ı
ҳ
һ

  •  2019
    • [Zhang, 2019a] Zhiyong Zhang(־)*, Ranran Sun, Kim-Kwang Raymond Choo, et al. A Novel Situation-Analytics Based Recommendation Algorithm for Multimedia Social Networks [J]. ACM Transactions on Multimedia Computing Communications and Applications, 2018. (Under Review)

    • [Zhang, 2019b] Zhiyong Zhang(־)*, Cheng Li, Brij B. Gupta, et al. Efficient Multi-Authority Ciphertext-Policy Attribute-Based Encryption for Hierarchical Attributes [J]. IEEE Access, 2018. DOI: 10.1109/ACCESS.2018.2854600. (Accepted and To Appear)

    • [Zhang, 2019c] Zhiyong Zhang(־)*, Cheng Li, Brij B. Gupta, et al. Multimedia Social Network Authorization Scheme of Comparison-based Encryption [J]. International Journal of Network Security, 2019. (Accepted and To Appear)

  •  2018
    • [Zhang, 2018a] Zhiyong Zhang(־)*, Kim-Kwang Raymond Choo, Arun Kumar Sangaiah, et al. Crowd Computing for Social Media Ecosystems [J]. Applied Soft Computing, 2018, 66: 492-494. (SCI 000430162100036) [PDF]

    • [Zhang, 2018b] Zhiyong Zhang(־)*, Brij B. Gupta. Social Media Security and Trustworthiness: Overview and New Direction [J]. Future Generation Computer Systems, 2018, 86: 914-925. (Online, SCI, EI 20165103145490) [PDF]

    • [Zhang, 2018c] Zhiyong Zhang(־)*, Jing Wen, Xiaoxue Wang, Changwei Zhao. A Novel Crowd Evaluation Method for Security and Trustworthiness of Online Social Networks Platforms Based on Signaling Theory [J]. Journal of Computational Science, 2018, 26: 468-477.(SCI, EI 20172203719496) [PDF]

    • [Zhang, 2018d] Zhiyong Zhang(־)*, Kim-Kwang Raymond Choo, Brij B. Gupta, et al. The Convergence of New Computing Paradigms and Big Data Analytics Methodologies for Online Social Networks [J]. Journal of Computational Science, 2018, 26: 453-455. (SCI, EI 20181605014667) [PDF]

    • [Tu, 2018] Ziran Tu, Xiangyong Zeng, Zhiyong Zhang(־). More permutation polynomials with differential uniformity six. Science China Information Science йѧF, 2018, 61(3), 038104:1-038104:3. DOI: 10.1007/s11432-017-9118-5. (SCI 000417486900014, EI 20173604124155) [PDF]

    • [Gupta, 2018a] Brij B. Gupta, A.K. Sangaiah, Nadia Nedjah, Shingo Yamaguchi, Zhiyong Zhang(־). Recent research in computational intelligence paradigms into security and privacy for online social networks (OSNs) [J]. Future Generation Computer Systems, 2018, 86: 851C854. [PDF]

    • [Gupta, 2018b] Brij B. Gupta, Shingo Yamaguchi, Zhiyong Zhang(־), Kostas E. Psannis. Security and Privacy of Multimedia Big Data in the Critical Infrastructure [J]. Multimedia Tools and Applications, 2018, 77(9): 10995-10995. (SCI 000431889900036)

    • [Li, 2018] Cheng Li,  Zhiyong Zhang(־)*, Lanfang Zhang, et al. A novel authorization scheme for multimedia social networks under cloud storage method by using MA-CP-ABE [J]. International Journal of Cloud Applications and Computing (Taylor & Francis), 2018. (Accepted)

  •  2017
    • Zhang, 2017a] Zhiyong Zhang(־)*, Ranran Sun, Xiaoxue Wang, et al. A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks [J]. IEEE Transactions on Big Data, 2017, DOI: 10.1109/TBDATA.2017.2657623. (Online) [PDF]

    • [Zhang, 2017b] Zhiyong Zhang(־)*, Arun Kumar Sangaiah. Applied Soft Computing for Online Social Networks [J]. Neural Network World, 2016, 26(6): 539-541. (SCI 000392283000002) [PDF]

    • [Zhang, 2017c] Zhiyong Zhang(־)*, Linqian Han, Cheng Li, et al. A Novel Attribute-Based Access Control Model for Multimedia Social Networks [J]. Neural Network World, 2016, 26(6): 543-557. (SCI 000399394400001) [PDF]

    • [Li, 2017a] Lin Li, Kefeng Fan, Zhiyong Zhang(־), et al. Community Detection Algorithm Based on Local Expansion K-Means [J]. Neural Network World, 2016, 26(6): 589-605. (SCI 000392283000005) [PDF]

    • [Sangaiah, 2017] Arun Kumar Sangaiah, Nadia Nedjahb, Zhiyong Zhang(־)*. Recent Trends in Embedded Technologies and Wearable Systems: Computational Intelligence Solutions [J]. Computers & Electrical Engineering, 2017, 61: 235-237. (SCI 000407981800019, EI 20173104004299) [PDF]

    • [Wang, 2017] Jian Wang,  Kuoyuan Qiao, Zhiyong Zhang(־), et al. A new conflict management method in dempster-shafer theory [J]. International Journal of Distributed Sensor Networks, 2017, 13(3). (SCI 000400351500001, EI 20171803628070) [PDF]

  •  2016
    • [Zhang, 2016a] Weining Feng, Zhiyong Zhang(־)*, Jian Wang, Linqian Han. A Novel Authorization Delegation Scheme for Multimedia Social Networks by using Proxy Re-encryption [J]. Multimedia Tools and Applications (Springer), 2016, 75(21): 13995-14014. DOI: 10.1007/s11042-015-2929-2. (SCI 000386776800052, EI 20153701254312) [PDF]

    • [Zhang, 2016b] Zhiyong Zhang(־)*, Lijun Yang, Hanman Li, et al. A Quantitative and Qualitative Analysis-based Security Risk Assessment for Multimedia Social Networks [J]. International Journal of Network Security, 2016, 18(1): 43-51. (EI 20154701564374) [PDF]

    • [Zhang, 2016c] Zhiyong Zhang(־)*, Ranran Sun, Changwei Zhao, et al. CyVOD: A Novel Trinity Multimedia Social Network Scheme [J]. Multimedia Tools and Applications, 2017, 76(18): 18513C18529. DOI 10.1007/s11042-016-4162-z (SCI 000407861800017, EI 20164803071103) [PDF]

    • [Zhang, 2016d] Zhiyong Zhang(־)*, Kim-Kwang Raymond Choo. Multimedia Social Network Security and Applications [J]. Multimedia Tools and Applications, 2017, 76(3): 3163-3168. DOI 10.1007/s11042-016-4081-z (SCI 000396051200001, EI 20165003108429) [PDF]

    • [Du & Zhang, 2016] Junyi Du, Zhiyong Zhang(־). Analysis on the digging of social network based on user search behavior, International Journal of Smart Home, 2016, 10(5): 297-304. (EI 20162602535286) [PDF]

    • [Zhao, 2016] Գΰ, ڿ, ־. ӾֽƼ㷨 [J]. ͨѧѧ201650(12): 87-91. (EI 20165203176123) [PDF]

  •  2015
    • [Zhang, 2015a] Zhang Zhiyong(־)*, Wang Zhen, Niu Danmei. A Novel Approach to Rights Sharing-Enabling Digital Rights Management for Mobile Multimedia [J]. Multimedia Tools and Applications (Springer), 2015, 74 (16): 6255-6271. DOI: 10.1007/s11042-014-2135-7. (SCI 000359864700009, EI 20143600007178) [PDF]

    • [Zhang, 2015b] Zhang Zhiyong(־)*, Wang Kanliang. A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks [J]. Computer Journal, 2015, 58 (4): 668-678. DOI:10.1093/comjnl/bxu035 (SCI 000359137500011, EI 20151500736707) [PDF]

    • [Zhang, 2015c] Zhang Zhiyong(־)*. Security, Trust and Risk in Multimedia Social Networks [J]. Computer Journal, 2015, 58 (4): 515-517. DOI:10.1093/comjnl/bxu151 (SCI 000359137500001, EI 20151500736718) [PDF]

    • [Zhang, 2015d] Zhang Zhiyong(־)*. The Challenge of Multimedia Social Networks and Security [J]. Recent Advances in Electrical & Electronic Engineering, 2015, 8(2): 72-73. (EI 20153901314334) [PDF]

    • [Chang & Zhang, 2015] Chang Yanan, Zhang Zhiyong(־)*, Wang Jian. A Security Protocol for Trusted Access to Cloud Environment [J]. Recent Advances in Electrical & Electronic Engineering, 2015, 8(2): 135-144. (EI 20162902597361) [PDF]

    • [Sun, 2015] Sun Shuhuan, Zhao Changwei, Zhang Zhiyong(־). A Matrix Factorization based Trust Factors Model [C]. In: Proceedings of 2015 IEEE International Conference on Information and Automation, Lijiang, China, August, 2015. [PDF]

    • [Feng & Zhang, 2015b] ΰ,־*, Գΰ. ýְȨίȨԶ֤Э[J]. ѧ201542(4): 132-135. [PDF]

  •  2014
    • [Wang & Zhang, 2014a] Wang Jian, Zhang Zhiyong(־)*, Xiang Fei, et al. Trusted License Distribution System Based on IPSEC VPN for Mobile DRM [J]. Open Electrical and Electronic Engineering Journal, 2014, 8(1): 34-41. (EI 20152801023852) [PDF]

    • [Chen & Zhang, 2014] , ־*, , .ý罻ķʿģо[J]. ӿƼѧѧ201441(6): 181-187. (EI 20145200360046) [PDF]

    • [Wang & Zhang, 2014b] , ־*, , .һAndroidƽ̨ĶýְȨϵͳ[J]. ѧ201441(5): 129-132,142 . [PDF]

  •  2013
    • [Zhang, 2013a] Zhang Zhiyong(־)*, Wang Kanliang. A Trust Model for Multimedia Social Networks [J]. Social Networks Analysis and Mining (Springer), 2013, 3(4):969-979. DOI: 10.1007/s13278-012-0078-4. [PDF]

    • [Zhao & Zhang, 2013] Zhao Changwei*, Zhang Zhiyong(־)*, Li Hanman, et al. A Social Network Information Propagation Model Considering Different Types of Social Relationships [C]. Springer Advances in Intelligent System and Computing, pp.275-282, 2013. DOI: 10.1007/978-3-319-01796-9_29. (EI 20151600756807) [PDF]

    • [Wang & Zhang, 2013a] Wang Zhen, Zhang Zhiyong(־)*, Chang Yanan, et al. An Approach to Mobile Multimedia Digital Rights Management based on Android [C]. Springer Advances in  Intelligent System and Computing, pp.239-246, 2013. DOI: 10.1007/978-3-319-01796-9_25. (EI 20151600756803) [PDF]

    • [Huang & Zhang, 2013] Huang Tao, Zhang Zhiyong(־)*, Chen Qingli, et al. A Method for Trusted Usage Control over Digital Contents Based on Cloud Computing [J]. International Journal of Digital Content Technology & Its Applications, Vol.7, No.4, pp.795-802, 2013. [PDF]

    • [Zhang, 2013R] ־.ý罻µְȨо[R].ͨѧʿվ棬20131.

    • [Wang & Zhang, 2013b] , ־, . һֿżֵ֧DRMϵͳ䰲ȫЭо[J]. ѧ201340(6): 103-107. [PDF]

    • [Zhang, 2013b] ־. DRMְȨ½չ[J].簲ȫӦã2013(10): 96-97+100. [PDF]

  •  2012
    • [Zhang, 2012a] Zhang Zhiyong(־)*. Frontier and Methodologies on Digital Rights Management for Multimedia Social Networks [J]. International Journal of Digital Content Technology & Its Applications, Vol.6, No.9, pp.245-249, 2012. (EI 20122415113619) [PDF]

    • [Zhang, 2012b] Zhang Zhiyong(־)*, Maheswaran Muthucumaru. Multimedia Contents Security in Social Networks Applications (Editorial). Journal of Multimedia, 2012, 7(4): 1-2. [PDF] 

    • [Yang & Zhang, 2012a] Yang Lijun, Zhang Zhiyong(־)*, Pu Jiexin. Rough Set and Trust Assessment-based Potential Paths Analysis and Mining for Multimedia Social Networks [J]. International Journal of Digital Content Technology & Its Applications, Vol.6, No.22, pp. 640-647, 2012. (EI 20125215835371) [PDF]

    • [Yang & Zhang, 2012b] Yang Lijun, Zhang Zhiyong(־)*, et al. Advance on Trust Model and Evaluation Method in Social Networks [C]. In: Proc. of  The Sixth International Conference on Genetic and Evolutionary Computing, Kitakyushu, Japan, 2012. (EI 20131016077249, ISTP 000319285800003) [PDF]

    • [Wang & Zhang, 2012a] Wang Jian*, Zhang Zhiyong(־)*, Xiang Fei, et al. A Trusted Authentication Protocol based on SDIO Smart Card for DRM [J]. International Journal of Digital Content Technology & Its Applications, Vol.6, No.23, pp.222-233. (EI 20130215886141) [PDF]

    • [Xiang, 2012a] Xiang Fei, Zhang Lei, Zhang Zhiyong(־), et al. True Random Bit Generator Based on Cell Phone Recording and Chaotic Encryption [C]. In: Proc. of IEEE International Conference on Automation and Logistics, 2012. (EI 20124415628728) [PDF]

    • [Zhang, 2012c] ־*, , . ý罻еݰȫַо[J]. ѧ, 2012, 39(4): 94-97. [PDF]

  •  2011
    • [Zhang, 2011a] Zhang Zhiyong(־)*, Pei Qingqi, Yang Lin, Ma Jianfeng. Game-Theoretic Analyses and Simulations of Adoptions of Security Policies for DRM in Contents Sharing Scenario [J]. Intelligent Automation and Soft Computing, Vol. 17, No.2, pp.191-203, 2011. (SCI 000288881400007) [PDF]

    • [Zhang, 2011b] Zhang Zhiyong(־)*. Digital Rights Management Ecosystem and its Usage Controls: A Survey [J]. International Journal of Digital Content Technology & Its Applications, Vol.5, No.3, pp.255-272, 2011.  (EI 20112214020460) [PDF] [Html]

    • [Zhang, 2011c] Zhang Zhiyong(־)*, Tao Huang, Danmei Niu, Lili Zhang. Usage Control Model for Digital Rights Management in Digital Home Networks [J]. Journal of Multimedia, Vol.6, No.4, pp.376-383, 2011. (EI 20113414261239) [PDF] [Html]

    • [Zhang, 2011d] Zhang Zhiyong(־)*. Digital Rights Management Ecosystem: Open Issues and Challenges [J]. International Journal of Digital Content Technology & Its Applications, Vol.5, No.11, pp.290-296, 2011. (EI 20114814568290)  [PDF] 

    • [Niu & Zhang, 2011] Niu Danmei, Zhang Zhiyong(־), Wang Shaofeng, et al. A Novel Approach to Digital Contents Sharing for Digital Home Network [J]. International Journal of Digital Content Technology & Its Applications, Vol.5, No.11, pp.324-333, 2011. (EI 20114814568294) [PDF] 

    • [Zhang & Zhang, 2011] Zhang Lili, Zhang Zhiyong(־), Niu Danmei, et al. A Novel DRM Security Scheme and its Prototype System Implementation[J]. International Journal of Digital Content Technology & Its Applications, Vol.5, No.11, pp.334-342, 2011. (EI 20114814568295) [PDF]

    • [Tang, 2011] Tang Guoliang, Liu Zhongyong, Zhang Zhiyong(־), et al. Blind watermarking algorithm based on wavelet-transform and fractal self-similarity[J]. International Journal of Digital Content Technology & Its Applications, Vol.5, No.11, pp.402-410, 2011. (EI 20114814568302) [PDF]

    • [Zhang, 2011e] ־*, ţ÷. ְȨȨʹÿоչ[J]. ѧ, 2011, 38(4): 48-54.  [PDF]

  •  2010
    • [Zhang, 2010a] Zhang Zhiyong(־)*, Lian Shiguo, Pei Qingqi, Pu Jiexin. Fuzzy Risk Assessments on Security Policies for Digital Rights Management [J]. Neural Network World, Vol. 20, No.3, pp.265-284, 2010. (SCI 000280426100002, EI 20103213125917) [PDF] [Html]

    • [Zhang, 2010b] Zhang Zhiyong(־)*. Security, Trust and Risk in Digital Rights Management Ecosystem [C]. In: Proc. of 2010 International Conference on High Performance Computing & Simulation, Special Session on Trusted Ubiquitous Networks & Multimedia Contents Protection, Caen, France, Jun, 2010. (EI 20103913258649) [PDF] [Html]

    • [Zhang, 2010c] Zhang Zhiyong(־)*, Liu Xinliang, Pu Jiexin. Utility-Analytic Approach and Swarm Simulations of Security Policies in Digital Rights Management [J]. Journal of Multimedia, Vol.5, No.5, pp.417-426, 2010. (EI 20104613391495) [PDF] [Html]

    • [Zhang, 2010d] Zhang Zhiyong(־)*, Huang Tao, Wu Qingtao, Pu Jiexin. A CSCW-Enabling Integrated Access Control Model and its Application [J]. Advanced Materials Research, Vol.108-111, pp.426-435, 2010. (EI 20102713054574, ISTP 000282765400074) [PDF] [Html]

    • [Niu & Zhang, 2010] Niu Danmei, Zhang Zhiyong(־), Zhang Lili. A DRM System for Home Network Based on RBAC and License Chain [C]. In: Proc. of  The Fourth International Conference on Genetic and Evolutionary Computing, Shenzhen ,China, Dec, 2010. (EI 20111113753217) [PDF] [Html]

    • [Zhang & Zhang, 2010] Zhang Lili*, Zhang Zhiyong(־)*, Sen Sen, et al. A DRM System Based on PKI [C]. In: Proc. of  The Fourth International Conference on Genetic and Evolutionary Computing, Shenzhen ,China, Dec, 2010. (EI 20111113753219) [PDF] [Html]

    • [Ye, 2010] Ye Chuanqi, Xinliang Liu, Zhang Zhiyong(־), et al. Multi-Spectral and Panchromatic Image Fusion Based on Region Correlation Coefficient in Nonsubsampled Contourlet Transform Domain [C]. In: Proc. of  The Fourth International Conference on Genetic and Evolutionary Computing, Shenzhen ,China, Dec, 2010. (EI 20111113753216) [PDF] [Html]

  •  2009
    • [Zhang, 2009a] Zhang Zhiyong(־)*, Pei Qingqi, Yang Lin, Ma Jianfeng. Security and Trust in Digital Rights Management: A Survey [J]. International Journal of Network Security, 2009, 9(3): 247-263. (EI 20131316154339) [PDF] [Cite1] Zoltn Hornk, Istvn Nyilas, Dniel Petr, et al, uTRUSTit C Usable Trust in the Internet of Things, Technical Report, SEARCH-LAB Ltd, Dec, 2010.

    • [Zhang, 2009b] Zhiyong Zhang(־)*, Qingqi Pei, Jianfeng Ma, Lin Yang, Kefang Fan. Cooperative and Non-Cooperative Game-Theoretic Analyses of Adoptions of Security Policies for DRM [C]. In: Proc. of 5th IEEE International Workshop on Digital Rights Management Impact on Consumer Communications, Satellite Workshop of 6th IEEE Consumer Communications & Networking Conference, Jan 10-13, Las Vegas, Nevada, U.S. (EI 20091512027309, ISTP 000268009200279) [PDF] [Html1] [Html2]  [Cite1]  B. Ali and M. Maheswaran, Using Social Factors in Digital Rights Management, Proc. of 4th USENIX Workshop on Hot Topics on Security, August 2009, Montreal, Canada.  [Cite2] B. Ali and M. Maheswaran, Aligning the Incentives for Social Media Distribution, Technical Report, School of Computer Science, Jan, 2010. [Cite3] P. A. Jamkhedkar, G. L. Heileman, C. C. Lamb, An interoperable usage management framework, Proc. of 10th Annual ACM Workshop on Digital Rights Management, pp.73-87, 2010. [Cite4] Pramod Jamkhedkar, "A Framework for Usage Management," PhD Dissertation, The University of New Mexico, Albuquerque, New Mexico, USA, 2011.

    • [Zhang, 2009c] Zhang Zhiyong(־)*, Pei Qingqi, Yang Lin, Ma Jianfeng. Establishing Multi-Party Trust Architecture for DRM by Using Game-Theoretic Analysis of Security Policies [J] Chinese Journal of ElectronicsѧӢİ棩, 2009, 18(3): 519-524. (SCI 000268110500027, EI 20093612286410) [PDF] [Cite1] QIU Qin, TANG Zhi1, LI Fenghua, et al. A Personal DRM Scheme Based on Social Trust, Chinese Journal of Electronics, 2012, 21(4):719-724. [Cite2] HUANG Qin-long, MA Zhao-feng, YANG Yi-xian, et al. Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing, The Journal of China Universities of Posts and Telecommunications, 2013, 20(6): 88C95.

    • [Zhang, 2009d] ־*, ֣.֧֤Զ֤ģͼ䰲ȫЭ[J].ӿƼѧѧ, 2009, 36(1): 58-63+105. (EI 20091211966375) [PDF]

    • [Zhang, 2009e] ־, .һιίȨģͼP2PȫеӦ[J].ѧ, 2009, 36(10): 72-76. [PDF]

    • [Zhang, 2009f] Ph.D.Dissertation (in English).Security Policies Analyses and Adoptions in Digital Rights Management [D] (CNKIȫĹ). ӿƼѧʿģ20099. [ϸժҪPDF] [Extended Abstract in English PDF] [Html]

    • [Zhang, 2009g] ־*, Ҷ棬Ʒ壬ţ÷. DRMȫԵģηЧѡȡ[J]. ͨѧ, 2009, 30(10A): 126-131. (EI 20102913085578) [PDF]

    • [Zhang, 2009h] Zhang Zhiyong(־)*, Pu Jiexin, Wu qingtao, Zhang Lili, Niu Danmei. Fuzzy Utility-Factor Assessments and Swarm Simulations on DRM Security Policies [C]. In: Proc. of 2009 International Conference on Computer and Communications Security, IEEE Computer Society, Hong Kong, pp.55-59, Dec, 2009. (EI 20101512832855, ISTP 000276142900015)  [PDF] [Html1] [Html2]

  •  2008
    • [Zhang, 2008a] ־*, ֣壬ս. ڿżCSCWϵͳʿо[J].пƼѧѧȻѧ棩200836(1):59-62.EI 081511196576[PDF]

    • [Zhang, 2008b] Zhiyong Zhang(־)*,Qingqi Pei,Jianfeng Ma,Lin Yang, Kefang Fan. A Fine-grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement [C]. International Conference on Computational Intelligence and Security,Dec.13-17,2008 Suzhou SIP,China. (EI 090911923791, ISTP 000268099900205) [PDF] [Html1] [Html2]

    • [Zhang, 2008c] Zhiyong Zhang(־)*, Qingqi Pei, Jianfeng Ma, Lin Yang. A Benefits-Centric Multi-Participant Trust Architecture for DRM-Enabling Digital Contents Value Chain Ecosystem [C]. 2008 International Seminar on Business and Information Management, Wuhan, China, Dec 19, 2008. (EI 20094312395422,ISTP 000269752000051)[PDF] [Html1] [Html2]

    • [Zhang, 2008d] Zhiyong Zhang(־)*, Qingqi Pei, Lin Yang. Implementing Trustworthy Dissemination of Digital Contents by Using a Third Party Attestation Proxy-Enabling Remote Attestation Model [C].2008 International Conference on MultiMedia and Information Technology, Three Gorges, China, Dec 30-31, 2008. (EI 20094112369076, ISTP 000269971400081) [PDF] [Html1] [Html2]

    • [Zhang, 2008e] ־*, .ιлڽɫίȨоչ[J]. Ӧо200825(6):1601-1605+1610. [PDF]

  •  2007
    • [Zhang, 2007a] Zhang Zhiyong (־)*, Yang Lin , Pei Qingqi, Ma Jianfeng . Research on Usage Control Model with Delegation Characteristics Based on OM-AM Methodology [C].2007 IFIP International Conference on Network and Parallel Computing, in Conjunction with IFIP International Workshop on Network and System Security, Dalian,China, Sep, 2007.  (EI 083111412681, ISTP 000251390000042) [PDF] [Html1] [Html2]  [Cite1] A. Lazouski, F. Martinelli, P. Mori, A Survey of Usage Control in Computer Security, The National Research Council, Institute of Informatics and Telematics (IIT) Technical Report-12, pp.1-21, Italy, 2008.  [Cite2] A. Lazouski, F. Martinelli, P. Mori, Usage Control in Computer Security: A Survey ,  Computer Science Review, 4(2010): 81-99. [Cite3] Yongming Jin, Jinqiang Ren, Zhong Chen, et al, An Improved Scheme for Delegation Based on Usage Control , Proc. of 2008 Second International Conference on Future Generation Communication and Networking, pp.74-78. [Cite4] Salim, Farzad and Reid, Jason F. and Dawson, Edward, An administrative model for UCON. In: Proceedings of he 8th Australasian Information Security Conference (AISC 2010), 18-21 January 2010, Brisbane, Queensland, Australia. [Cite5] Patricia Ghann, Changda Wang and Conghua Zhou, "Usage control: a solution to access control in a distributed- network-connected environment," In: Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013), pp.264-269, Paris, France. [Cite6] Xiaoliang Hu, Sylvia L. Osborn, "A New Approach for Delegation in Usage Control," In: Proceedings of the third ACM conference on Data and application security and privacy, pp.269-276 , February 18C20, 2013, San Antonio, Texas, USA. [Cite7] Farzad Salim, "Approaches to Access Control Under Uncertainty," Ph.D Dissertation, Queensland Univ. of Technology, Australia, 2012. [Cite8] Patricia Ghann*, Changda Wang and Conghua Zhou, Usage control: a solution to access control in a distributed- network-connected environment, Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering, Paris, France. [Cite9] Abdulgader Z. Almutairi, Context-Aware and Adaptive Usage Control Model, PhD Dissertation, De Montfort University, United Kingdom, 2012, Sep. [Cite10] Lorena Gonzlez Manzano, Ana I. Gonzlez Tablas and Jos M. de Fuentes, SoNeUCONADM: the administrative model for SoNeUCONABC usage control model, Actas de la XIII Reunin Española sobre Criptologa y Seguridad de la Informacin : celebrado del 5 al 8 de septiembre 2014, Alicante, pp. 209-214. [Cite11] Lorena Gonzlez Manzano, "A user-managed access control model and mechanisms for Web Based Social Networks. Enhancing expressive power, co-ownership management, interoperability and authorized data exposures", Ph.D Dissertation, UNIVERSITY CARLOS III OF MADRID, Jun, 2014.

    • [Zhang, 2007b] ־*֣壬ս. CSCWϵͳʿģͼڿż㼼ʵ[J].ѧ200734(9):117-121+124. [PDF]

  •  2006
    • [Zhang, 2006a] ־*,ս.ίȨPMIϵܹеоӦ[J]. 200632(5): 152-154.EI 06169831777[PDF]

    • [Zhang, 2006b] ־*, ս.칹ֲʽCSCWίȨģͼʿ[J].200632(12): 71-73.EI 06289997153[PDF]

    • [Zhang, 2006c] ־*սţ. UCOND: Usage Controlίģؼо[J].簲ȫӦã2006(5): 42-44. [PDF]

    • [Zhang, 2006d] Zhang Zhiyong(־)*. Role Based Access Control Model and Object-Oriented Modeling [C], The Proceedings of the China Association for Science and Technology, Vol.2, 2006.  

    • [Zhang, 2006e] Zhang Zhiyong(־)*, Pu Jiexin, Zhang Shaozhong. Dynamic Capability Delegation Model for MAS, Architecture and Protocols in CSCW Environment [C]. The 10th International Conference on CSCW in Design, Nanjing, China, May.3-5, 2006.EI 073210756595, ISTP BFD79[PDF] [Html]

    • [Zhang, 2006f] Zhang Zhiyong(־)*, Pu Jiexin. Collaboration Access Control Model for MAS Based on Role and Agent Cooperative Scenarios [C]. IEEE International Conference on Mechatronics and Automation, Luoyang, China, Jun 25-28, 2006.EI 071710567371, ISTP BFE23[PDF] [Html]

  •  2005
    • [Zhang, 2005a] ־*ս.һչίģͼĽģ[J].Ӧ200522(9): 30-32.  [PDF]

    • [Zhang, 2005b] ־*, ս.RBACCORBAֲʽϵͳȫеӦ[J].̣200531(20): 159-161.EI 05479497245[PDF]

    • [Zhang, 2005c] Zhang Zhiyong(־)*, Pu Jiexin. Delegation Model for CSCW Based on RBAC Policy and Visual Modeling [C]. In: Proceedings of The 11th Joint International Computer Conference, World Scientific Press Company, Chongqing, China, Nov, 2005.EI 20142817916561, ISTP Print-Style  BDF35[PDF] [Html]

    • [Zhang, 2005d] ־*սţ볤Զ.ڽɫЭMASģͼӦ[J]. 2005ȫʽֲ벢мѧ飨DPCS2005ļOct27-29ϺѧӦ200522(10): 107-109. [PDF]

  •  2002-2004 
    • [Zhang, 2004a] ־*. ڽɫķʿģͼĽģ[J].ƣ200425(8): 1367-1369+1374. [PDF]

    • [Zhang, 2004b] Zhang Zhiyong(־)*, Pu Jiexin. Permission-Role Based Delegation Model and Object-Oriented Modeling [C]. In: Proceedings of China National Open Distributed and Parallel Computing Symposium 2004, Beijing, China,  pp.52-55, 2004.

    • [Zhang, 2003] ־. RBACģ͵оݿʿеӦ[D] (CNKIȫĹ). ѧ˶ʿѧλģ20033. [Html]

    • [Wang & Zhang, 2003] Ϻ־*.һֻڽɫݿⰲȫʿƷʵ[J].Ӧо2003(3): 87-88+107. [PDF]

    • [Zhang, 2002] У־. JDBC칹ֲʽݿ[J]. ̣200228(12): 273-275. [PDF]

ע áߣݡţӡ*ΪͬͨѶߣδӡ*ĬϵһΪͨѶߡҪгҪԭģѧڿ顢ѧλĵȡ

ӣ2016JCR-SCIӰ(XLS)  2016пԺ·ֵСࣩ  JCR-SCIӰӲѯWebsite  LetPubӰӺͷѯWebsite   2014EIڿĿ¼(XLSX)  CCFƼڿͻĿ¼(Website)

ҳ | оȤ | о | ı | ѧ | ֪ʶȨ | ѧλ | ѧ | о | ͬ

Copyrights ©Multimedia Content Security Innovative Research Group, SIGDRM™ 2006-2015. All Copyrights Reserved.