Follow
Ninghui Li
Ninghui Li
Professor of Computer Science, Purdue University
Verified email at cs.purdue.edu - Homepage
Title
Cited by
Cited by
Year
t-closeness: Privacy beyond k-anonymity and l-diversity
N Li, T Li, S Venkatasubramanian
2007 IEEE 23rd international conference on data engineering, 106-115, 2006
47162006
Design of a role-based trust-management framework
N Li, JC Mitchell, WH Winsborough
Proceedings 2002 IEEE Symposium on Security and Privacy, 114-130, 2002
11202002
Purpose based access control of complex data for privacy protection
JW Byun, E Bertino, N Li
Proceedings of the tenth ACM symposium on Access control models and …, 2005
6692005
Delegation logic: A logic-based approach to distributed authorization
N Li, BN Grosof, J Feigenbaum
ACM Transactions on Information and System Security (TISSEC) 6 (1), 128-171, 2003
5922003
Distributed credential chain discovery in trust management
N Li, WH Winsborough, JC Mitchell
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
5842001
Using probabilistic generative models for ranking risks of android apps
H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
5412012
Locally differentially private protocols for frequency estimation
T Wang, J Blocki, N Li, S Jha
26th USENIX Security Symposium (USENIX Security 17), 729-745, 2017
5202017
Efficient k-Anonymization Using Clustering Techniques
JW Byun, A Kamra, E Bertino, N Li
International Conference on Database Systems for Advanced Applications, 188-200, 2007
5162007
Android permissions: a perspective combining risks and benefits
BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
4512012
Slicing: A new approach for privacy preserving data publishing
T Li, N Li, J Zhang, I Molloy
IEEE transactions on knowledge and data engineering 24 (3), 561-574, 2010
4292010
On the tradeoff between privacy and utility in data publishing
T Li, N Li
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
4172009
Towards practical automated trust negotiation
WH Winsborough, N Li
Proceedings Third International Workshop on Policies for Distributed Systems …, 2002
3712002
RT: A role-based trust-management framework
N Li, JC Mitchell
Proceedings DARPA Information Survivability Conference and Exposition 1, 201-212, 2003
3682003
Datalog with Constraints: A Foundation for Trust Management Languages
N Li, JC Mitchell
Practical Aspects of Declarative Languages: 5th International Symposium …, 2003
3502003
Purpose based access control for privacy protection in relational database systems
JW Byun, N Li
The VLDB Journal 17, 603-619, 2008
3412008
On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy
N Li, W Qardaji, D Su
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
3312012
Differentially private grids for geospatial data
W Qardaji, W Yang, N Li
2013 IEEE 29th international conference on data engineering (ICDE), 757-768, 2013
3302013
A study of probabilistic password models
J Ma, W Yang, M Luo, N Li
2014 IEEE Symposium on Security and Privacy, 689-704, 2014
3192014
Security analysis in role-based access control
N Li, MV Tripunitara
ACM Transactions on Information and System Security (TISSEC) 9 (4), 391-420, 2006
3082006
Secure anonymization for incremental datasets
JW Byun, Y Sohn, E Bertino, N Li
Secure Data Management: Third VLDB Workshop, SDM 2006, Seoul, Korea …, 2006
2852006
The system can't perform the operation now. Try again later.
Articles 1–20