Follow
Gansen ZHAO
Title
Cited by
Cited by
Year
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
L Yan, C Rong, G Zhao
Cloud Computing: First International Conference, CloudCom 2009, Beijing …, 2009
2452009
Trusted data sharing over untrusted cloud storage providers
G Zhao, C Rong, J Li, F Zhang, Y Tang
2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010
189*2010
PERMIS: a modular authorization infrastructure
D Chadwick, G Zhao, S Otenko, R Laborde, L Su, TA Nguyen
Concurrency and Computation: Practice and Experience 20 (11), 1341-1357, 2008
1332008
Fine-grained data access control systems with user accountability in cloud computing
J Li, G Zhao, X Chen, D Xie, C Rong, W Li, L Tang, Y Tang
2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010
1212010
Fast algorithms to evaluate collaborative filtering recommender systems
F Zhang, T Gong, VE Lee, G Zhao, C Rong, G Qu
Knowledge-Based Systems 96, 96-103, 2016
1062016
Schema conversion model of SQL database to NoSQL
G Zhao, Q Lin, L Li, Z Li
2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and …, 2014
942014
Designing cloud-based electronic health record system with attribute-based encryption
F Xhafa, J Li, G Zhao, J Li, X Chen, DS Wong
Multimedia Tools and Applications 74, 3441-3458, 2015
902015
Modeling MongoDB with relational model
G Zhao, W Huang, S Liang, Y Tang
2013 Fourth International Conference on Emerging Intelligent Data and Web …, 2013
782013
Cloud computing: A statistics aspect of users
G Zhao, J Liu, Y Tang, W Sun, F Zhang, X Ye, N Tang
Cloud Computing: First International Conference, CloudCom 2009, Beijing …, 2009
632009
Deployment models: Towards eliminating security concerns from cloud computing
G Zhao, C Rong, MG Jaatun, FE Sandnes
2010 International Conference on High Performance Computing & Simulation …, 2010
612010
ContractGuard: Defend ethereum smart contracts with embedded intrusion detection
X Wang, J He, Z Xie, G Zhao, SC Cheung
IEEE Transactions on Services Computing 13 (2), 314-328, 2019
532019
Proc. IAU Symp. 298, Setting the scene for Gaia and LAMOST
XW Liu, S Feltzing, G Zhao, NA Walton, P Whitelock
Cambridge Univ. Press, Cambridge, 2014
522014
Cloud Computing: First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings
MG Jaatun, G Zhao, C Rong
Springer, 2009
502009
Reference deployment models for eliminating user concerns on cloud security
G Zhao, C Rong, MG Jaatun, FE Sandnes
The Journal of Supercomputing 61, 337-352, 2012
392012
Obligations for role based access control
G Zhao, D Chadwick, S Otenko
21st International Conference on Advanced Information Networking and …, 2007
382007
Cir-net: Automatic classification of human chromosome based on inception-resnet architecture
C Lin, G Zhao, Z Yang, A Yin, X Wang, L Guo, H Chen, Z Ma, L Zhao, ...
IEEE/ACM Transactions on Computational Biology and Bioinformatics 19 (3 …, 2020
312020
MDP-based quantitative analysis framework for proof of authority
X Liu, G Zhao, X Wang, Y Lin, Z Zhou, H Tang, B Chen
2019 International Conference on Cyber-Enabled Distributed Computing and …, 2019
312019
Multiple nested schema of HBase for migration from SQL
G Zhao, L Li, Z Li, Q Lin
2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and …, 2014
292014
On the modeling of bell-lapadula security policies using RBAC
G Zhao, DW Chadwick
2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for …, 2008
272008
The design of a redundant array of independent net-storages for improved confidentiality in cloud computing
MG Jaatun, G Zhao, AV Vasilakos, ĊA Nyre, S Alapnes, Y Tang
Journal of Cloud Computing: Advances, Systems and Applications 1 (1), 1-19, 2012
262012
The system can't perform the operation now. Try again later.
Articles 1–20