Ninghui Li mainly investigates Access control, Data mining, Computer security, Theoretical computer science and Trust management. In general Access control, his work in Role-based access control is often linked to Information system linking many areas of study. The study incorporates disciplines such as Information privacy and Inference in addition to Data mining.
His work on Data anonymization is typically connected to Data element as part of general Information privacy study, connecting several disciplines of science. His work on Authorization, Credential and Privacy software as part of general Computer security study is frequently linked to Negotiation, therefore connecting diverse disciplines of science. His Trust management research includes themes of Datalog, Programming language and Semantics.
The scientist’s investigation covers issues in Computer security, Access control, Data mining, Differential privacy and Theoretical computer science. His Computer security research focuses on Internet privacy and how it connects with Password. Ninghui Li has researched Access control in several fields, including Trust management and Authorization.
He works mostly in the field of Data mining, limiting it down to concerns involving Data anonymization and, occasionally, Data publishing. Within one scientific family, he focuses on topics pertaining to News aggregator under Differential privacy, and may sometimes address concerns connected to Private information retrieval and Protocol. His Theoretical computer science research integrates issues from Distributed computing and Parameterized complexity.
Ninghui Li mainly focuses on Differential privacy, Data mining, Computer security, News aggregator and Artificial intelligence. His work is dedicated to discovering how Data mining, Domain are connected with Synthetic data generation and other disciplines. His Computer security study integrates concerns from other disciplines, such as Android and Phishing.
His studies deal with areas such as Machine learning and Authentication as well as Artificial intelligence. His Categorical variable research is multidisciplinary, incorporating elements of Dimension, Theoretical computer science and Synthetic data. Ninghui Li studies Operating system, focusing on Access control in particular.
Ninghui Li mostly deals with Differential privacy, Data mining, Oracle, Computer security and News aggregator. His Differential privacy study combines topics in areas such as Theoretical computer science and Categorical variable. His study on Identification is often connected to Label Distribution Protocol as part of broader study in Data mining.
His Oracle study incorporates themes from Consistency and Block. With his scientific publications, his incorporates both Computer security and Training. His News aggregator research incorporates elements of Interpretation and Information retrieval.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity
Ninghui Li;Tiancheng Li;S. Venkatasubramanian.
international conference on data engineering (2007)
Design of a role-based trust-management framework
Ninghui Li;J.C. Mitchell;W.H. Winsborough.
ieee symposium on security and privacy (2002)
Delegation logic: A logic-based approach to distributed authorization
Ninghui Li;Benjamin N. Grosof;Joan Feigenbaum.
ACM Transactions on Information and System Security (2003)
Distributed credential chain discovery in trust management
Ninghui Li;William H. Winsborough;John C. Mitchell.
Journal of Computer Security (2003)
Using probabilistic generative models for ranking risks of Android apps
Hao Peng;Chris Gates;Bhaskar Sarma;Ninghui Li.
computer and communications security (2012)
Purpose based access control of complex data for privacy protection
Ji-Won Byun;Elisa Bertino;Ninghui Li.
symposium on access control models and technologies (2005)
Efficient k-anonymization using clustering techniques
Ji-Won Byun;Ashish Kamra;Elisa Bertino;Ninghui Li.
database systems for advanced applications (2007)
Android permissions: a perspective combining risks and benefits
Bhaskar Pratim Sarma;Ninghui Li;Chris Gates;Rahul Potharaju.
symposium on access control models and technologies (2012)
RT: a Role-based Trust-management framework
Ninghui Li;J.C. Mitchell.
darpa information survivability conference and exposition (2003)
Towards practical automated trust negotiation
W.H. Winsborough;Ninghui Li.
policies for distributed systems and networks (2002)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
Purdue University West Lafayette
Purdue University West Lafayette
Pompeu Fabra University
University of Wisconsin–Madison
Qatar Computing Research Institute
Stanford University
University of Missouri
Yale University
Indiana University
Georgia Institute of Technology
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: