Follow
Liang Chen
Liang Chen
Senior Lecturer in Computer Science, University of Hertfordshire
Verified email at herts.ac.uk
Title
Cited by
Cited by
Year
Risk-aware role-based access control
L Chen, J Crampton
Proceedings of the 7th International Workshop on Security and Trust …, 2011
1222011
Inter-domain role mapping and least privilege
L Chen, J Crampton
Proceedings of the 12th ACM Symposium on Access Control Models and …, 2007
622007
On spatio-temporal constraints and inheritance in role-based access control
L Chen, J Crampton
Proceedings of the 3rd ACM Symposium on Information, Computer and …, 2008
522008
Set covering problems in role-based access control
L Chen, J Crampton
Proceedings of the 14th European Symposium on Research in Computer Security …, 2009
372009
Obligations in risk-aware access control
L Chen, J Crampton, MJ Kollingbaum, TJ Norman
Proceedings of the 10th Annual Conference on Privacy, Security and Trust …, 2012
322012
TRAAC: Trust and risk aware access control
C Burnett, L Chen, P Edwards, TJ Norman
Proceedings of the 12th Annual Conference on Privacy, Security and Trust …, 2014
292014
XACML and Risk-Aware Access Control
L Chen, L Gasparini, TJ Norman
Proceedings of the 10th International Workshop on Security in Information …, 2013
222013
A Multi-Bit Fully Homomorphic Encryption With Shorter Public Key From LWE
X Song, Z Chen, L Chen
IEEE Access 7, 50588-50594, 2019
142019
Analyzing and Developing Role-Based Access Control Models
L Chen
Information Security Group, Royal Holloway, University of London, 2011
142011
TRUMP: A Trusted Mobile Platform for Self-management of Chronic Illness in Rural Areas
C Burnett, P Edwards, TJ Norman, L Chen, Y Rahulamathavan, M Jaffray, ...
Proceedings of the 6th International Conference on Trust & Trustworthy …, 2013
112013
Development of a Digital Tool to Overcome the Challenges of Rural Food SMEs
S Van Der Loo, L Chen, P Edwards, JA Holden, S Karamperidis, ...
Scottish Geographical Journal 131 (3-4), 212-219, 2015
92015
An access control model for protecting provenance graphs
L Chen, P Edwards, JD Nelson, TJ Norman
Proceedings of the 13th Annual Conference on Privacy, Security and Trust …, 2015
72015
COIR: Verifying Normative Specifications of Complex Systems
L Gasparini, TJ Norman, MJ Kollingbaum, L Chen, JJC Meyer
Procceedings of the 18th International Workshop on Coordination …, 2015
62015
Verifying Normative System Specification containing Collective Imperatives and Deadlines
L Gasparini, TJ Norman, MJ Kollingbaum, L Chen, JJC Meyer
Proceedings of the 14th International Conference on Autonomous Agents and …, 2015
52015
Network Representation Learning Enhanced by Partial Community Information That Is Found Using Game Theory
H Sun, W Jie, J Loo, L Chen, Z Wang, S Ma, G Li, S Zhang
Information 12 (5), 186, 2021
42021
Crowd computing for social media ecosystems
Z Zhang, KKR Choo, AK Sangaiah, L Chen
Applied Soft Computing 66, 492-494, 2018
42018
Severity-Sensitive Robustness Analysis in Normative Systems
L Gasparini, TJ Norman, MJ Kollingbaum, L Chen
Procceedings of the 17th International Workshop on Coordination …, 2014
32014
A smart logistics and transport platform for rural business
AC Marqui, MJ Kollingbaum, L Chen, TJ Norman, P Edwards, JD Nelson
The 13th World Conference on Transportation Research, 2013
32013
Applications of the oriented permission role-based access control model
L Chen, J Crampton
Proceedings of the 26th IEEE International Performance Computing and …, 2007
32007
Decision Theoretic Norm-Governed Planning
L Gasparini, TJ Norman, MJ Kollingbaum, L Chen
Proceedings of the 2016 International Conference on Autonomous Agents …, 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20