智能与分布计算实验室
 

2009年论文

  1. Cuihua Zuo, Ruixuan Li,Zhengding Lu. A Novel Approach to Improve the Security of P.... International Journal of Communications, Network and System Sciences, 2009, 2(3):229-236
  2. Jinwei Hu, Ruixuan Li, Zhengding Lu. On Role Mappings for RBAC-based Secure Intero.... The 3rd International Conference on Network & System Security (NSS 2009), Gold Coast, Australia, October 19-21, 2009, pp.270-277
  3. Dongsheng Duan,Yuhua Li, Yanan Jin, Zhengding Lu. Community Mining on Dynamic Weighted Directed.... The 18th ACM International Workshop on Information and Knowledge Management (CNIKM 2009), Hong Kong, China, November 6,2009, pp.11-18
  4. Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu. Managing Authorization Provenance: A Modal Lo.... The 21st International Conference on Tools with Artificial Intelligence (ICTAI 2009), Newark, New Jersey, USA, November 2-5, 2009, pp.621 - 624
  5. Jianfeng Lu, Ruixuan Li, Zhengding Lu. Dynamic Enforcement of Separation-of-Duty Pol.... The 2009 International Conference on Multimedia Information NEtworking and Security (MINES 2009), Wuhan, China, November 18-20,2009, pp.394-397
  6. Xiaopu Ma,Ruixuan Li, Zhengding Lu,Jianfeng Lu. Global Static Separation of Duty in Multi-dom.... The 2009 International Conference on Multimedia Information NEtworking and Security (MINES 2009), Wuhan, China, November 18-20, 2009, pp.506-509
  7. Yuhua Li, Quan Lin, Gang Zhong, Dongsheng Duan, Yanan Jin, Wei Bi. A Directed Labeled Graph Frequent Pattern Min.... The 3rd International Conference on Multimedia and Ubiquitous Engineering (MUE 2009), Qingdao, China, JUNE 2009, pp.353-359
  8. Jinwei Hu, Ruixuan Li,Zhengding Lu. RBAC-Based Secure Interoperation Using Constr.... The 2009 IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2009), Vancouver, Canada, August 29-31, 2009, pp.867-872
  9. Cuihua Zuo, Ruixuan Li, Haiying Shen, Zhengding Lu. High Coverage Search in Multi-Tree Based P2P .... IEEE Workshop on Grid and P2P Systems and Applications (GridPeer 2009) in conjunction with ICCCN 2009, San Francisco, USA, August 2-6,2009, pp.1-6
  10. Jianfeng Lu, Ruixuan Li, Zhengding Lu, Xiaopu Ma. A Role-based Access Control Architecture for .... The 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009), Wuhan, Hubei, China, April 2009, pp.700-703
  11. Yuhua Li, Dongsheng Duan,Guanghao Hu,Zhengding Lu. Discovering Hidden Group in Financial Transac.... The 6th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2009), Tianjin, China, August 2009, pp.253-258
  12. 刘扬军,姚寒冰,李瑞轩. 一种P2P分布式环境下的信任模型. 武汉理工大学学报, 2009, 31(3):77-80
  13. 金莉,卢正鼎,赵峰. 多域环境下安全互操作研究进展. 计算机科学, 2009, 36(2):47-54
  14. 文珠穆,卢正鼎,唐卓,高昶. P2P 网络环境中节点信息交换的信任机制研究. 计算机工程与科学, 2009, 31(7):5-9,34
  15. 於光灿,李瑞轩,卢正鼎,宋伟,唐卓. 协作环境中基于场所的访问控制模型. 计算机科学, 2009, 36(1):81-85
  16. 文珠穆,李瑞轩,卢正鼎,冯本明,唐卓. 多域环境中基于蚁群算法的抗攻击时态信任模型. 计算机科学, 2009, 36(7):46-51
  17. 唐卓,赵林,李肯立,李瑞轩. 一种基于风险的多域互操作动态访问控制模型. 计算机研究与发展, 2009, 46(6):948-955
  18. 李瑞轩,高昶,辜希武,卢正鼎. C2C电子商务交易的信用及风险评估方法研究. 通信学报, 2009, 30(7):78-85
  19. Zuo Cuihua, Li Ruixuan,Lu Zhengding. A Caching Scheme Based on Power-law Character.... Journal of Southwest Jiaotong University (English Edition), 2009, 17(3):177-184