Risk-aware role-based access control L Chen, J Crampton Proceedings of the 7th International Workshop on Security and Trust …, 2011 | 126 | 2011 |
Inter-domain role mapping and least privilege L Chen, J Crampton Proceedings of the 12th ACM Symposium on Access Control Models and …, 2007 | 65 | 2007 |
On spatio-temporal constraints and inheritance in role-based access control L Chen, J Crampton Proceedings of the 3rd ACM Symposium on Information, Computer and …, 2008 | 52 | 2008 |
Set covering problems in role-based access control L Chen, J Crampton Proceedings of the 14th European Symposium on Research in Computer Security …, 2009 | 40 | 2009 |
Obligations in risk-aware access control L Chen, J Crampton, MJ Kollingbaum, TJ Norman Proceedings of the 10th Annual Conference on Privacy, Security and Trust …, 2012 | 34 | 2012 |
TRAAC: Trust and risk aware access control C Burnett, L Chen, P Edwards, TJ Norman Proceedings of the 12th Annual Conference on Privacy, Security and Trust …, 2014 | 29 | 2014 |
XACML and Risk-Aware Access Control L Chen, L Gasparini, TJ Norman Proceedings of the 10th International Workshop on Security in Information …, 2013 | 23 | 2013 |
A Multi-Bit Fully Homomorphic Encryption With Shorter Public Key From LWE X Song, Z Chen, L Chen IEEE Access 7, 50588-50594, 2019 | 17 | 2019 |
Analyzing and Developing Role-Based Access Control Models L Chen Information Security Group, Royal Holloway, University of London, 2011 | 14 | 2011 |
TRUMP: A Trusted Mobile Platform for Self-management of Chronic Illness in Rural Areas C Burnett, P Edwards, TJ Norman, L Chen, Y Rahulamathavan, M Jaffray, ... Proceedings of the 6th International Conference on Trust & Trustworthy …, 2013 | 11 | 2013 |
Development of a Digital Tool to Overcome the Challenges of Rural Food SMEs S Van Der Loo, L Chen, P Edwards, JA Holden, S Karamperidis, ... Scottish Geographical Journal 131 (3-4), 212-219, 2015 | 9 | 2015 |
An access control model for protecting provenance graphs L Chen, P Edwards, JD Nelson, TJ Norman Proceedings of the 13th Annual Conference on Privacy, Security and Trust …, 2015 | 7 | 2015 |
COIR: Verifying Normative Specifications of Complex Systems L Gasparini, TJ Norman, MJ Kollingbaum, L Chen, JJC Meyer Procceedings of the 18th International Workshop on Coordination …, 2015 | 7 | 2015 |
Verifying Normative System Specification containing Collective Imperatives and Deadlines L Gasparini, TJ Norman, MJ Kollingbaum, L Chen, JJC Meyer Proceedings of the 14th International Conference on Autonomous Agents and …, 2015 | 5 | 2015 |
Network Representation Learning Enhanced by Partial Community Information That Is Found Using Game Theory H Sun, W Jie, J Loo, L Chen, Z Wang, S Ma, G Li, S Zhang Information 12 (5), 186, 2021 | 4 | 2021 |
Crowd computing for social media ecosystems Z Zhang, KKR Choo, AK Sangaiah, L Chen Applied Soft Computing 66, 492-494, 2018 | 4 | 2018 |
Severity-Sensitive Robustness Analysis in Normative Systems L Gasparini, TJ Norman, MJ Kollingbaum, L Chen Procceedings of the 17th International Workshop on Coordination …, 2014 | 3 | 2014 |
Risk-Aware Access Control for Electronic Health Records L Chen, MJ Kollingbaum, TJ Norman, P Edwards The Third Annual Digital Economy All Hands Conference (Digital Futures), 2012 | 3 | 2012 |
Applications of the oriented permission role-based access control model L Chen, J Crampton Proceedings of the 26th IEEE International Performance Computing and …, 2007 | 3 | 2007 |
Towards Deep Learning Based Access Control using Hyperledger-Fabric Blockchain for the Internet of Things M Rahman, L Chen, J Loo, W Jie 2023 IEEE 6th International Conference on Cloud Computing and Artificial …, 2023 | 2 | 2023 |