His primary areas of study are Data mining, Access control, Classifier, Computer security and XACML. His Data mining study frequently draws parallels with other fields, such as Set. Dan Lin combines topics linked to Information retrieval with his work on Classifier.
As a member of one scientific family, Dan Lin mostly works in the field of Computer security, focusing on The Internet and, on occasion, Cloud computing. In his study, which falls under the umbrella issue of Cloud computing, Data science is strongly linked to Service provider. His XACML research incorporates themes from Variety, Binary decision diagram and Algebra.
Dan Lin focuses on Computer security, Access control, Data mining, Cloud computing and Service provider. His work carried out in the field of Computer security brings together such families of science as Computer network and Vehicular ad hoc network. His work on XACML as part of his general Access control study is frequently connected to Grid computing, thereby bridging the divide between different branches of science.
His research in Data mining intersects with topics in Tree, Set and Search engine indexing. His study in Cloud computing is interdisciplinary in nature, drawing from both Computer data storage and Scalability, Database. His Service provider study also includes
Service provider, Internet privacy, Cloud computing, Access control and Information sensitivity are his primary areas of study. Dan Lin interconnects Computer security, Quality of service, Cloud computing security, Tree and Parallel algorithm in the investigation of issues within Service provider. Dan Lin combines subjects such as Data stream mining and Usability with his study of Computer security.
His studies deal with areas such as Database, State, Dependability and Routing protocol as well as Cloud computing. In his works, he undertakes multidisciplinary study on Access control and Decoy. His Information sensitivity research incorporates elements of Network topology, Scalability, Mobile device and Data science.
Dan Lin mainly focuses on Cloud computing, Service provider, Routing protocol, Dissemination and Dependability. His Cloud computing study combines topics in areas such as Computer network and Information privacy. His research integrates issues of Tree, Quality of service, Cloud testing and Database in his study of Service provider.
The concepts of his Routing protocol study are interwoven with issues in Distributed computing and State.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Query and update efficient B + -tree based indexing of moving objects
Christian S. Jensen;Dan Lin;Beng Chin Ooi.
very large data bases (2004)
Ensuring Distributed Accountability for Data Sharing in the Cloud
S. Sundareswaran;A. Squicciarini;Dan Lin.
IEEE Transactions on Dependable and Secure Computing (2012)
iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning
Jun Yu;Baopeng Zhang;Zhengzhong Kuang;Dan Lin.
IEEE Transactions on Information Forensics and Security (2017)
A Brokerage-Based Approach for Cloud Service Selection
Smitha Sundareswaran;Anna Squicciarini;Dan Lin.
international conference on cloud computing (2012)
A Survey of Quantification of Privacy Preserving Data Mining Algorithms
Elisa Bertino;Dan Lin;Wei Jiang.
Privacy-Preserving Data Mining (2008)
MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs
Dan Lin;Jian Kang;Anna Squicciarini;Yingjie Wu.
IEEE Transactions on Mobile Computing (2017)
Continuous Clustering of Moving Objects
C.S. Jensen;Dan Lin;Beng Chin Ooi.
IEEE Transactions on Knowledge and Data Engineering (2007)
An Approach to Evaluate Data Trustworthiness Based on Data Provenance
Chenyun Dai;Dan Lin;Elisa Bertino;Murat Kantarcioglu.
very large data bases (2008)
Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing
Jun Yu;Zhenzhong Kuang;Baopeng Zhang;Wei Zhang.
IEEE Transactions on Information Forensics and Security (2018)
Access control policy combining: theory meets practice
Ninghui Li;Qihua Wang;Wahbeh Qardaji;Elisa Bertino.
symposium on access control models and technologies (2009)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: