Whispers between the containers: High-capacity covert channel attacks in docker Y Luo, W Luo, X Sun, Q Shen, A Ruan, Z Wu 2016 IEEE trustcom/bigdatase/ispa, 630-637, 2016 | 34 | 2016 |
Openstack security modules: A least-invasive access control framework for the cloud Y Luo, W Luo, T Puyang, Q Shen, A Ruan, Z Wu 2016 IEEE 9th international conference on cloud computing (CLOUD), 51-58, 2016 | 31 | 2016 |
A secure virtual machine deployment strategy to reduce co-residency in cloud Y Qiu, Q Shen, Y Luo, C Li, Z Wu 2017 IEEE Trustcom/BigDataSE/ICESS, 347-354, 2017 | 20 | 2017 |
BotGraph: Web Bot Detection Based on Sitemap Y Luo, G She, P Cheng, Y Xiong arXiv preprint arXiv:1903.08074, 2019 | 9 | 2019 |
Conflict detection model of access control policy in collaborative environment B Fan, X Liang, Y Luo, Y Bo, C Xia 2011 International Conference on Computational and Information Sciences, 377-381, 2011 | 8 | 2011 |
RestSep: Towards a test-oriented privilege partitioning approach for RESTful APIs Y Luo, T Puyang, X Sun, Q Shen, Y Yang, A Ruan, Z Wu 2017 IEEE International Conference on Web Services (ICWS), 548-555, 2017 | 7 | 2017 |
RestPL: Towards a request-oriented policy language for arbitrary RESTful APIs Y Luo, H Zhou, Q Shen, A Ruan, Z Wu 2016 IEEE International Conference on Web Services (ICWS), 666-671, 2016 | 7 | 2016 |
PML: An Interpreter-Based Access Control Policy Language for Web Services Y Luo, Q Shen, Z Wu arXiv preprint arXiv:1903.09756, 2019 | 6 | 2019 |
Partial attestation: towards cost-effective and privacy-preserving remote attestations W Luo, W Liu, Y Luo, A Ruan, Q Shen, Z Wu 2016 IEEE Trustcom/BigDataSE/ISPA, 152-159, 2016 | 4 | 2016 |
Modeling, conflict detection, and verification of a new virtualization role‐based access control framework Y Luo, C Xia, L Lv, Z Wei, Y Li Security and Communication Networks 8 (10), 1904-1925, 2015 | 3 | 2015 |
An Approach for Description of Computer Network Defense Scheme and Its Simulation Verification. Z Wei, C Xia, Y Luo, X Liu, W Wu J. Comput. 9 (2), 388-395, 2014 | 3 | 2014 |
A conflict-related rules detection tool for access control policy X Liang, L Lv, C Xia, Y Luo, Y Li Frontiers in Internet Technologies: Second CCF Internet Conference of China …, 2013 | 3 | 2013 |
Binary classification with positive labeling sources J Zhang, Y Wang, Y Yang, Y Luo, A Ratner Proceedings of the 31st ACM International Conference on Information …, 2022 | 2 | 2022 |
Sift-an efficient method for co-residency detection on Amazon EC2 K Chen, Q Shen, C Li, Y Luo, Y Yang, Z Wu International Conference on Information Systems Security and Privacy 2, 423-431, 2016 | 2 | 2016 |
一种基于双模式虚拟机的多态 Shellcode 检测方法 罗杨, 夏春和, 李亚卓, 魏昭, 梁晓艳 计算机研究与发展 51 (8), 1704-1714, 2014 | 2 | 2014 |
一种基于着色 Petri 网的 RBAC 策略冲突检测方法 罗杨, 梁晓艳, 夏春和, 吕良双 小型微型计算机系统 34 (11), 2487-2490, 2013 | 2 | 2013 |
人工智能时代的必备心智素养: 计算思维 罗海风, 刘坚, 罗杨 现代教育技术 29 (6), 26-33, 2019 | 1 | 2019 |
一种新的访问控制策略描述语言及其权限划分方法 罗杨, 沈晴霓, 吴中海 计算机学报 41 (6), 1189-1206, 2018 | 1 | 2018 |
Making least privilege the low-hanging fruit in clouds T Puyang, Q Shen, Y Luo, W Luo, Z Wu 2017 IEEE International Conference on Communications (ICC), 1-7, 2017 | 1 | 2017 |
Multipol: Towards a multi-policy authorization framework for restful interfaces in the cloud Y Luo, T Puyang, W Luo, Q Shen, A Ruan, Z Wu Information and Communications Security: 18th International Conference …, 2016 | 1 | 2016 |