Follow
Yang Luo
Yang Luo
Microsoft Research
Verified email at microsoft.com
Title
Cited by
Cited by
Year
Whispers between the containers: High-capacity covert channel attacks in docker
Y Luo, W Luo, X Sun, Q Shen, A Ruan, Z Wu
2016 IEEE trustcom/bigdatase/ispa, 630-637, 2016
342016
Openstack security modules: A least-invasive access control framework for the cloud
Y Luo, W Luo, T Puyang, Q Shen, A Ruan, Z Wu
2016 IEEE 9th international conference on cloud computing (CLOUD), 51-58, 2016
312016
A secure virtual machine deployment strategy to reduce co-residency in cloud
Y Qiu, Q Shen, Y Luo, C Li, Z Wu
2017 IEEE Trustcom/BigDataSE/ICESS, 347-354, 2017
202017
BotGraph: Web Bot Detection Based on Sitemap
Y Luo, G She, P Cheng, Y Xiong
arXiv preprint arXiv:1903.08074, 2019
92019
Conflict detection model of access control policy in collaborative environment
B Fan, X Liang, Y Luo, Y Bo, C Xia
2011 International Conference on Computational and Information Sciences, 377-381, 2011
82011
RestSep: Towards a test-oriented privilege partitioning approach for RESTful APIs
Y Luo, T Puyang, X Sun, Q Shen, Y Yang, A Ruan, Z Wu
2017 IEEE International Conference on Web Services (ICWS), 548-555, 2017
72017
RestPL: Towards a request-oriented policy language for arbitrary RESTful APIs
Y Luo, H Zhou, Q Shen, A Ruan, Z Wu
2016 IEEE International Conference on Web Services (ICWS), 666-671, 2016
72016
PML: An Interpreter-Based Access Control Policy Language for Web Services
Y Luo, Q Shen, Z Wu
arXiv preprint arXiv:1903.09756, 2019
62019
Partial attestation: towards cost-effective and privacy-preserving remote attestations
W Luo, W Liu, Y Luo, A Ruan, Q Shen, Z Wu
2016 IEEE Trustcom/BigDataSE/ISPA, 152-159, 2016
42016
Modeling, conflict detection, and verification of a new virtualization role‐based access control framework
Y Luo, C Xia, L Lv, Z Wei, Y Li
Security and Communication Networks 8 (10), 1904-1925, 2015
32015
An Approach for Description of Computer Network Defense Scheme and Its Simulation Verification.
Z Wei, C Xia, Y Luo, X Liu, W Wu
J. Comput. 9 (2), 388-395, 2014
32014
A conflict-related rules detection tool for access control policy
X Liang, L Lv, C Xia, Y Luo, Y Li
Frontiers in Internet Technologies: Second CCF Internet Conference of China …, 2013
32013
Binary classification with positive labeling sources
J Zhang, Y Wang, Y Yang, Y Luo, A Ratner
Proceedings of the 31st ACM International Conference on Information …, 2022
22022
Sift-an efficient method for co-residency detection on Amazon EC2
K Chen, Q Shen, C Li, Y Luo, Y Yang, Z Wu
International Conference on Information Systems Security and Privacy 2, 423-431, 2016
22016
一种基于双模式虚拟机的多态 Shellcode 检测方法
罗杨, 夏春和, 李亚卓, 魏昭, 梁晓艳
计算机研究与发展 51 (8), 1704-1714, 2014
22014
一种基于着色 Petri 网的 RBAC 策略冲突检测方法
罗杨, 梁晓艳, 夏春和, 吕良双
小型微型计算机系统 34 (11), 2487-2490, 2013
22013
人工智能时代的必备心智素养: 计算思维
罗海风, 刘坚, 罗杨
现代教育技术 29 (6), 26-33, 2019
12019
一种新的访问控制策略描述语言及其权限划分方法
罗杨, 沈晴霓, 吴中海
计算机学报 41 (6), 1189-1206, 2018
12018
Making least privilege the low-hanging fruit in clouds
T Puyang, Q Shen, Y Luo, W Luo, Z Wu
2017 IEEE International Conference on Communications (ICC), 1-7, 2017
12017
Multipol: Towards a multi-policy authorization framework for restful interfaces in the cloud
Y Luo, T Puyang, W Luo, Q Shen, A Ruan, Z Wu
Information and Communications Security: 18th International Conference …, 2016
12016
The system can't perform the operation now. Try again later.
Articles 1–20