Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Gansen Zhao
2010 – today
- 2013
[j4]Qi Chen, Dingyi Pei, Chunming Tang, Gansen Zhao: Efficient integer span program for hierarchical threshold access structure. Inf. Process. Lett. 113(17): 621-627 (2013)
[j3]Jianguo Li, Gansen Zhao, Chunming Rong, Yong Tang: Semantic description of scholar-oriented social network cloud. The Journal of Supercomputing 65(1): 410-425 (2013)- 2012
[j2]Gansen Zhao, Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes: Reference deployment models for eliminating user concerns on cloud security. The Journal of Supercomputing 61(2): 337-352 (2012)
[c18]Jin Liu, Chunming Rong, Gansen Zhao: A fast estimation of shortest path distance for power-law network predominant cloud service. CloudCom 2012: 480-487
[c17]Xiaohui Hu, Gansen Zhao, Lvjun Zhan, Yun Xue, Weixing Zhou: Isolated Word Speech Rcogniton Based on HRSF and Improved DTW Algorithm. Web Intelligence/IAT Workshops 2012: 270-273
[c16]Jian Chen, Guanliang Chen, Hao Lan Zhang, Jin Huang, Gansen Zhao: Social Recommendation Based on Multi-relational Analysis. IAT 2012: 471-477
[e5]Tai-Hoon Kim, Hojjat Adeli, Wai-Chi Fang, Thanos Vasilakos, Adrian Stoica, Charalampos Z. Patrikakis, Gansen Zhao, L. Javier García-Villalba, Yang Xiao (Eds.): Communication and Networking - International Conference, FGCN 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part I. Communications in Computer and Information Science 265, Springer 2012, ISBN 978-3-642-27191-5- 2011
[c15]Martin Gilje Jaatun, Gansen Zhao, Stian Alapnes: A Cryptographic Protocol for Communication in a Redundant Array of Independent Net-storages. CloudCom 2011: 172-179
[e4]Tai-Hoon Kim, Hojjat Adeli, Wai-Chi Fang, Thanos Vasilakos, Adrian Stoica, Charalampos Z. Patrikakis, Gansen Zhao, L. Javier García-Villalba, Yang Xiao (Eds.): Communication and Networking - International Conference, FGCN 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part II. Communications in Computer and Information Science 266, Springer 2011, ISBN 978-3-642-27200-4- 2010
[c14]Jin Li, Gansen Zhao, Xiaofeng Chen, Dongqing Xie, Chunming Rong, Wenjun Li, Lianzhang Tang, Yong Tang: Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing. CloudCom 2010: 89-96
[c13]Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, Yong Tang: Trusted Data Sharing over Untrusted Cloud Storage Providers. CloudCom 2010: 97-103
[c12]Gansen Zhao, Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes: Deployment models: Towards eliminating security concerns from cloud computing. HPCS 2010: 189-195
[e3]Tai-Hoon Kim, Thanos Vasilakos, Kouichi Sakurai, Yang Xiao, Gansen Zhao, Dominik Slezak (Eds.): Communication and Networking - International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part II. Communications in Computer and Information Science 120, Springer 2010, ISBN 978-3-642-17603-6
2000 – 2009
- 2009
[c11]Ana Ferreira, David W. Chadwick, Pedro Farinha, Ricardo João Cruz Correia, Gansen Zhao, Rui Chilro, Luis Filipe Coelho Antunes: How to Securely Break into RBAC: The BTG-RBAC Model. ACSAC 2009: 23-31
[c10]Feng Zhang, Gansen Zhao, Tingyan Xing: Privacy-Preserving Distributed k-Nearest Neighbor Mining on Horizontally Partitioned Multi-Party Data. ADMA 2009: 755-762
[c9]Liang Yan, Chunming Rong, Gansen Zhao: Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography. CloudCom 2009: 167-177
[c8]Gansen Zhao, Jiale Liu, Yong Tang, Wei Sun, Feng Zhang, Xiao-ping Ye, Na Tang: Cloud Computing: A Statistics Aspect of Users. CloudCom 2009: 347-358
[e2]Martin Gilje Jaatun, Gansen Zhao, Chunming Rong (Eds.): Cloud Computing, First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings. Lecture Notes in Computer Science 5931, Springer 2009, ISBN 978-3-642-10664-4- 2008
[j1]David W. Chadwick, Gansen Zhao, Sassa Otenko, Romain Laborde, Linying Su, Tuan-Anh Nguyen: PERMIS: a modular authorization infrastructure. Concurrency and Computation: Practice and Experience 20(11): 1341-1357 (2008)
[c7]Haoliang Zhai, Gansen Zhao, Lei Li, Jianxiong Huang: A Role-Based Access Control Model for Complex Affairs. CSSE (3) 2008: 646-650
[c6]Gansen Zhao, David W. Chadwick: On the Modeling of Bell-LaPadula Security Policies Using RBAC. WETICE 2008: 257-262- 2007
[c5]Gansen Zhao, David W. Chadwick, Sassa Otenko: Obligations for Role Based Access Control. AINA Workshops (1) 2007: 424-431- 2006
[c4]Gansen Zhao, Sassa Otenko, David W. Chadwick: Distributed Key Management for Secure Role based Messaging. AINA (1) 2006: 132-137- 2005
[c3]Xinming Wang, Gansen Zhao, Xin Zhang, Beihong Jin: An Agent-Based Model For Web Services Transaction Processing. EEE 2005: 186-189
[c2]Gansen Zhao, David W. Chadwick: Evolving Messaging Systems for Secure Role Based Messaging. ICECCS 2005: 216-223
[c1]Gansen Zhao, David W. Chadwick: Trust Infrastructure for Policy based Messaging In Open Environments. WETICE 2005: 144-149
[e1]David W. Chadwick, Gansen Zhao (Eds.): Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3545, Springer 2005, ISBN 3-540-28062-6
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:24 CEST by the dblp team



