Follow
Yuan Cheng
Title
Cited by
Cited by
Year
Relationship-based access control for online social networks: Beyond user-to-user relationships
Y Cheng, J Park, R Sandhu
2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012
1372012
A user-to-user relationship-based access control model for online social networks
Y Cheng, J Park, R Sandhu
Data and Applications Security and Privacy XXVI, 8-24, 2012
1232012
An access control model for online social networks using user-to-user relationships
Y Cheng, J Park, R Sandhu
IEEE transactions on dependable and secure computing 13 (4), 424-436, 2015
712015
A User-Activity-Centric Framework for Access Control in Online Social Networks
J Park, R Sandhu, Y Cheng
Internet Computing, IEEE 15 (5), 62-65, 2011
642011
Preserving user privacy from third-party applications in online social networks
Y Cheng, J Park, R Sandhu
Proceedings of the 22nd international conference on world wide web, 723-728, 2013
622013
Attribute-aware relationship-based access control for online social networks
Y Cheng, J Park, R Sandhu
Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 …, 2014
552014
Relationship based information sharing control system and method of use
JH Park, RS Sandhu, Y Cheng
US Patent App. 14/328,682, 2015
392015
ACON: Activity-Centric Access Control for Social Computing
J Park, R Sandhu, Y Cheng
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
362011
A performance comparison of WireGuard and OpenVPN
S Mackey, I Mihov, A Nosenko, F Vega, Y Cheng
Proceedings of the Tenth ACM Conference on data and application security and …, 2020
262020
Extended ReBAC administrative models with cascading revocation and provenance support
Y Cheng, K Bijon, R Sandhu
Proceedings of the 21st ACM on Symposium on Access Control Models and …, 2016
162016
A modern implementation of system call sequence based host-based intrusion detection systems
J Byrnes, T Hoang, NN Mehta, Y Cheng
2020 Second IEEE International Conference on Trust, Privacy and Security in …, 2020
142020
An empirical analysis on the usability and security of passwords
KS Walia, S Shenoy, Y Cheng
21st IEEE International Conference on Information Reuse and Integration for …, 2020
132020
A performance study on cryptographic algorithms for IoT devices
E Anaya, J Patel, P Shah, V Shah, Y Cheng
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
62020
Password and passphrase guessing with recurrent neural networks
A Nosenko, Y Cheng, H Chen
Information Systems Frontiers 25 (2), 549-565, 2023
42023
Learning password modification patterns with recurrent neural networks
A Nosenko, Y Cheng, H Chen
International conference on secure knowledge management in artificial …, 2021
42021
Towards provenance and risk-awareness in social computing
Y Cheng, D Nguyen, K Bijon, R Krishnan, J Park, R Sandhu
Proceedings of the first international workshop on secure and resilient …, 2012
42012
Towards a framework for cyber social status based trusted open collaboration
J Park, Y Cheng, R Sandhu
6th International Conference on Collaborative Computing: Networking …, 2010
32010
A Literature Survey of Phishing and Its Countermeasures
J Vega, D Shevchyk, Y Cheng
2022 Computer Science Conference for CSU Undergraduates, 2022
22022
Access control for online social networks using relationship type patterns
Y Cheng
The University of Texas at San Antonio, 2014
22014
Analyzing the Efficiency of Lightweight Symmetric Ciphers on IoT Devices
J Rivero, TNB Huynh, A Smith-Evans, O Thao, Y Cheng
2021 Computer Science Conference for CSU Undergraduates, 2021
12021
The system can't perform the operation now. Try again later.
Articles 1–20