Qun Ni
Qun Ni
Software Engineer, Google Inc
Verified email at google.com
TitleCited byYear
Privacy-aware role-based access control
Q Ni, E Bertino, J Lobo, C Brodie, CM Karat, J Karat, A Trombeta
ACM Transactions on Information and System Security (TISSEC) 13 (3), 24, 2010
3852010
Risk-based access control systems built on fuzzy inferences
Q Ni, E Bertino, J Lobo
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
1262010
An obligation model bridging access control policies and privacy policies.
Q Ni, E Bertino, J Lobo
SACMAT 8, 133-142, 2008
1062008
An access control language for a general provenance model
Q Ni, S Xu, E Bertino, R Sandhu, W Han
Workshop on Secure Data Management, 68-88, 2009
792009
Conditional privacy-aware role based access control
Q Ni, D Lin, E Bertino, J Lobo
European Symposium on Research in Computer Security, 72-89, 2007
732007
D-algebra for composing access control policy decisions
Q Ni, E Bertino, J Lobo
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
682009
Privacy-aware role-based access control
Q Ni, E Bertino, J Lobo, SB Calo
IEEE Security & Privacy 7 (4), 35-43, 2009
622009
Analysis of privacy and security policies
E Bertino, C Brodie, SB Calo, LF Cranor, C Karat, J Karat, N Li, D Lin, ...
IBM Journal of Research and Development 53 (2), 3: 1-3: 18, 2009
432009
Multi-domain and privacy-aware role based access control in ehealth
LD Martino, Q Ni, D Lin, E Bertino
2008 Second International Conference on Pervasive Computing Technologies for …, 2008
412008
Automating role-based provisioning by learning from examples
Q Ni, J Lobo, S Calo, P Rohatgi, E Bertino
Proceedings of the 14th ACM symposium on Access control models and …, 2009
342009
Policy framework for security and privacy management
J Karat, CM Karat, E Bertino, N Li, Q Ni, C Brodie, J Lobo, SB Calo, ...
IBM Journal of Research and Development 53 (2), 4: 1-4: 14, 2009
262009
A characterization of the problem of secure provenance management
S Xu, Q Ni, E Bertino, R Sandhu
2009 IEEE International Conference on Intelligence and Security Informatics …, 2009
252009
Access control policy analysis and visualization tools for security professionals
K Vaniea, Q Ni, L Cranor, E Bertino
SOUPS Workshop (USM), 2008
202008
An ontology-enabled service oriented architecture for pervasive computing
Q Ni, M Sloman
International Conference on Information Technology: Coding and Computing …, 2005
202005
Apply measurable risk to strengthen security of a role-based delegation supporting workflow system
W Han, Q Ni, H Chen
2009 IEEE International Symposium on Policies for Distributed Systems and …, 2009
182009
Service composition in ontology enabled service oriented architecture for pervasive computing
Q Ni
Workshop on ubiquitous computing and e-research, 242-257, 2005
172005
xfACL: an extensible functional language for access control
Q Ni, E Bertino
Proceedings of the 16th ACM symposium on Access control models and …, 2011
152011
Privacy-aware RBAC-leveraging RBAC for privacy
Q Ni, E Bertino, J Lobo
IEEE Security and Privacy to appear, 2009
42009
Credibility-enhanced curated database: Improving the value of curated databases
Q Ni, E Bertino
2010 IEEE 26th International Conference on Data Engineering (ICDE 2010), 784-795, 2010
22010
Aggregating uncertain access risk estimations from different sources invited paper
Q Ni, E Bertino
2009 5th International Conference on Collaborative Computing: Networking …, 2009
12009
The system can't perform the operation now. Try again later.
Articles 1–20