Dan Lin
TitleCited byYear
Query and update efficient B+-tree based indexing of moving objects
CS Jensen, D Lin, BC Ooi
Proceedings of the Thirtieth international conference on Very large data …, 2004
4312004
Ensuring distributed accountability for data sharing in the cloud
S Sundareswaran, A Squicciarini, D Lin
IEEE transactions on dependable and secure computing 9 (4), 556-568, 2012
1972012
A brokerage-based approach for cloud service selection
S Sundareswaran, A Squicciarini, D Lin
2012 IEEE Fifth International Conference on Cloud Computing, 558-565, 2012
1482012
Continuous clustering of moving objects
CS Jensen, D Lin, BC Ooi
IEEE Transactions on Knowledge and Data Engineering 19 (9), 1161-1174, 2007
1452007
An approach to evaluate data trustworthiness based on data provenance
C Dai, D Lin, E Bertino, M Kantarcioglu
Workshop on Secure Data Management, 82-98, 2008
1392008
A survey of quantification of privacy preserving data mining algorithms
E Bertino, D Lin, W Jiang
Privacy-preserving data mining, 183-205, 2008
1282008
Effective density queries on continuouslymoving objects
CS Jensen, D Lin, BC Ooi, R Zhang
22nd International Conference on Data Engineering (ICDE'06), 71-71, 2006
1132006
Access control policy combining: theory meets practice
N Li, Q Wang, W Qardaji, E Bertino, P Rao, J Lobo, D Lin
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1112009
iPrivacy: image privacy protection by identifying sensitive objects via deep multi-task learning
J Yu, B Zhang, Z Kuang, D Lin, J Fan
IEEE Transactions on Information Forensics and Security 12 (5), 1005-1016, 2016
1022016
An algebra for fine-grained integration of XACML policies
P Rao, D Lin, E Bertino, N Li, J Lobo
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1022009
Efficient indexing of the historical, present, and future positions of moving objects
D Lin, CS Jensen, BC Ooi, S Šaltenis
Proceedings of the 6th international conference on Mobile data management, 59-66, 2005
1022005
A benchmark for evaluating moving object indexes
S Chen, CS Jensen, D Lin
Proceedings of the VLDB Endowment 1 (2), 1574-1585, 2008
902008
Preventing information leakage from indexing in the cloud
A Squicciarini, S Sundareswaran, D Lin
2010 IEEE 3rd International Conference on Cloud Computing, 188-195, 2010
882010
An approach to evaluate policy similarity
D Lin, P Rao, E Bertino, J Lobo
Proceedings of the 12th ACM symposium on Access control models and …, 2007
782007
A3p: adaptive policy prediction for shared images over popular content sharing sites
AC Squicciarini, S Sundareswaran, D Lin, J Wede
Proceedings of the 22nd ACM conference on Hypertext and hypermedia, 261-270, 2011
742011
Conditional privacy-aware role based access control
Q Ni, D Lin, E Bertino, J Lobo
European Symposium on Research in Computer Security, 72-89, 2007
732007
MoZo: A moving zone based routing protocol using pure V2V communication in VANETs
D Lin, J Kang, A Squicciarini, Y Wu, S Gurung, O Tonguz
IEEE Transactions on Mobile Computing 16 (5), 1357-1370, 2016
702016
Promoting distributed accountability in the cloud
S Sundareswaran, A Squicciarini, D Lin, S Huang
2011 IEEE 4th International Conference on Cloud Computing, 113-120, 2011
702011
EXAM: a comprehensive environment for the analysis of access control policies
D Lin, P Rao, E Bertino, N Li, J Lobo
International Journal of Information Security 9 (4), 253-273, 2010
672010
Data protection models for service provisioning in the cloud
D Lin, A Squicciarini
Proceedings of the 15th ACM symposium on Access control models and …, 2010
602010
The system can't perform the operation now. Try again later.
Articles 1–20