Follow
Dana Zhang
Title
Cited by
Cited by
Year
Role engineering using graph optimisation
D Zhang, K Ramamohanarao, T Ebringer
Proceedings of the 12th ACM symposium on Access control models and …, 2007
1822007
Permission set mining: Discovering practical and useful roles
D Zhang, K Ramamohanarao, T Ebringer, T Yann
Computer Security Applications Conference, 2008. ACSAC 2008. Annual, 247-256, 2008
432008
Rolevat: Visual assessment of practical need for role based access control
D Zhang, K Ramamohanarao, S Versteeg, R Zhang
Computer Security Applications Conference, 2009. ACSAC'09. Annual, 13-22, 2009
352009
Graph based strategies to role engineering
D Zhang, K Ramamohanarao, S Versteeg, R Zhang
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
222010
An evaluation technique for network intrusion detection systems
D Zhang, C Leckie
Proceedings of the 1st international conference on Scalable information …, 2006
142006
Efficient Graph Based Approach to Large Scale Role Engineering.
D Zhang, K Ramamohanarao, R Zhang, S Versteeg
Trans. Data Privacy 7 (1), 1-26, 2014
92014
Synthetic data generation for study of role engineering
D Zhang, K Ramamohanarao, R Zhang
72008
Data Mining for Role Based Access Control
D Zhang, K Ramamohanarao, T Ebringer, J Bailey
University of Melbourne, School of Engineering, 2010
42010
Network Intrusion Detection Techniques for Single Source and Coordinated Scans
D Zhang
Honours thesis, The University Of Melbourne, 2005
12005
Towards Declarative Monitoring of Declarative Service Compositions
K Taylor, P Brebner, M Kearney, D Zhang, K Lam, V Tosic
Data Engineering Workshop, 2007 IEEE 23rd International Conference on, 315-322, 2007
2007
The system can't perform the operation now. Try again later.
Articles 1–10