default search action
Qiang Tang 0001
Person information
- affiliation: Luxembourg Institute of Science and Technology, Luxembourg
- affiliation (former): University of Twente, Enschede, The Netherlands
- affiliation (PhD 2007): University of London, UK
Other persons with the same name
- Qiang Tang — disambiguation page
- Qiang Tang 0002 — University of British Columbia, Vancouver, BC, Canada
- Qiang Tang 0003 — Sun Yat-sen University, Guangzhou, China
- Qiang Tang 0004 — Huazhong University of Science and Technology, Wuhan, China
- Qiang Tang 0005 — University of Sydney, Sydney, Australia (and 5 more)
- Qiang Tang 0006 — Changsha University of Science and Technology, School of Computer and Communication Engineering, China
- Qiang Tang 0007 — Loughborough University, Applied Vision Research Centre, UK
- Qiang Tang 0008 — Wuhan Textile University, China
- Qiang Tang 0010 — Micron, Milpitas, CA, USA
- Qiang Tang 0011 — Wuhan University of Science and Engineering, Department of Mathematics and Physics, China
- Qiang Tang 0012 — Huaiyin Institute of Technology, Faculty of Mechanical and Material Engineering, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j36]Bowen Liu, Qiang Tang:
Secure Data Sharing in Federated Learning through Blockchain-Based Aggregation. Future Internet 16(4): 133 (2024) - [c57]Yuejun Guo, Constantinos Patsakis, Qiang Hu, Qiang Tang, Fran Casino:
Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection. ESORICS (1) 2024: 271-289 - [i49]Yuejun Guo, Constantinos Patsakis, Qiang Hu, Qiang Tang, Fran Casino:
Outside the Comfort Zone: Analysing LLM Capabilities in Software Vulnerability Detection. CoRR abs/2408.16400 (2024) - 2023
- [j35]Yilun Jin, Yang Liu, Kai Chen, Qiang Tang:
Federated Learning without Full Labels: A Survey. IEEE Data Eng. Bull. 46(1): 27-51 (2023) - [j34]Yuejun Guo, Orhan Ermis, Qiang Tang, Hoang Trang, Alexandre De Oliveira:
An Empirical Study of Deep Learning-Based SS7 Attack Detection. Inf. 14(9): 509 (2023) - [j33]Abdelwahab Boualouache, Bouziane Brik, Qiang Tang, Abdelaziz Amara Korba, Sylvain Cherrier, Sidi-Mohammed Senouci, Enric Pardo, Yacine Ghamri-Doudane, Rami Langar, Thomas Engel:
5G Vehicle-to-Everything at the Cross-Borders: Security Challenges and Opportunities. IEEE Internet Things Mag. 6(1): 114-119 (2023) - [c56]Yuejun Guo, Qiang Hu, Qiang Tang, Yves Le Traon:
An Empirical Study of the Imbalance Issue in Software Vulnerability Detection. ESORICS (4) 2023: 371-390 - [i48]Yuejun Guo, Seifeddine Bettaieb, Qiang Hu, Yves Le Traon, Qiang Tang:
CodeLens: An Interactive Tool for Visualizing Code Representations. CoRR abs/2307.14902 (2023) - 2022
- [j32]Qiang Tang, Orhan Ermis, Cu D. Nguyen, Alexandre De Oliveira, Alain Hirtzig:
A Systematic Analysis of 5G Networks With a Focus on 5G Core Security. IEEE Access 10: 18298-18319 (2022) - [j31]Bowen Liu, Qiang Tang, Jianying Zhou:
Modular Framework for Constructing IoT-Server AKE in Post-Quantum Setting. IEEE Access 10: 71598-71611 (2022) - [j30]Petr Dzurenda, Florian Jacques, Manon Knockaert, Maryline Laurent, Lukas Malina, Raimundas Matulevicius, Qiang Tang, Aimilia Tasidou:
Privacy-preserving solution for vehicle parking services complying with EU legislation. PeerJ Comput. Sci. 8: e1165 (2022) - [j29]Jun Wang, Chao Jin, Qiang Tang, Zhe Liu, Khin Mi Mi Aung:
CryptoRec: Novel Collaborative Filtering Recommender Made Privacy-Preserving Easy. IEEE Trans. Dependable Secur. Comput. 19(4): 2622-2634 (2022) - [j28]Qiang Tang:
Another Look at Privacy-Preserving Automated Contact Tracing. ACM Trans. Spatial Algorithms Syst. 8(2): 1-27 (2022) - [c55]Orhan Ermis, Christophe Feltus, Qiang Tang, Hoang Trang, Alexandre De Oliveira, Cu D. Nguyen, Alain Hirtzig:
A CNN-Based Semi-supervised Learning Approach for the Detection of SS7 Attacks. ISPEC 2022: 345-363 - [i47]Bowen Liu, Qiang Tang:
Privacy-preserving Federated Singular Value Decomposition. IACR Cryptol. ePrint Arch. 2022: 1271 (2022) - 2021
- [j27]Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-Amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang:
Post-Quantum Era Privacy Protection for Intelligent Infrastructures. IEEE Access 9: 36038-36077 (2021) - [j26]Qiang Tang:
Towards Using Blockchain Technology to Prevent Diploma Fraud. IEEE Access 9: 168678-168688 (2021) - [c54]Bowen Liu, Qiang Tang, Jianying Zhou:
Bigdata-Facilitated Two-Party Authenticated Key Exchange for IoT. ISC 2021: 95-116 - [i46]Bowen Liu, Qiang Tang, Jianying Zhou:
Bigdata-facilitated Two-party Authenticated Key Exchange for IoT. IACR Cryptol. ePrint Arch. 2021: 1127 (2021) - [i45]Qiang Tang:
Towards Using Blockchain Technology to Prevent Diploma Fraud. IACR Cryptol. ePrint Arch. 2021: 1566 (2021) - 2020
- [i44]Qiang Tang:
Privacy-Preserving Contact Tracing: current solutions and open questions. CoRR abs/2004.06818 (2020) - [i43]Qiang Tang:
Another Look at Privacy-Preserving Automated Contact Tracing. CoRR abs/2010.13462 (2020) - [i42]Qiang Tang:
Privacy-Preserving Contact Tracing: current solutions and open questions. IACR Cryptol. ePrint Arch. 2020: 426 (2020)
2010 – 2019
- 2019
- [j25]Balazs Pejo, Qiang Tang, Gergely Biczók:
Together or Alone: The Price of Privacy in Collaborative Learning. Proc. Priv. Enhancing Technol. 2019(2): 47-65 (2019) - [j24]Erman Ayday, Qiang Tang, Arif Yilmaz:
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data. IEEE Trans. Dependable Secur. Comput. 16(1): 33-43 (2019) - [c53]Qiang Tang:
Privacy-Preserving and yet Robust Collaborative Filtering Recommender as a Service. Inscrypt 2019: 199-207 - [c52]Qiang Tang:
Towards Blockchain-Enabled Searchable Encryption. ICICS 2019: 482-500 - [c51]Bowen Liu, Qiang Tang:
Privacy-Preserving Decentralised Singular Value Decomposition. ICICS 2019: 703-721 - [c50]Jun Wang, Qiang Tang, Afonso Arriaga, Peter Y. A. Ryan:
Novel Collaborative Filtering Recommender Friendly to Privacy Protection. IJCAI 2019: 4809-4815 - [i41]Qiang Tang:
Towards Blockchain-enabled Searchable Encryption. CoRR abs/1908.09564 (2019) - [i40]Qiang Tang:
Privacy-preserving and yet Robust Collaborative Filtering Recommender as a Service. CoRR abs/1910.03846 (2019) - [i39]Bowen Liu, Qiang Tang:
Privacy-Preserving Decentralised Singular Value Decomposition. IACR Cryptol. ePrint Arch. 2019: 1346 (2019) - 2018
- [j23]Husen Wang, Qiang Tang:
Efficient Homomorphic Integer Polynomial Evaluation Based on GSW FHE. Comput. J. 61(4): 575-585 (2018) - [j22]Vincenzo Iovino, Qiang Tang, Karol Zebrowski:
Power of public-key function-private functional encryption. IET Inf. Secur. 12(4): 248-256 (2018) - [j21]Qiang Tang, Jun Wang:
Privacy-Preserving Friendship-Based Recommender Systems. IEEE Trans. Dependable Secur. Comput. 15(5): 784-796 (2018) - [c49]Balázs Pejó, Qiang Tang, Gergely Biczók:
The Price of Privacy in Collaborative Learning. CCS 2018: 2261-2263 - [c48]Jun Wang, Afonso Arriaga, Qiang Tang, Peter Y. A. Ryan:
Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning. CCS 2018: 2306-2308 - [p3]Qiang Tang:
Privacy in Collaborative Recommenders. Collaborative Recommendations 2018: 431-464 - [i38]Jun Wang, Afonso Arriaga, Qiang Tang, Peter Y. A. Ryan:
CryptoRec: Secure Recommendations as a Service. CoRR abs/1802.02432 (2018) - 2017
- [c47]Balazs Pejo, Qiang Tang:
To Cheat or Not to Cheat: A Game-Theoretic Analysis of Outsourced Computation Verification. SCC@AsiaCCS 2017: 3-10 - [c46]Qiang Tang, Husen Wang:
Privacy-preserving Hybrid Recommender System. SCC@AsiaCCS 2017: 59-66 - [c45]Jun Wang, Qiang Tang:
Differentially Private Neighborhood-Based Recommender Systems. SEC 2017: 459-473 - [i37]Jun Wang, Qiang Tang:
A Probabilistic View of Neighborhood-based Recommendation Methods. CoRR abs/1701.01250 (2017) - [i36]Jun Wang, Qiang Tang:
Differentially Private Neighborhood-based Recommender Systems. CoRR abs/1701.02120 (2017) - [i35]Balazs Pejo, Qiang Tang, Afonso Arriaga:
Together or Alone: The Price of Privacy in Joint Learning. CoRR abs/1712.00270 (2017) - 2016
- [c44]Qiang Tang, Balazs Pejo, Husen Wang:
Protect Both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations. CLOUD 2016: 941-946 - [c43]Jean Lancrenon, Marjan Skrobot, Qiang Tang:
Two More Efficient Variants of the J-PAKE Protocol. ACNS 2016: 58-76 - [c42]Vincenzo Iovino, Qiang Tang, Karol Zebrowski:
On the Power of Public-key Function-Private Functional Encryption. CANS 2016: 585-593 - [c41]Jun Wang, Qiang Tang:
A Probabilistic View of Neighborhood-Based Recommendation Methods. ICDM Workshops 2016: 14-20 - [c40]Afonso Arriaga, Vincenzo Iovino, Qiang Tang:
Updatable Functional Encryption. Mycrypt 2016: 347-363 - [i34]Qiang Tang, Balazs Pejo, Husen Wang:
Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations. IACR Cryptol. ePrint Arch. 2016: 79 (2016) - [i33]Jean Lancrenon, Marjan Skrobot, Qiang Tang:
Two More Efficient Variants of the J-PAKE Protocol. IACR Cryptol. ePrint Arch. 2016: 379 (2016) - [i32]Erman Ayday, Qiang Tang, Arif Yilmaz:
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data. IACR Cryptol. ePrint Arch. 2016: 478 (2016) - [i31]Husen Wang, Qiang Tang:
Methods for Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE. IACR Cryptol. ePrint Arch. 2016: 488 (2016) - [i30]Qiang Tang, Balazs Pejo:
Game-Theoretic Framework for Integrity Veri cation in Computation Outsourcing. IACR Cryptol. ePrint Arch. 2016: 639 (2016) - [i29]Qiang Tang, Husen Wang:
Privacy-preserving Hybrid Recommender System. IACR Cryptol. ePrint Arch. 2016: 1134 (2016) - [i28]Afonso Arriaga, Vincenzo Iovino, Qiang Tang:
Updatable Functional Encryption. IACR Cryptol. ePrint Arch. 2016: 1179 (2016) - 2015
- [j20]Qiang Tang, Hua Ma, Xiaofeng Chen:
Extend the Concept of Public Key Encryption with Delegated Search. Comput. J. 58(4): 724-734 (2015) - [j19]Qiang Tang:
From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data. Comput. J. 58(4): 1003-1020 (2015) - [j18]Xiaofeng Chen, Willy Susilo, Jin Li, Duncan S. Wong, Jianfeng Ma, Shaohua Tang, Qiang Tang:
Efficient algorithms for secure outsourcing of bilinear pairings. Theor. Comput. Sci. 562: 112-121 (2015) - [c39]Qiang Tang:
Towards Forward Security Properties for PEKS and IBE. ACISP 2015: 127-144 - [c38]Qiang Tang, Jun Wang:
Privacy-Preserving Context-Aware Recommender Systems: Analysis and New Solutions. ESORICS (2) 2015: 101-119 - [c37]Massimo Chenal, Qiang Tang:
Key Recovery Attacks Against NTRU-Based Somewhat Homomorphic Encryption Schemes. ISC 2015: 397-418 - [p2]Jiuyong Li, Sarowar A. Sattar, Muzammil M. Baig, Jixue Liu, Raymond Heatherly, Qiang Tang, Bradley A. Malin:
Methods to Mitigate Risk of Composition Attack in Independent Data Publications. Medical Data Privacy Handbook 2015: 179-200 - [i27]Massimo Chenal, Qiang Tang:
Key Recovery Attack against an NTRU-type Somewhat Homomorphic Encryption Scheme. IACR Cryptol. ePrint Arch. 2015: 83 (2015) - [i26]Qiang Tang, Jun Wang:
Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions. IACR Cryptol. ePrint Arch. 2015: 364 (2015) - [i25]Vincenzo Iovino, Qiang Tang, Karol Zebrowski:
On the Power of Public-key Functional Encryption with Function Privacy. IACR Cryptol. ePrint Arch. 2015: 470 (2015) - [i24]Jun Wang, Qiang Tang:
Recommender Systems and their Security Concerns. IACR Cryptol. ePrint Arch. 2015: 1108 (2015) - [i23]Qiang Tang, Jun Wang:
Privacy-preserving Friendship-based Recommender Systems. IACR Cryptol. ePrint Arch. 2015: 1152 (2015) - 2014
- [j17]Qiang Tang:
Nothing is for Free: Security in Searching Shared and Encrypted Data. IEEE Trans. Inf. Forensics Secur. 9(11): 1943-1952 (2014) - [j16]Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou:
New Algorithms for Secure Outsourcing of Modular Exponentiations. IEEE Trans. Parallel Distributed Syst. 25(9): 2386-2396 (2014) - [c36]Afonso Arriaga, Qiang Tang, Peter Y. A. Ryan:
Trapdoor Privacy in Asymmetric Searchable Encryption Schemes. AFRICACRYPT 2014: 31-50 - [c35]Massimo Chenal, Qiang Tang:
On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes. LATINCRYPT 2014: 239-258 - [c34]Christoph Bösch, Andreas Peter, Bram Leenders, Hoon Wei Lim, Qiang Tang, Huaxiong Wang, Pieter H. Hartel, Willem Jonker:
Distributed Searchable Symmetric Encryption. PST 2014: 330-337 - [i22]Qiang Tang:
Nothing is for Free: Security in Searching Shared & Encrypted Data. IACR Cryptol. ePrint Arch. 2014: 362 (2014) - [i21]Massimo Chenal, Qiang Tang:
On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes. IACR Cryptol. ePrint Arch. 2014: 535 (2014) - [i20]Qiang Tang:
An Investigation of Some Forward Security Properties for PEKS and IBE. IACR Cryptol. ePrint Arch. 2014: 560 (2014) - [i19]Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Y. A. Ryan, Konstantinos Kalpakis:
DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity. IACR Cryptol. ePrint Arch. 2014: 670 (2014) - 2013
- [j15]Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, Xiaofeng Chen:
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2): 667-684 (2013) - [c33]Qiang Tang, Xiaofeng Chen:
Towards asymmetric searchable encryption with message recovery and flexible search authorization. AsiaCCS 2013: 253-264 - [c32]Qiang Tang:
Towards a Privacy-Preserving Solution for OSNs. NSS 2013: 635-641 - [c31]Dalia Khader, Qiang Tang, Peter Y. A. Ryan:
Proving Prêt à Voter Receipt Free Using Computational Security Models. EVT/WOTE 2013 - [p1]Arjan J. P. Jeckmans, Michael Beye, Zekeriya Erkin, Pieter H. Hartel, Reginald L. Lagendijk, Qiang Tang:
Privacy in Recommender Systems. Social Media Retrieval 2013: 263-281 - [i18]Afonso Arriaga, Qiang Tang:
Trapdoor Privacy in Asymmetric Searchable Encryption Schemes. IACR Cryptol. ePrint Arch. 2013: 330 (2013) - 2012
- [j14]Qiang Tang:
Public key encryption schemes supporting equality test with authorisation of different granularity. Int. J. Appl. Cryptogr. 2(4): 304-321 (2012) - [j13]Jianfeng Wang, Xiaofeng Chen, Hua Ma, Qiang Tang, Jin Li, Hui Zhu:
A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data. J. Internet Serv. Inf. Secur. 2(1/2): 49-58 (2012) - [j12]Yuanjie Zhao, Xiaofeng Chen, Hua Ma, Qiang Tang, Hui Zhu:
A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 72-81 (2012) - [j11]Jianfeng Wang, Hua Ma, Qiang Tang, Jin Li, Hui Zhu, Siqi Ma, Xiaofeng Chen:
A New Efficient Verifiable Fuzzy Keyword Search Scheme. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 61-71 (2012) - [j10]Qiang Tang:
Public key encryption supporting plaintext equality test and user-specified authorization. Secur. Commun. Networks 5(12): 1351-1362 (2012) - [c30]Arjan Jeckmans, Qiang Tang, Pieter H. Hartel:
Privacy-preserving collaborative filtering based on horizontally partitioned dataset. CTS 2012: 439-446 - [c29]Qiang Tang:
Cryptographic framework for analyzing the privacy of recommender algorithms. CTS 2012: 455-462 - [c28]Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou:
New Algorithms for Secure Outsourcing of Modular Exponentiations. ESORICS 2012: 541-556 - [c27]Christoph Bösch, Qiang Tang, Pieter H. Hartel, Willem Jonker:
Selective Document Retrieval from Encrypted Database. ISC 2012: 224-241 - [i17]Qiang Tang:
Search in Encrypted Data: Theoretical Models and Practical Applications. IACR Cryptol. ePrint Arch. 2012: 648 (2012) - [i16]Qiang Tang, Yuanjie Zhao, Xiaofeng Chen, Hua Ma:
Refine the Concept of Public Key Encryption with Delegated Search. IACR Cryptol. ePrint Arch. 2012: 654 (2012) - 2011
- [j9]Qiang Tang, Arjan Jeckmans:
Towards a security model for computational puzzle schemes. Int. J. Comput. Math. 88(11): 2246-2257 (2011) - [j8]Qiang Tang, Liqun Chen:
Extended KCI attack against two-party key establishment protocols. Inf. Process. Lett. 111(15): 744-747 (2011) - [c26]Qiang Tang:
Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization. ACISP 2011: 389-406 - [c25]Arjan Jeckmans, Qiang Tang, Pieter H. Hartel:
Privacy-preserving profile matching using the social graph. CASoN 2011: 42-47 - [c24]Arjan Jeckmans, Qiang Tang, Pieter H. Hartel:
Poster: privacy-preserving profile similarity computation in online social networks. CCS 2011: 793-796 - 2010
- [j7]Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem Jonker:
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records. Int. J. Comput. Model. Algorithms Medicine 1(2): 1-21 (2010) - [j6]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Qiang Tang, Raymond N. J. Veldhuis:
Embedding renewable cryptographic keys into noisy data. Int. J. Inf. Sec. 9(3): 193-208 (2010) - [c23]Qiang Tang:
Privacy preserving mapping schemes supporting comparison. CCSW 2010: 53-58 - [c22]Qiang Tang:
User-friendly matching protocol for online social networks. CCS 2010: 732-734 - [c21]Qiang Tang, Arjan Jeckmans:
Efficient Client Puzzle Schemes to Mitigate DoS Attacks. CIS 2010: 293-297 - [c20]Zheng Gong, Qiang Tang, Yee Wei Law, Hongyang Chen:
KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks. Inscrypt 2010: 268-283 - [i15]Qiang Tang:
A Reflection on the Security of Two-Party Key Establishment Protocols. IACR Cryptol. ePrint Arch. 2010: 174 (2010)
2000 – 2009
- 2009
- [c19]Wolter Pieters, Qiang Tang:
Data Is Key: Introducing the Data-Based Access Control Paradigm. DBSec 2009: 240-251 - [c18]Qiang Tang, Liqun Chen:
Public-Key Encryption with Registered Keyword Search. EuroPKI 2009: 163-178 - [c17]Qiang Tang:
Timed-Ephemerizer: Make Assured Data Appear and Disappear. EuroPKI 2009: 195-208 - [c16]Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem Jonker:
Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. ISPEC 2009: 1-12 - [c15]Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao:
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. ISC 2009: 151-166 - 2008
- [j5]Liqun Chen, Qiang Tang:
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols. J. Univers. Comput. Sci. 14(3): 416-440 (2008) - [c14]Qiang Tang, Pieter H. Hartel, Willem Jonker:
Inter-domain Identity-Based Proxy Re-encryption. Inscrypt 2008: 332-347 - [c13]Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Qiang Tang, Raymond N. J. Veldhuis:
Embedding Renewable Cryptographic Keys into Continuous Noisy Data. ICICS 2008: 294-310 - [c12]Qiang Tang:
Type-Based Proxy Re-encryption and Its Construction. INDOCRYPT 2008: 130-144 - [c11]Qiang Tang, Julien Bringer, Hervé Chabanne, David Pointcheval:
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. ISPEC 2008: 56-70 - [c10]Trajce Dimkov, Qiang Tang, Pieter H. Hartel:
On the Inability of Existing Security Models to Cope with Data Mobility in Dynamic Organizations. MODSEC@MoDELS 2008 - [c9]