Information and Communications Security: 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings
Naccache, David, Xu, Shouhuai, Qing, Sihan, Samarati, Pierangela, Blanc, Gregory, Lu, Rongxing, Zhang, Zonghua, Meddahi, Ahmed
Year of Publication 2018
Get full text
Year of Publication 2018
eBook
Book
Some issues regarding operating system security
Sihan Qing
Published in 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS) (01.06.2014)
Published in 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS) (01.06.2014)
Get full text
Conference Proceeding
A formal model for integrity protection based on DTE technique
Ji, Qingguang, Qing, Sihan, He, Yeping
Published in Science China. Information sciences (01.10.2006)
Published in Science China. Information sciences (01.10.2006)
Get full text
Journal Article
Covert Channel Identification Founded on Information Flow Analysis
Shen, Jianjun, Qing, Sihan, Shen, Qingni, Li, Liping
Published in Computational Intelligence and Security (2005)
Published in Computational Intelligence and Security (2005)
Get full text
Book Chapter
Conference Proceeding
XEN Virtual Machine Technology and Its Security Analysis
Xue, Haifeng, Qing, Sihan, Zhang, Huanguo
Published in Wuhan University journal of natural sciences (2007)
Published in Wuhan University journal of natural sciences (2007)
Get full text
Journal Article
A Practical Alternative to Domain and Type Enforcement Integrity Formal Models
Get full text
Book Chapter
Conference Proceeding