Ping Yang Conferences

  • Amit Sasturkar, Ping Yang, Scott D. Stoller and C.R. Ramakrishnan, "Policy Analysis for Administrative Role Based Access Control," 19th IEEE Computer Security Foundations Workshop (CSFW), pages 124-138, © IEEE Press, 2006. (Acceptance rate: 24.5%)
  • Artem Chebotko, S. Chang, Shiyong Lu, F Fotouhi and Ping Yang, "Secure Scientific Workflow Provenance Querying with Security Views," 9th International Conference on Web-Age Information Management (WAIM), pages 349-356, © IEEE press, 2008. (Acceptance rate: 25%)
  • Lu Fan, Ping Yang and Ruqian Lu, "Triangle Pieces Intersection of Collision Detection," Proc. of the International Symposium on Future Software Technology, 1998.
  • Mikhail I. Gofman, Ruiqi Luo, Ping Yang and Kartik Gopalan, "SPARC: A Security and Privacy Aware Virtual Machine Checkpointing Mechanism," Proceedings of the 10th annual ACM Workshop on Privacy in the Electronic Society (WPES), in conjunction with the ACM Conference on Computer and Communications Security (CCS), full paper, © ACM Press, 2011. (Acceptance rate of full paper: 16%).
  • Mikhail Gofman, Ruiqi Luo, Jian He, Yingbin Zhang, and Ping Yang, "Incremental Information Flow Analysis of Role Based Access Control," International Conference on Security and Management, pages 397--403, © CSREA press, 2009. (Acceptance rate: 26%)
  • Mikhail Gofman, Ruiqi Luo, and Ping Yang, "User-Role Reachability Analysis of Evolving Administrative Role Based Access Control," 15th European Symposium on Research in Computer Security (ESORICS), © Lecture Notes in Computer Science, 2010. (Acceptance rate: 20.9%)
  • Mikhail Gofman, Ruiqi Luo, Ayla Solomon, Yingbin Zhang, Ping Yang and Scott D. Stoller, "RBAC-PAT: A Policy Analysis Tool for Role Based Access Control," 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Pages 46--49, Lecture Notes in Computer Science, © Springer-Verlag, 2009. (27 regular papers and 8 tool papers accepted among 131 submissions)
  • N. Garepalli, Kartik Gopalan and Ping Yang, "Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols," 17th IEEE International Conference on Computer Communications and Networks (ICCCN), pages 1--6, © IEEE press, 2008 (Acceptance rate: 24.6%, Best paper candidate).
  • Ping Yang, Zijiang Yang and Shiyong Lu, "Formal Modelling and Analysis of Scientific Workflows Using Hierarchical State Machines," 2nd International Workshop on Scientific Workflows and Business Workflow Standards in e-Science, held in conjuction with IEEE international conference on e-science and grid computing, pages 619-626, © IEEE press, 2007.
  • Ping Yang, Samik Basu and C.R.Ramakrishnan, "Parameterized Verification of Pi-Calculus Systems," 12th. International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), pages 42-57, lecture notes in computer science, © Springer-Verlag, 2006. (Acceptance rate: 25%)
  • Ping Yang, Yifei Dong, C.R. Ramakrishnan and Scott A. Smolka, "A Provably Correct Compiler for Efficient Model Checking of Mobile Processes," Seventh International Symposium on Practical Aspects of Declarative languages, pages 113-127, lecture notes in computer science, © Springer-Verlag, 2005 (Most Practical Paper Award).
  • Ping Yang, C.R. Ramakrishnan and Scott A. Smolka, "A Logical Encoding of the Pi-Calculus: Model Checking Mobile Processes Using Tabled Resolution," Fourth International Conference on Verification, Model Checking and Abstract Interpretation, pages 116-131, lecture notes in computer science, © Springer-Verlag, 2003.
  • Radu Grosu, Xiaowan Huang, Scott A. Smolka and Ping Yang, "Monte Carlo Analysis of Security Protocols: Needham-Schroeder Revisited," DIMACS workshop on Security Analysis of Protocols, June 2004.
  • Ruiqi Luo, Ping Yang, Shiyong Lu, and Mikhail I. Gofman, "Analysis of Scientific Workflow Provenance Access Control Policies," to appear, The 9th IEEE International Conference on Services Computing (SCC), © IEEE Press, 2012.
  • Ruqian Lu, Songmao Zhang, Zhi Jin, Lengning Liu, Guangfeng Ji, Ping Yang, and Lu Fan, "Talk to Computer in a Natural Way," Proc.of the 4th International Symposium on Future Software Technology, 1999.
  • Scott D. Stoller, Ping Yang, Mikhail Gofman, and C. R. Ramakrishnan, "Symbolic Reachability Analysis for Parameterized Administrative Role Based Access Control," 14th ACM symposium on access control models and technologies (SACMAT), Pages 165--174, © ACM press, 2009. (Acceptance rate: 32%)
  • Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, and Mikhail Gofman, "Efficient Policy Analysis for Administrative Role Based Access Control," 14th ACM Conference on Computer and Communications Security (CCS), pages 445-455, © ACM press, 2007. (Acceptance rate: 18%)
  • Zhao Lin, Kartik Gopalan, and Ping Yang, "A case for Secure Virtual Append-only Storage for Virtual Machines International Workshop on Security in Cloud Computing (SCC)," in conjunction with ICPP, © IEEE Press, 2010.
  • Zijiang Yang, Shiyong Lu, and Ping Yang, "Itinerary-Based Access Control for Mobile Tasks in Scientific Workflows," IEEE International Symposium on Ubisafe Computing, pages 506-511, © IEEE press, 2007.
  • Zijiang Yang, Shiyong Lu, Ping Yang, "Runtime Security Verification for Itinerary-Driven Mobile Agents," 2nd IEEE Symposium on Dependable Autonomic and Secure Computing (DASC), pages 177-186, © IEEE Press, 2006.
  • Ping Yang Journals

  • Amit Sasturkar, Ping Yang, Scott D. Stoller, and C.R. Ramakrishnan, "Policy Analysis for Administrative Role Based Access Control Theoretical Computer Science," Volume 412, Issue 44, Pages 6208-6234, 14 October 2011, © Elsevier.
  • Artem Chebotko, Shiyong Lu, S. Chang, F Fotouhi and Ping Yang, "Secure Scientific Workflow Provenance Querying with Security Views," IEEE Transactions on Services Computing , 2010.
  • Ping Yang, Shiyong Lu, Mikhail Gofman, and Zijiang Yang, "Information Flow Analysis of Scientific Workflows," Special issue on scientific workflows, Journal of Computer and System Sciences (JCSS) , volume 76(6), pages 390-402, © Elsevier, 2010.
  • Ping Yang, C.R. Ramakrishnan and Scott A. Smolka, "A Logical Encoding of the Pi-Calculus: Model Checking Mobile Processes Using Tabled Resolution," International Journal on Software Tools for Technology Transfer, 6(1), pages 38--66, June 2004, © Springer-Verlag.
  • Ruqian Lu, Chunyi Shi, Songmao Zhang, X. Mao, Jinghui Xu, Ping Yang and Lu Fan, "Agent-Oriented Commonsense Knowledge Base," Scientia Sinica , Series E, pages 641-652, Dec. 2000.
  • Scott D. Stoller, Ping Yang, Mikhail Gofman, and C. R. Ramakrishnan, "Symbolic Reachability Analysis for Parameterized Administrative Role Based Access Control," Computers & Security , 30(2-3):148-164, March-May 2011.
  • Zijiang Yang, Shiyong Lu, Ping Yang, and Andrey Kashlev, "Trustworthy and Dynamic Mobile Task Scheduling in Data-Intensive Scientific Workflow Environments," Accepted, International Journal of Computers and Their Applications.
  • Zijiang Yang, Shiyong Lu, Ping Yang and Fahima Bhuyan, "Model Checking Approach to Secure Host Access Enforcement of Mobile Tasks in Scientific Workflows," Special Issue on Scientific Workflows, Provenance and Their Applications, International Journal of Computers and Their Applications, 18(3), 148--159, 2011.