Xengine: a fast and scalable XACML policy evaluation engine AX Liu, F Chen, JH Hwang, T Xie ACM SIGMETRICS performance evaluation review 36 (1), 265-276, 2008 | 173 | 2008 |
Designing fast and scalable XACML policy evaluation engines AX Liu, F Chen, JH Hwang, T Xie IEEE Transactions on Computers 60 (12), 1802-1817, 2010 | 102 | 2010 |
Conformance checking of access control policies specified in XACML VC Hu, E Martin, JH Hwang, T Xie 31st Annual International Computer Software and Applications Conference …, 2007 | 84 | 2007 |
Model checking for verification of mandatory access control models and properties VC Hu, DR Kuhn, T Xie, JH Hwang International Journal of Software Engineering and Knowledge Engineering 21 …, 2011 | 69 | 2011 |
ACPT: A tool for modeling and verifying access control policies JH Hwang, T Xie, V Hu, M Altunay 2010 IEEE International Symposium on Policies for Distributed Systems and …, 2010 | 57 | 2010 |
First step towards automatic correction of firewall policy faults F Chen, AX Liu, J Hwang, T Xie ACM Transactions on Autonomous and Adaptive Systems (TAAS) 7 (2), 1-24, 2012 | 49 | 2012 |
Multiple-implementation testing for XACML implementations N Li, JH Hwang, T Xie Proceedings of the 2008 workshop on Testing, analysis, and verification of …, 2008 | 43 | 2008 |
Assessing quality of policy properties in verification of access control policies E Martin, JH Hwang, T Xie, V Hu 2008 Annual Computer Security Applications Conference (ACSAC), 163-172, 2008 | 38 | 2008 |
Selection of regression system tests for security policy evolution JH Hwang, T Xie, D El Kateb, T Mouelhi, Y Le Traon Proceedings of the 27th IEEE/ACM international conference on automated …, 2012 | 30 | 2012 |
Systematic structural testing of firewall policies JH Hwang, T Xie, F Chen, AX Liu 2008 Symposium on Reliable Distributed Systems, 105-114, 2008 | 27 | 2008 |
Refactoring access control policies for performance improvement D El Kateb, T Mouelhi, Y Le Traon, JH Hwang, T Xie Proceedings of the 3rd ACM/SPEC International Conference on Performance …, 2012 | 24 | 2012 |
Systematic structural testing of firewall policies JH Hwang, T Xie, F Chen, AX Liu IEEE Transactions on Network and Service Management 9 (1), 1-11, 2012 | 20 | 2012 |
Mining likely properties of access control policies via association rule mining JH Hwang, T Xie, V Hu, M Altunay Data and Applications Security and Privacy XXIV: 24th Annual IFIP WG 11.3 …, 2010 | 12 | 2010 |
Fault localization for firewall policies JH Hwang, T Xie, F Chen, AX Liu 2009 28th IEEE International Symposium on Reliable Distributed Systems, 100-106, 2009 | 12 | 2009 |
Policy-Based Testing. JH Hwang, E Martin, T Xie, VC Hu Encyclopedia of software engineering, 673-683, 2010 | 8 | 2010 |
Detection of multiple-duty-related security leakage in access control policies JH Hwang, T Xie, VC Hu 2009 Third IEEE International Conference on Secure Software Integration and …, 2009 | 8 | 2009 |
Access control policy evolution: An empirical study JH Hwang, L Williams, M Vouk Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 1-2, 2014 | 5 | 2014 |
Testing access control policies J Hwang, E Martin, T Xie, VC Hu Encyclopedia of Software Engineering 1, 673-683, 2010 | 4 | 2010 |
Improving the Quality of Security Policies JH Hwang North Carolina State University, 2014 | 1 | 2014 |
Paradigm in Verification of Access Control JH Hwang, V Hu, T Xie 2012 IEEE Sixth International Conference on Software Security and …, 2012 | 1 | 2012 |