Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Ninghui Li
Understanding Hierarchical Methods for Differentially Private Histograms
Proceedings of the VLDB Endowment
Computer Science
Resiliency Policies in Access Control
ACM Transactions on Information and System Security
Quality
Reliability
Safety
Computer Science
Risk
On the Security of Delegation in Access Control Systems
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Injector: Mining Background Knowledge for Data Anonymization
Oblivious Signature-Based Envelope
Trojan Horse Resistant Discretionary Access Control
Comparing the Expressive Power of Access Control Models