default search action
Vincent C. Hu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i1]Antonios Gouglidis, Anna Kagia, Vincent C. Hu:
Model Checking Access Control Policies: A Case Study using Google Cloud IAM. CoRR abs/2303.16688 (2023) - 2020
- [c27]Vincent C. Hu:
Apply Quantum Search to the Safety Check for Mono Operational Attribute Based Protection Systems. SpaCCS 2020: 173-187
2010 – 2019
- 2018
- [j5]Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo:
Access Control for Emerging Distributed Systems. Computer 51(10): 100-103 (2018) - [c26]Rick Kuhn, Dylan Yaga, Raghu Kacker, Jeff Yu Lei, Vincent C. Hu:
Pseudo-Exhaustive Verification of Rule Based Systems. SEKE 2018: 586-585 - 2017
- [c25]Antonios Gouglidis, Vincent C. Hu, Jeremy Busby, David Hutchison:
Verification of Resilience Policies that Assist Attribute Based Access Control. ABAC@CODASPY 2017: 43-52 - [c24]Ang Li, Qinghua Li, Vincent C. Hu:
Access Control for Distributed Processing Systems: Use Cases and General Considerations. CIC 2017: 117-125 - 2016
- [j4]Vincent C. Hu, Rick Kuhn:
Access Control Policy Verification. Computer 49(12): 80-83 (2016) - [c23]David F. Ferraiolo, Ramaswamy Chandramouli, Rick Kuhn, Vincent C. Hu:
Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC). ABAC@CODASPY 2016: 13-24 - [c22]John Calvin Alumbaugh, Qinghua Li, Vincent C. Hu:
Differentiating Non-Isomorphic Graphlets for Graph Analytics. CIC 2016: 349-356 - [c21]D. Richard Kuhn, Vincent C. Hu, David F. Ferraiolo, Raghu N. Kacker, Yu Lei:
Pseudo-Exhaustive Testing of Attribute Based Access Control Rules. ICST Workshops 2016: 51-58 - [c20]Vincent C. Hu, D. Richard Kuhn:
General Methods for Access Control Policy Verification (Application Paper). IRI 2016: 315-323 - 2015
- [j3]Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo:
Attribute-Based Access Control. Computer 48(2): 85-88 (2015) - [c19]Vincent C. Hu, David F. Ferraiolo, D. Richard Kuhn, Raghu N. Kacker, Yu Lei:
Implementing and Managing Policy Rules in Attribute Based Access Control. IRI 2015: 518-525 - [c18]Ang Li, Qinghua Li, Vincent C. Hu, Jia Di:
Evaluating the capability and performance of access control policy verification tools. MILCOM 2015: 366-371 - 2014
- [j2]Antonios Gouglidis, Ioannis Mavridis, Vincent C. Hu:
Security policy verification for multi-domains in cloud systems. Int. J. Inf. Sec. 13(2): 97-111 (2014) - [c17]Vincent C. Hu, Tim Grance, David F. Ferraiolo, D. Richard Kuhn:
An Access Control scheme for Big Data processing. CollaborateCom 2014: 1-7 - 2013
- [c16]Vincent C. Hu, Karen Scarfone:
Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit. SocialCom 2013: 494-501 - [c15]Antonios Gouglidis, Ioannis Mavridis, Vincent C. Hu:
Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems. SERE (Companion) 2013: 35-44 - 2012
- [c14]JeeHyun Hwang, Vincent C. Hu, Tao Xie:
Paradigm in Verification of Access Control. SERE (Companion) 2012: 193 - 2011
- [j1]Vincent C. Hu, D. Richard Kuhn, Tao Xie, JeeHyun Hwang:
Model Checking for Verification of Mandatory Access Control Models and Properties. Int. J. Softw. Eng. Knowl. Eng. 21(1): 103-127 (2011) - 2010
- [c13]Vincent C. Hu, David F. Ferraiolo, Serban I. Gavrila:
Specification of attribute relations for access control policies and constraints using Policy Machine. IAS 2010: 32-35 - [c12]JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altunay:
Mining Likely Properties of Access Control Policies via Association Rule Mining. DBSec 2010: 193-208 - [c11]JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altunay:
ACPT: A Tool for Modeling and Verifying Access Control Policies. POLICY 2010: 40-43 - [r1]JeeHyun Hwang, Evan Martin, Tao Xie, Vincent C. Hu:
Policy-Based Testing. Encyclopedia of Software Engineering 2010: 673-683
2000 – 2009
- 2009
- [c10]JeeHyun Hwang, Tao Xie, Vincent C. Hu:
Detection of Multiple-Duty-Related Security Leakage in Access Control Policies. SSIRI 2009: 65-74 - 2008
- [c9]Evan Martin, JeeHyun Hwang, Tao Xie, Vincent C. Hu:
Assessing Quality of Policy Properties in Verification of Access Control Policies. ACSAC 2008: 163-172 - [c8]Vincent C. Hu, D. Richard Kuhn, Tao Xie:
Property Verification for Generic Access Control Models. EUC (2) 2008: 243-250 - 2007
- [c7]Vincent C. Hu, David F. Ferraiolo, Karen Scarfone:
Access Control Policy Combinations for the Grid Using the Policy Machine. CCGRID 2007: 225-232 - [c6]Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie:
Conformance Checking of Access Control Policies Specified in XACML. COMPSAC (2) 2007: 275-280 - [c5]Vincent C. Hu, Karen Scarfone, Serban I. Gavrila, David F. Ferraiolo:
A trust domain management schema for multiple grid environments. Infoscale 2007: 17 - 2006
- [c4]Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo:
The Computational Complexity of Enforceability Validation for Generic Access Control Rules. SUTC (1) 2006: 260-267 - 2005
- [c3]David F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu, D. Richard Kuhn:
Composing and combining policies under the policy machine. SACMAT 2005: 11-20 - 2001
- [c2]Vincent C. Hu, Deborah A. Frincke, David F. Ferraiolo:
The Policy Machine for Security Policy Management. International Conference on Computational Science (2) 2001: 494-506 - 2000
- [c1]Pablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu:
Policy Mediation for Multi-Enterprise Environments. ACSAC 2000: 100-106
Coauthor Index
aka: Rick Kuhn
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint