MobiCloud: building secure cloud framework for mobile computing and communication D Huang, X Zhang, M Kang, J Luo 2010 fifth IEEE international symposium on service oriented system …, 2010 | 292 | 2010 |
Security ontology for annotating resources A Kim, J Luo, M Kang On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE …, 2005 | 241 | 2005 |
Method And System For Storing And Using A Plurality Of Passwords SA Blomquist, C Blomquist, JZ Luo, B Stover, JA Grlicky, SW Alexander US Patent App. 12/678,585, 2011 | 92 | 2011 |
Adding OWL-S support to the existing UDDI infrastructure J Luo, B Montrose, A Kim, A Khashnobish, M Kang 2006 IEEE International Conference on Web Services (ICWS'06), 153-162, 2006 | 81 | 2006 |
System and method for adding semantic support to existing syntactic infrastructure M Kang, B Montrose, J Luo US Patent 7,933,764, 2011 | 29 | 2011 |
Security ontology to facilitate web service description and discovery A Kim, J Luo, M Kang Journal on data semantics IX, 167-195, 2007 | 23 | 2007 |
A framework for event prioritization in cyber network defense A Kim, MH Kang, JZ Luo, A Velasquez DTIC Document, 2014 | 22 | 2014 |
An approach for semantic query processing with UDDI J Luo, B Montrose, M Kang On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops: OTM …, 2005 | 18 | 2005 |
Risk based mobile access control (RiBMAC) policy framework J Luo, M Kang 2011-MILCOM 2011 Military Communications Conference, 1448-1453, 2011 | 12 | 2011 |
Building private blockchains over public blockchains (PoP) an attribute-based access control approach D Huang, CJ Chung, Q Dong, J Luo, M Kang Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 355-363, 2019 | 11 | 2019 |
Application lockbox for mobile device security J Luo, M Kang 2011 Eighth International Conference on Information Technology: New …, 2011 | 11 | 2011 |
A quad-redundant plc architecture for cyber-resilient industrial control systems J Luo, M Kang, E Bisse, M Veldink, D Okunev, S Kolb, JG Tylka, ... IEEE Embedded Systems Letters 13 (4), 218-221, 2020 | 10 | 2020 |
Achieving fine-grained access control with discretionary user revocation over cloud data Q Dong, D Huang, J Luo, M Kang 2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018 | 9 | 2018 |
Attribute based encryption for information sharing on tactical mobile networks J Luo, Q Dong, D Huang, M Kang MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 1-9, 2018 | 7 | 2018 |
An Infrastructure for Multi-Level Secure Service-Oriented Architecture (MLS-SOA) Using the Multiple Single-Level Approach J Luo, M Kang, ... Naval Research Laboratory, 2009 | 5 | 2009 |
Adding Semantic Support to Existing UDDI Infrastructure J Luo, B Montrose, M Kang Naval Research Lab, Washington, DC, NRL Memorandum Report NRL/MR/5540-05-650, 2005 | 4 | 2005 |
ACRS4SDN: An autonomous cyber response system for software-defined networks A Velazquez, B Montrose, M Li, J Luo, M Kang, S PATRA, D Nau US Naval Research Laboratory, Tech. Rep., 2022 | 2 | 2022 |
ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption Q Dong, D Huang, J Luo, M Kang Cryptology ePrint Archive, 2017 | 1 | 2017 |
HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing Q Dong, D Huang, J Luo, M Kang Cryptology ePrint Archive, 2017 | 1 | 2017 |
Infrastructure for multi-level secure service-oriented architecture (MLS-SOA) J Luo, M Kang 2010-MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 475-481, 2010 | 1 | 2010 |