Browsing by Author "n 83175105 "
Now showing items 1-16 of 16
-
An enhanced public key infrastructure to secure smart grid wireless communication networks
He, Daojing; Chan, Sammy; Zhang, Yan; Guizani, Mohsen; Chen, Chun; ... more authors (2014 , Article)It is expected that the smart grid will radically add new functionalities to legacy electrical power systems. However, we believe that this will in turn introduce many new security risks. With the smart grid's backbone ... -
Battery status-aware authentication scheme for V2G networks in smart grid
Liu, Hong; Ning, Huansheng; Zhang, Yan; Guizani, Mohsen (2013 , Article)Vehicle-to-grid (V2G) is emerging as an attractive paradigm in smart grid, and provides power and information services by periodically collecting power status of battery vehicles (BVs). During a BV's interaction with power ... -
Compliance checking for usage-constrained credentials in trust negotiation systems
Hu, Jinwei; Khan, Khaled M.; Bai, Yun; Zhang, Yan ( Springer Berlin Heidelberg , 2012 , Conference)We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical ... -
Constraint-enhanced role engineering via answer set programming
Hu, Jinwei; Khan, Khaled M.; Bai, Yun; Zhang, Yan ( Association for Computing Machinery , 2012 , Conference)Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security ... -
Distributed resource allocation in cloud-based wireless multimedia social networks
Nan, Guofang; Mao, Zhifei; Li, Minqiang; Zhang, Yan; Gjessing, Stein; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article)With the rapid penetration of mobile devices, more users prefer to watch multimedia live-streaming via their mobile terminals. Quality of service provision is normally a critical challenge in such multimedia sharing ... -
Enhancing spectral-energy efficiency for LTE-Advanced heterogeneous networks: A users social pattern perspective
Zhang, Xing; Zhang, Yan; Yu, Rong; Wang, Wenbo; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Article Review)The development of LTE-Advanced and beyond cellular networks is expected to offer considerably higher data rates than the existing 3G networks. Among the many potential technologies in LTE-Advanced systems, users' ... -
Logic programs with ordered disjunction: First-order semantics and expressiveness
Asuncion, Vernon; Zhang, Yan; Zhang, Heng ( AAAI Press , 2014 , Conference)Logic programs with ordered disjunction (LPODs) (Brewka 2002) generalize normal logic programs by combining alternative and ranked options in the heads of rules. It has been showed that LPODs are useful in a number of areas ... -
Nitrogen Deficiency Accelerates Rice Leaf Senescence Through ABA Signaling and Sugar Metabolic Shifts
Asad, Muhmmad Asad Ullah; Guan, Xianyue; Zhang, Yan; Zhou, Lujian; Bartas, Martin; ... more authors ( Wiley , 2025 , Article)Nitrogen (N) deficiency is one of the critical factors that induce leaf senescence by integrating with abscisic acid (ABA) metabolism, which results in a shortened leaf photosynthetic period and markedly lowered grain ... -
Role updating in information systems using model checking
Hu, Jinwei; Khan, Khaled M.; Zhang, Yan; Bai, Yun; Li, Ruixuan ( Springer London , 2017 , Article)The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ... -
Secure service provision in smart grid communications
He, Daojing; Chen, Chun; Bu, Jiajun; Chan, Sammy; Zhang, Yan; ... more authors (2012 , Article)The smart grid provides a platform for thirdparty service providers to remotely monitor and manage energy usage for consumers. At the same time, the involvement of service providers brings a new set of security threats to ... -
Securing cognitive radio networks against primary user emulation attacks
Yu, Rong; Zhang, Yan; Liu, Yi; Gjessing, Stein; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)CR is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. Security ... -
Securing vehicle-to-grid communications in the smart grid
Zhang, Yan; Gjessing, Stein; Liu, Hong; Ning, Huansheng; Yang, Laurence T.; ... more authors (2013 , Article)Using vehicle-to-grid (V2G) services, battery vehicles (BVs) may help the smart grid alleviate peaks in power consumption. However, wireless communications infrastructure between BVs and the smart grid also introduce severe ... -
Security and privacy in emerging networks: Part 1 [Guest Editorial]
Guizani, Mohsen; He, Daojing; Ren, Kui; Rodrigues, Joel; Chan, Sammy; ... more authors ( IEEE , 2015 , Article)With the recent advancements in networking technologies, some new emerging networks are being implemented that have the potential to be deployed broadly and on a large scale in the near future. In the wired domain, these ... -
Security and privacy in emerging networks: Part II [Guest Editorial]
Guizani, Mohsen; He, Daojing; Ren, Kui; Rodrigues, Joel J. P.; Chan, Sammy; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article Review)This is the second part of the " Security and Privacy in Emerging Networks" Feature Topic. In Part I, which was published in April 2015, we selected those contributions that dealt with the theory behind the security and ... -
Social access control language (SocACL)
Caprin, Edward; Zhang, Yan; Khan, Khaled M. ( Association for Computing Machinery , 2013 , Conference)Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ... -
Tracking and constraining authorization provenance
Hu, Jinwei; Khan, Khaled M.; Bai, Yun; Zhang, Yan ( Springer Berlin Heidelberg , 2012 , Conference)Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. ...


