Ray and
               Ninghui Li},
  title     = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  publisher = {{ACM}},
  year      = {2008},
  url       = {https://doi.org/10.1145/1377836},
  doi       = {10.1145/1377836},
  isbn      = {978-1-60558-129-3},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sutc/2008,
  editor    = {Mukesh Singhal and
               Giovanna Di Marzo Serugendo and
               Jeffrey J. P. Tsai and
               Wang{-}Chien Lee and
               Kay R{\"{o}}mer and
               Yu{-}Chee Tseng and
               Han C. W. Hsiao},
  title     = {{IEEE} International Conference on Sensor Networks, Ubiquitous, and
               Trustworthy Computing {(SUTC} 2008), 11-13 June 2008, Taichung, Taiwan},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/4545722/proceeding},
  isbn      = {978-0-7695-3158-8},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sutc/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sws/2008,
  editor    = {Ernesto Damiani and
               Seth Proctor},
  title     = {Proceedings of the 5th {ACM} Workshop On Secure Web Services, {SWS}
               2008, Alexandria, VA, USA, October 31, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-60558-292-4},
  timestamp = {Tue, 11 Nov 2008 12:49:16 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sws/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007stc,
  editor    = {Peng Ning and
               Vijay Atluri and
               Shouhuai Xu and
               Moti Yung},
  title     = {Proceedings of the 2nd {ACM} Workshop on Scalable Trusted Computing,
               {STC} 2007, Alexandria, VA, USA, November 2, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-888-6},
  timestamp = {Tue, 11 Nov 2008 13:23:09 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2007stc},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007asia,
  editor    = {Feng Bao and
               Steven Miller},
  title     = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {1-59593-574-6},
  timestamp = {Tue, 21 Nov 2017 18:32:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2007asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2007,
  editor    = {Steve Barker and
               Gail{-}Joon Ahn},
  title     = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
               Conference on Data and Applications Security, Redondo Beach, CA, USA,
               July 8-11, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4602},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-73538-0},
  doi       = {10.1007/978-3-540-73538-0},
  isbn      = {978-3-540-73533-5},
  timestamp = {Tue, 14 May 2019 10:00:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/edoc/2007,
  title     = {11th {IEEE} International Enterprise Distributed Object Computing
               Conference {(EDOC} 2007), 15-19 October 2007, Annapolis, Maryland,
               {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/4383963/proceeding},
  isbn      = {0-7695-2891-0},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/edoc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hase/2007,
  title     = {Tenth {IEEE} International Symposium on High Assurance Systems Engineering
               {(HASE} 2007), November 14-16, 2007, Dallas, Texas, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/4404711/proceeding},
  isbn      = {0-7695-3043-5},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hase/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2007,
  editor    = {Volkmar Lotz and
               Bhavani M. Thuraisingham},
  title     = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings},
  publisher = {{ACM}},
  year      = {2007},
  url       = {https://doi.org/10.1145/1266840},
  doi       = {10.1145/1266840},
  isbn      = {978-1-59593-745-2},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sws/2007,
  editor    = {Peng Ning and
               Ernesto Damiani and
               Seth Proctor},
  title     = {Proceedings of the 4th {ACM} Workshop On Secure Web Services, {SWS}
               2007, Fairfax, VA, USA, November 2, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-892-3},
  timestamp = {Tue, 22 Apr 2008 11:20:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sws/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ancs/2006,
  editor    = {Laxmi N. Bhuyan and
               Michel Dubois and
               Will Eatherton},
  title     = {Proceedings of the 2006 {ACM/IEEE} Symposium on Architecture for Networking
               and Communications Systems, {ANCS} 2006, San Jose, California, USA,
               December 3-5, 2006},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-580-0},
  timestamp = {Tue, 15 May 2007 08:08:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ancs/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2006,
  editor    = {Ferng{-}Ching Lin and
               Der{-}Tsai Lee and
               Bao{-}Shuh Paul Lin and
               Shiuhpyng Shieh and
               Sushil Jajodia},
  title     = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
               2006},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-272-0},
  timestamp = {Tue, 21 Nov 2017 18:32:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/colcom/2006,
  editor    = {Enrico Blanzieri and
               Tao Zhang},
  title     = {2nd International {ICST} Conference on Collaborative Computing: Networking,
               Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA,
               November 17-20, 2006},
  publisher = {{IEEE} Computer Society / {ICST}},
  year      = {2006},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/4207500/proceeding},
  isbn      = {1-4244-0429-0},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/colcom/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2006,
  editor    = {Hiroshi Yoshiura and
               Kouichi Sakurai and
               Kai Rannenberg and
               Yuko Murayama and
               Shin{-}ichi Kawamura},
  title     = {Advances in Information and Computer Security, First International
               Workshop on Security, {IWSEC} 2006, Kyoto, Japan, October 23-24, 2006,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4266},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11908739},
  doi       = {10.1007/11908739},
  isbn      = {3-540-47699-7},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2006,
  editor    = {David F. Ferraiolo and
               Indrakshi Ray},
  title     = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings},
  publisher = {{ACM}},
  year      = {2006},
  url       = {https://doi.org/10.1145/1133058},
  doi       = {10.1145/1133058},
  isbn      = {1-59593-353-0},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sac/2005,
  editor    = {Hisham Haddad and
               Lorie M. Liebrock and
               Andrea Omicini and
               Roger L. Wainwright},
  title     = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC),
               Santa Fe, New Mexico, USA, March 13-17, 2005},
  publisher = {{ACM}},
  year      = {2005},
  url       = {https://doi.org/10.1145/1066677},
  doi       = {10.1145/1066677},
  isbn      = {1-58113-964-0},
  timestamp = {Tue, 06 Nov 2018 11:06:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sac/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2005,
  editor    = {Elena Ferrari and
               Gail{-}Joon Ahn},
  title     = {10th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2005, Stockholm, Sweden, June 1-3, 2005, Proceedings},
  publisher = {{ACM}},
  year      = {2005},
  url       = {https://doi.org/10.1145/1063979},
  doi       = {10.1145/1063979},
  isbn      = {1-59593-045-0},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2004,
  editor    = {Csilla Farkas and
               Pierangela Samarati},
  title     = {Research Directions in Data and Applications Security XVIII, {IFIP}
               {TC11/WG} 11.3 Eighteenth Annual Conference on Data and Applications
               Security, July 25-28, 2004, Sitges, Catalonia, Spain},
  series    = {{IFIP}},
  volume    = {144},
  publisher = {Kluwer/Springer},
  year      = {2004},
  isbn      = {1-4020-8127-8},
  timestamp = {Wed, 29 Mar 2017 16:45:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ride/2004,
  title     = {14th International Workshop on Research Issues in Data Engineering
               {(RIDE-WS-ECEG} 2004), Web Services for E-Commerce and E-Government
               Applications, 28-29 March 2004, Boston, MA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2004},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/9018/proceeding},
  isbn      = {0-7695-2095-2},
  timestamp = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ride/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2004,
  editor    = {Trent Jaeger and
               Elena Ferrari},
  title     = {9th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings},
  publisher = {{ACM}},
  year      = {2004},
  url       = {https://doi.org/10.1145/990036},
  doi       = {10.1145/990036},
  isbn      = {1-58113-872-5},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2003,
  editor    = {Sabrina De Capitani di Vimercati and
               Indrakshi Ray and
               Indrajit Ray},
  title     = {Data and Applications Security {XVII:} Status and Prospects, {IFIP}
               {TC-11} {WG} 11.3 Seventeenth Annual Working Conference on Data and
               Application Security, August4-6, 2003, Estes Park, Colorado, {USA}},
  series    = {{IFIP}},
  volume    = {142},
  publisher = {Kluwer/Springer},
  year      = {2004},
  isbn      = {1-4020-8069-7},
  timestamp = {Wed, 29 Mar 2017 16:45:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2003,
  editor    = {Elena Ferrari and
               David F. Ferraiolo},
  title     = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings},
  publisher = {{ACM}},
  year      = {2003},
  url       = {https://doi.org/10.1145/775412},
  doi       = {10.1145/775412},
  isbn      = {1-58113-681-1},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics