JeeHyun Hwang
JeeHyun Hwang
Sr. Staff Scientist, AI and Machine Learning R&D, SAS institute
E-mail confirmado em sas.com - Página inicial
Título
Citado por
Citado por
Ano
Xengine: a fast and scalable XACML policy evaluation engine
AX Liu, F Chen, JH Hwang, T Xie
ACM SIGMETRICS Performance Evaluation Review 36 (1), 265-276, 2008
1572008
Designing fast and scalable XACML policy evaluation engines
AX Liu, F Chen, JH Hwang, T Xie
IEEE Transactions on Computers 60 (12), 1802-1817, 2010
882010
Conformance checking of access control policies specified in XACML
VC Hu, E Martin, JH Hwang, T Xie
31st Annual International Computer Software and Applications Conference …, 2007
842007
Model checking for verification of mandatory access control models and properties
VC Hu, DR Kuhn, T Xie, JH Hwang
International Journal of Software Engineering and Knowledge Engineering 21 …, 2011
582011
ACPT: A tool for modeling and verifying access control policies
JH Hwang, T Xie, V Hu, M Altunay
2010 IEEE International Symposium on Policies for Distributed Systems and …, 2010
552010
First step towards automatic correction of firewall policy faults
F Chen, AX Liu, J Hwang, T Xie
ACM Transactions on Autonomous and Adaptive Systems (TAAS) 7 (2), 1-24, 2012
422012
Multiple-implementation testing for XACML implementations
N Li, JH Hwang, T Xie
Proceedings of the 2008 workshop on Testing, analysis, and verification of …, 2008
422008
Assessing quality of policy properties in verification of access control policies
E Martin, JH Hwang, T Xie, V Hu
2008 Annual Computer Security Applications Conference (ACSAC), 163-172, 2008
312008
Selection of regression system tests for security policy evolution
JH Hwang, T Xie, D El Kateb, T Mouelhi, Y Le Traon
Proceedings of the 27th IEEE/ACM international conference on automated …, 2012
292012
Systematic structural testing of firewall policies
JH Hwang, T Xie, F Chen, AX Liu
2008 Symposium on Reliable Distributed Systems, 105-114, 2008
262008
Refactoring access control policies for performance improvement
D El Kateb, T Mouelhi, Y Le Traon, JH Hwang, T Xie
Proceedings of the 3rd ACM/SPEC International Conference on Performance …, 2012
212012
Systematic structural testing of firewall policies
JH Hwang, T Xie, F Chen, AX Liu
IEEE Transactions on Network and Service Management 9 (1), 1-11, 2012
192012
Mining likely properties of access control policies via association rule mining
JH Hwang, T Xie, V Hu, M Altunay
IFIP Annual Conference on Data and Applications Security and Privacy, 193-208, 2010
112010
Fault localization for firewall policies
JH Hwang, T Xie, F Chen, AX Liu
2009 28th IEEE International Symposium on Reliable Distributed Systems, 100-106, 2009
102009
Detection of multiple-duty-related security leakage in access control policies
JH Hwang, T Xie, VC Hu
2009 Third IEEE International Conference on Secure Software Integration and …, 2009
82009
Policy-Based Testing.
JH Hwang, E Martin, T Xie, VC Hu
Encyclopedia of software engineering, 673-683, 2010
72010
Access control policy evolution: An empirical study
J Hwang, L Williams, M Vouk
2014 IEEE 25th International Symposium on Software Reliability Engineering …, 2014
42014
Testing access control policies
JH Hwang, E Martin, T Xie, VC Hu
Encyclopedia of Software Engineering, 673-683, 2010
42010
1. Topological Transformation Approaches to Optimizing TCAM-Based Packet Processing Systems
CR Meiners, AX Liu, E Torng, AR Khakpour, LR Bailey, MG Gouda, ...
IEEE Transactions on Parallel and Distributed Systems (TPDS) 19 (8), 2008
32008
Paradigm in Verification of Access Control
JH Hwang, V Hu, T Xie
2012 IEEE Sixth International Conference on Software Security and …, 2012
12012
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20