Satisfiability Analysis of Workflows with Control-Flow Patterns and Authorization Constraints P Yang, X Xie, I Ray, S Lu | 36 | 2013 |
Information flow control for stream processing in clouds X Xie, I Ray, R Adaikkalavan, R Gamble Proceedings of the 18th ACM symposium on Access control models and …, 2013 | 35 | 2013 |
Multilevel secure data stream processing R Adaikkalavan, I Ray, X Xie Data and Applications Security and Privacy XXV, 122-137, 2011 | 19 | 2011 |
Towards trustworthy delegation in role-based access control model M Toahchoodee, X Xie, I Ray Information Security, 379-394, 2009 | 17 | 2009 |
Multilevel secure data stream processing: Architecture and implementation R Adaikkalavan, X Xie, I Ray Journal of Computer Security 20 (5), 547-581, 2012 | 12 | 2012 |
Design a batched information retrieval system based on a concept-lattice-like structure M Huang, J Lin, Y Peng, X Xie Knowledge-Based Systems 150, 74-84, 2018 | 10 | 2018 |
Stream Processing with Secure Information Flow Constraints I Ray, R Adaikkalavan, X Xie, R Gamble Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015 | 3 | 2015 |
On the Efficient Processing of Multilevel Secure Continuous Queries X Xie, I Ray, R Adaikkalavan Social Computing (SocialCom), 2013 International Conference on, 417-422, 2013 | 3 | 2013 |
Distributed Multilevel Secure Data Stream Processing X Xie, I Ray, W Ranasinghe, PA Gilbert, P Shashidhara, A Yadav Distributed Computing Systems Workshops (ICDCSW), 2013 IEEE 33rd …, 2013 | 1 | 2013 |
Multilevel secure data stream management system X Xie Colorado State University, 2013 | | 2013 |