Key Research and Development and Promotion Program of Henan Province(No.222102210069);Zhongyuan Science and Technology Innovation Leading Talent Project(224200510003);National Natural Science Foundation of China(No.62102449).
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy...
The prevalence of smartphones is deeply embedded in modern society,impacting various aspects of our lives.Their versatility and functionalities have fundamentally changed how we communicate,work,seek entertainment,and...
funded by the SAUDI ARAMCO Cybersecurity Chair at Imam Abdulrahman Bin Faisal University,Saudi Arabia.
One of the most widely used smartphone operating systems,Android,is vulnerable to cutting-edge malware that employs sophisticated logic.Such malware attacks could lead to the execution of unauthorized acts on the vict...
National Natural Science Foundation of China(Grant Nos.62102284,61872262)。
Malware family variants make minor and relevant changes of behaviors based on the original malware.To analyze and detect family variants,security experts must not only understand malware behaviors but also further obs...
supported by the National Natural Science Foundation of China(No.62072005);Natural Science Foundation of Anhui Province,China(No.2108085Y22);Anhui Provincial Engineering Laboratory on Information Fusion and Control of Intelligent Rabot,China(No.IFCIR2020008).
Permission delegation has become a new way for data sharing by delegating the authorized permission to other users.A flexible authorization model with strict access control policies is promising for electronic health ...
This work supports in part by National Key R&D Program of China(No.2018YFB2100400);National Science Foundation of China(No.61872100);Industrial Internet Innovation and Development Project of China(2019);State Grid Corporation of China Co.,Ltd.technology project(No.5700-202019187A-0-0-00).
Delegation mechanism in Internet of Things(IoT)allows users to share some of their permissions with others.Cloud-based delegation solutions require that only the user who has registered in the cloud can be delegated p...
supported by the Technological Innovation and Application Projects of Chongqing(cstc2019jscx-msxmX0077).
The dynamic code loading mechanism of the Android system allows an application to load executable files externally at runtime.This mechanism makes the development of applications more convenient,but it also brings sec...
This work was undertaken during a project funded by the UK’s Digital Catapult Researcher in Residency Fellowship programme(Grant Ref:EP/M029263/1).The funding supported the research,development,and empirical testing presented in this paper.
Access control mechanisms are widely used in multi-user IT systems where it is necessary to restrict access to computing resources.This is certainly true of file systems whereby information needs to be protected again...
Each of us fails from time to time. If we are wise, we accept these failures as a necessary part of the learning process.Daniel, my youngest third-grader, was a shy, nervous kid. His fear of failure kept him from clas...