default search action
Yun Bai 0001
Person information
- affiliation: University of Western Sydney, Australia
Other persons with the same name
- Yun Bai — disambiguation page
- Yun Bai 0002 — Dongguan University of Technology, China
- Yun Bai 0003 — University of Illinois at Urbana-Champaign, Department of Civil and Environmental Engineering, Urbana, IL, USA (and 1 more)
- Yun Bai 0004 — Beijing University of Posts and Telecommunications, School of Information and Communication Engineering, China
- Yun Bai 0005 — Qingdao University, College of Computer Science and Technology, Remote Sensing Information and Digital Earth Center, China (and 1 more)
- Yun Bai 0006 — Southwest University, Faculty of Electronic and Information Engineering, Chongqing, China
- Yun Bai 0007 — Beijing Jiaotong University, School of Traffic and Transportation, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2017
- [j7]Jinwei Hu, Khaled M. Khan, Yan Zhang, Yun Bai, Ruixuan Li:
Role updating in information systems using model checking. Knowl. Inf. Syst. 51(1): 187-234 (2017) - 2011
- [j6]Yun Bai, Khaled M. Khan:
Ell Secure Information System Using Modal Logic Technique. Int. J. Secur. Softw. Eng. 2(2): 65-76 (2011) - 2005
- [j5]Yun Bai, Yan Zhang, Vijay Varadharajan:
On the sequence of authorization policy transformations. Int. J. Inf. Sec. 4(1-2): 120-131 (2005) - 2004
- [j4]Yun Bai, Yan Zhang:
Artificial Intelligence In Database Security. Int. J. Pattern Recognit. Artif. Intell. 18(1): 3-17 (2004) - 2003
- [j3]Yun Bai, Vijay Varadharajan:
On transformation of authorization policies. Data Knowl. Eng. 45(3): 333-357 (2003) - 2002
- [j2]Yun Bai, Vijay Varadharajan:
Object Oriented Database with Authorization Policies. Fundam. Informaticae 53(3-4): 229-250 (2002) - 2001
- [j1]Yan Zhang, Cheng-Min Wu, Yun Bai:
Implementing prioritized logic programming. AI Commun. 14(4): 183-196 (2001)
Conference and Workshop Papers
- 2018
- [c23]Vernon Asuncion, Yan Zhang, Heng Zhang, Yun Bai, Weisheng Si:
Loop Restricted Existential Rules and First-Order Rewritability for Query Answering. KR 2018: 619-620 - 2015
- [c22]Yun Bai, Edward Caprin, Yan Zhang:
Reasoning About the State Change of Authorization Policies. IEA/AIE 2015: 109-119 - 2013
- [c21]Khaled M. Khan, Yun Bai:
Automatic verification of health regulatory compliance in cloud computing. Healthcom 2013: 719-721 - 2012
- [c20]Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang:
Constraint-enhanced role engineering via answer set programming. AsiaCCS 2012: 73-74 - [c19]Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang:
Tracking and Constraining Authorization Provenance. IEA/AIE 2012: 669-678 - [c18]Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang:
Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems. ISC 2012: 290-305 - 2011
- [c17]Yun Bai, Khaled M. Khan:
A Modal Logic for Information System Security. AISC 2011: 51-56 - [c16]Sean Policarpio, Yun Bai:
An Implementation of $\mathcal{A}^{xml(T)}$ : An Answer Set Programming Based Formal Language of Authorisation for XML Documents. WiMo/CoNeCo 2011: 378-387 - [c15]Yun Bai, Sean Policarpio:
On Cloud Computing Security. WiMo/CoNeCo 2011: 388-396 - 2009
- [c14]Yun Bai:
A Knowledge Based Formal Language for Securing Information Systems. KES (1) 2009: 70-77 - 2008
- [c13]Yun Bai:
Access Control for XML Document. IEA/AIE 2008: 621-630 - [c12]Yun Bai:
Reasoning for Incomplete Authorizations. KES (1) 2008: 278-285 - 2005
- [c11]Yun Bai:
A New Approach for Conflict Resolution of Authorization. KES (1) 2005: 290-296 - 2003
- [c10]Yan Zhang, Yun Bai:
The Characterization on the Uniqueness of Answer Set for Prioritized Logic Programs. ISMIS 2003: 349-356 - 2001
- [c9]Yun Bai, Yan Zhang:
On the Computational Aspect of Rule Based Database Updates. IEA/AIE 2001: 71-81 - 1999
- [c8]Yun Bai, Vijay Varadharajan:
Authorization in Object Oriented Databases. ACISP 1999: 270-280 - [c7]Yun Bai, Vijay Varadharajan:
A Logical Formalization for Specifying Authorizations in Object-Oriented Databases. DBSec 1999: 317-330 - [c6]Yun Bai, Vijay Varadharajan:
On Formal Languages for Sequences of Authorization Transformations. SAFECOMP 1999: 375-384 - 1998
- [c5]Yun Bai, Vijay Varadharajan:
A High Level Language for Conventional Access Control Models. ACISP 1998: 273-283 - 1997
- [c4]Yun Bai, Vijay Varadharajan:
Analysis and Implementation of a Formal Authorisation Policy Design Approach. ACISP 1997: 14-25 - [c3]Yun Bai, Vijay Varadharajan:
A Logic For State Transformations in Authorization Policies. CSFW 1997: 173-182 - [c2]Yun Bai, Vijay Varadharajan:
A language for specifying sequences of authorization transformations and its applications. ICICS 1997: 39-49 - [c1]Yun Bai, Vijay Varadharajan:
A Formal Security Design Approach for Transformation of Authorizations in Information Systems. PACIS 1997: 81
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint