Journal Papers

Policy Analysis for Administrative Role Based Access Control without Separate Administration , by Ping Yang, Mikhail Gofman, Scott Stoller, and Zijiang Yang, Journal of Computer Security, 23(1), pages 1--29, 2015. [pdf]

Privacy-preserving Virtual Machine Checkpointing Mechanism, by Mikhail Gofman, Ruiqi Luo, Chad Wyszynski, Yaohui Hu, Ping Yang, and Kartik Gopalan, Special Issue on Information Assurance and System Security in Cloud Computing, Journal of Cloud Computing, 3(3), pages 245 -- 266, 2014. [pdf]

Satisfiability Analysis of Workflows with Control-Flow Patterns and Authorization Constraints, by Ping Yang, Xing Xie, Indrakshi Ray, and Shiyong Lu, IEEE Transactions on Services Computing, 7(2), pages 237-251, April-June 2014. [pdf]

Efficient Policy Analysis for Evolving Administrative Role Based Access Control, by Mikhail Gofman and Ping Yang, International Journal of Software and Informatics, 8(1), pages 95 -- 131, 2014. [pdf]

Trustworthy and Dynamic Mobile Task Scheduling in Data-Intensive Scientific Workflow Environments, by Zijiang Yang, Shiyong Lu, Ping Yang, and Andrey Kashlev, International Journal of Computers and Their Applications, 20(2), pages 65--77, June 2013.

Model Checking Approach to Secure Host Access Enforcement of Mobile Tasks in Scientific Workflows, by Zijiang Yang, Shiyong Lu, Ping Yang and Fahima Bhuyan, Special Issue on Scientific Workflows, Provenance and Their Applications, International Journal of Computers and Their Applications, 18(3), page 148--159, 2011.

Policy Analysis for Administrative Role Based Access Control, by Amit Sasturkar, Ping Yang, Scott D. Stoller, and C.R. Ramakrishnan, Theoretical Computer Science, Volume 412, Issue 44, Pages 6208-6234, 14 October 2011, © Elsevier. [PDF]

Symbolic Reachability Analysis for Parameterized Administrative Role Based Access Control, by Scott D. Stoller, Ping Yang, Mikhail Gofman, and C. R. Ramakrishnan, Computers & Security , 30(2-3), pages 148-164, March-May 2011. [PDF]

Secure Scientific Workflow Provenance Querying with Security Views, by Artem Chebotko, Shiyong Lu, Seunghan Chang, Farshad Fotouhi and Ping Yang, IEEE Transactions on Services Computing , 3(4), pages 322--337, 2010. [pdf]

Information Flow Analysis of Scientific Workflows, by Ping Yang, Shiyong Lu, Mikhail Gofman, and Zijiang Yang, Special issue on scientific workflows, Journal of Computer and System Sciences (JCSS) , volume 76(6), pages 390-402, © Elsevier, 2010.

A Logical Encoding of the Pi-Calculus: Model Checking Mobile Processes Using Tabled Resolution , by Ping Yang, C.R. Ramakrishnan and Scott A. Smolka, International Journal on Software Tools for Technology Transfer, 6(1), pages 38--66, June 2004, © Springer-Verlag. [abstract| bibtex| pdf]

Agent-Oriented Commonsense Knowledge Base, by Ruqian Lu, Chunyi Shi, Songmao Zhang, X. Mao, Jinghui Xu, Ping Yang and Lu Fan, Scientia Sinica , Series E, pages 641-652, Dec. 2000.

Refereed Conference/Workshop Papers

Security Analysis of Email Systems, Tianlin Li, Amish Mehta, Ping Yang, 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017.

Quick Eviction of Virtual Machines Through Proactive Live Snapshots, Dinuni Fernando, Hardik Bagdi, Yaohui Hu, Ping Yang, Kartik Gopalan, Charles Kamhoua, and Kevin Kwiat, 9th IEEE/ACM International Conference on Utility and Cloud Computing, 2016 (Acceptance rate: 18%)

Privacy-preserving Virtual Machines, Tianlin Li, Yaohui Hu, Ping Yang, Kartik Gopalan, the 31th Annual Computer Security Applications Conference (ACSAC), 2015 (Acceptance rate: 24.5%)

Performance Analysis of Encryption in Securing the Live Migration of Virtual Machines, Yaohui Hu, Sanket Panhale, Tianlin Li, Emine Ugur Kaynar, Danny Chan, Umesh Deshpande, Ping Yang Kartik Gopalan, the 8th IEEE International Conference on Cloud Computing, applications track, in press, 2015 (Acceptance rate: 20%)

Policy Analysis for Administrative Role Based Access Control without Separate Administration, Ping Yang, Mikhail Gofman, and Zijiang Yang, the 27th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC13), full paper, pages 49--64, © Lecture Notes in Computer Science, 2013 (Acceptance rate: 35.5%). [pdf]

An Application-Level Approach for Privacy-preserving Virtual Machine Checkpointing, Yaohui Hu, Tianlin Li, Ping Yang, and Kartik Gopalan, the 6th IEEE International Conference on Cloud Computing, research track, pages 59--66, © IEEE press, 2013 (Acceptance rate: 19%) [pdf]

Analysis of Scientific Workflow Provenance Access Control Policies, Ruiqi Luo, Ping Yang, Shiyong Lu, and Mikhail I. Gofman, The 9th IEEE International Conference on Services Computing (SCC), application and experience track, pages 266--273, © IEEE Press, 2012. [pdf]

SPARC: A Security and Privacy Aware Virtual Machine Checkpointing Mechanism, Mikhail I. Gofman, Ruiqi Luo, Ping Yang and Kartik Gopalan, Proceedings of the 10th annual ACM Workshop on Privacy in the Electronic Society (WPES), in conjunction with the ACM Conference on Computer and Communications Security (CCS), full paper, pages 115--124, © ACM Press, 2011. (Acceptance rate of full paper: 16%). [pdf]

A case for Secure Virtual Append-only Storage for Virtual Machines , Zhao Lin, Kartik Gopalan, and Ping Yang, International Workshop on Security in Cloud Computing (SCC), in conjunction with ICPP, © IEEE Press, 2010.

User-Role Reachability Analysis of Evolving Administrative Role Based Access Control, by Mikhail Gofman, Ruiqi Luo, and Ping Yang, 15th European Symposium on Research in Computer Security (ESORICS), pages 455-471, © Lecture Notes in Computer Science, 2010. (Acceptance rate: 20.9%) pdf

Incremental Information Flow Analysis of Role Based Access Control, by Mikhail Gofman, Ruiqi Luo, Jian He, Yingbin Zhang, and Ping Yang, International Conference on Security and Management, pages 397--403, © CSREA press, 2009. (Acceptance rate: 26%) [abstract | pdf]

Symbolic Reachability Analysis for Parameterized Administrative Role Based Access Control, by Scott D. Stoller, Ping Yang, Mikhail Gofman, and C. R. Ramakrishnan, 14th ACM symposium on access control models and technologies (SACMAT), Pages 165--174, © ACM press, 2009. (Acceptance rate: 32%) [abstract| pdf]

RBAC-PAT: A Policy Analysis Tool for Role Based Access Control, by Mikhail Gofman, Ruiqi Luo, Ayla Solomon, Yingbin Zhang, Ping Yang and Scott D. Stoller, 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Pages 46--49, Lecture Notes in Computer Science, © Springer-Verlag, 2009. (27 regular papers and 8 tool papers accepted among 131 submissions) [abstract| pdf]

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols, by N. Garepalli, Kartik Gopalan and Ping Yang, 17th IEEE International Conference on Computer Communications and Networks (ICCCN), pages 1--6, © IEEE press, 2008 (Acceptance rate: 24.6%, Best paper candidate). [pdf]

Secure Scientific Workflow Provenance Querying with Security Views, by Artem Chebotko, Seunghan Chang, Shiyong Lu, Farshad Fotouhi and Ping Yang, 9th International Conference on Web-Age Information Management (WAIM), pages 349-356, © IEEE press, 2008. (Acceptance rate: 25%)[pdf]

Formal Modelling and Analysis of Scientific Workflows Using Hierarchical State Machines, by Ping Yang, Zijiang Yang and Shiyong Lu, 2nd International Workshop on Scientific Workflows and Business Workflow Standards in e-Science, held in conjuction with IEEE international conference on e-science and grid computing, pages 619-626, © IEEE press, 2007. [abstract| bibtex| pdf]

Efficient Policy Analysis for Administrative Role Based Access Control, By Scott D. Stoller, Ping Yang, C. R. Ramakrishnan, and Mikhail Gofman, 14th ACM Conference on Computer and Communications Security (CCS), pages 445-455, © ACM press, 2007. (Acceptance rate: 18%) [abstract| bibtex| pdf]

Itinerary-Based Access Control for Mobile Tasks in Scientific Workflows, By Zijiang Yang, Shiyong Lu, and Ping Yang, IEEE International Symposium on Ubisafe Computing, pages 506-511, © IEEE press, 2007.

Runtime Security Verification for Itinerary-Driven Mobile Agents, By Zijiang Yang, Shiyong Lu, Ping Yang, 2nd IEEE Symposium on Dependable Autonomic and Secure Computing (DASC), pages 177-186, © IEEE Press, 2006. [abstract| bibtex]

Policy Analysis for Administrative Role Based Access Control, by Amit Sasturkar, Ping Yang, Scott D. Stoller and C.R. Ramakrishnan, 19th IEEE Computer Security Foundations Workshop (CSFW), pages 124-138, © IEEE Press, 2006. (Acceptance rate: 24.5%) [abstract| bibtex| pdf]

Parameterized Verification of Pi-Calculus Systems, by Ping Yang, Samik Basu and C.R.Ramakrishnan, 12th. International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), pages 42-57, lecture notes in computer science, © Springer-Verlag, 2006. (Acceptance rate: 25%)[abstract| bibtex| pdf| technical report]

A Provably Correct Compiler for Efficient Model Checking of Mobile Processes, by Ping Yang, Yifei Dong, C.R. Ramakrishnan and Scott A. Smolka, Seventh International Symposium on Practical Aspects of Declarative languages, pages 113-127, lecture notes in computer science, © Springer-Verlag, 2005 (Most Practical Paper Award). [abstract| bibtex| pdf]

Monte Carlo Analysis of Security Protocols: Needham-Schroeder Revisited, by Radu Grosu, Xiaowan Huang, Scott A. Smolka and Ping Yang, DIMACS workshop on Security Analysis of Protocols, June 2004. [abstract| bibtex| pdf]

A Logical Encoding of the Pi-Calculus: Model Checking Mobile Processes Using Tabled Resolution, by Ping Yang, C.R. Ramakrishnan and Scott A. Smolka, Fourth International Conference on Verification, Model Checking and Abstract Interpretation, pages 116-131, lecture notes in computer science, © Springer-Verlag, 2003. [abstract| bibtex| ps]

Talk to Computer in a Natural Way, by Ruqian Lu, Songmao Zhang, Zhi Jin, Lengning Liu, Guangfeng Ji, Ping Yang, and Lu Fan, Proc.of the 4th International Symposium on Future Software Technology, 1999.

Triangle Pieces Intersection of Collision Detection, by Lu Fan, Ping Yang and Ruqian Lu, Proc. of the International Symposium on Future Software Technology, 1998.

Ph.D. Thesis

Verification Techniques for Mobile Processes and Security Protocols, Ping Yang, Ph.D. Thesis, Stony Brook University, 2006.


Binghamton