Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography L Yan, C Rong, G Zhao Cloud Computing: First International Conference, CloudCom 2009, Beijing …, 2009 | 245 | 2009 |
Trusted data sharing over untrusted cloud storage providers G Zhao, C Rong, J Li, F Zhang, Y Tang 2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010 | 189* | 2010 |
PERMIS: a modular authorization infrastructure D Chadwick, G Zhao, S Otenko, R Laborde, L Su, TA Nguyen Concurrency and Computation: Practice and Experience 20 (11), 1341-1357, 2008 | 133 | 2008 |
Fine-grained data access control systems with user accountability in cloud computing J Li, G Zhao, X Chen, D Xie, C Rong, W Li, L Tang, Y Tang 2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010 | 121 | 2010 |
Fast algorithms to evaluate collaborative filtering recommender systems F Zhang, T Gong, VE Lee, G Zhao, C Rong, G Qu Knowledge-Based Systems 96, 96-103, 2016 | 106 | 2016 |
Schema conversion model of SQL database to NoSQL G Zhao, Q Lin, L Li, Z Li 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and …, 2014 | 94 | 2014 |
Designing cloud-based electronic health record system with attribute-based encryption F Xhafa, J Li, G Zhao, J Li, X Chen, DS Wong Multimedia Tools and Applications 74, 3441-3458, 2015 | 90 | 2015 |
Modeling MongoDB with relational model G Zhao, W Huang, S Liang, Y Tang 2013 Fourth International Conference on Emerging Intelligent Data and Web …, 2013 | 78 | 2013 |
Cloud computing: A statistics aspect of users G Zhao, J Liu, Y Tang, W Sun, F Zhang, X Ye, N Tang Cloud Computing: First International Conference, CloudCom 2009, Beijing …, 2009 | 63 | 2009 |
Deployment models: Towards eliminating security concerns from cloud computing G Zhao, C Rong, MG Jaatun, FE Sandnes 2010 International Conference on High Performance Computing & Simulation …, 2010 | 61 | 2010 |
ContractGuard: Defend ethereum smart contracts with embedded intrusion detection X Wang, J He, Z Xie, G Zhao, SC Cheung IEEE Transactions on Services Computing 13 (2), 314-328, 2019 | 53 | 2019 |
Proc. IAU Symp. 298, Setting the scene for Gaia and LAMOST XW Liu, S Feltzing, G Zhao, NA Walton, P Whitelock Cambridge Univ. Press, Cambridge, 2014 | 52 | 2014 |
Cloud Computing: First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings MG Jaatun, G Zhao, C Rong Springer, 2009 | 50 | 2009 |
Reference deployment models for eliminating user concerns on cloud security G Zhao, C Rong, MG Jaatun, FE Sandnes The Journal of Supercomputing 61, 337-352, 2012 | 39 | 2012 |
Obligations for role based access control G Zhao, D Chadwick, S Otenko 21st International Conference on Advanced Information Networking and …, 2007 | 38 | 2007 |
Cir-net: Automatic classification of human chromosome based on inception-resnet architecture C Lin, G Zhao, Z Yang, A Yin, X Wang, L Guo, H Chen, Z Ma, L Zhao, ... IEEE/ACM Transactions on Computational Biology and Bioinformatics 19 (3 …, 2020 | 31 | 2020 |
MDP-based quantitative analysis framework for proof of authority X Liu, G Zhao, X Wang, Y Lin, Z Zhou, H Tang, B Chen 2019 International Conference on Cyber-Enabled Distributed Computing and …, 2019 | 31 | 2019 |
Multiple nested schema of HBase for migration from SQL G Zhao, L Li, Z Li, Q Lin 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and …, 2014 | 29 | 2014 |
On the modeling of bell-lapadula security policies using RBAC G Zhao, DW Chadwick 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for …, 2008 | 27 | 2008 |
The design of a redundant array of independent net-storages for improved confidentiality in cloud computing MG Jaatun, G Zhao, AV Vasilakos, ĊA Nyre, S Alapnes, Y Tang Journal of Cloud Computing: Advances, Systems and Applications 1 (1), 1-19, 2012 | 26 | 2012 |