1. Distributed Computing Security Model Based on Type System;Applications and Techniques in Information Security;2018
2. Android security framework;Proceedings of the 30th Annual Computer Security Applications Conference;2014-12-08
3. Extended Role Based Access Control and Procedural Restrictions;Information Security and Cryptology - ICISC 2003;2004
4. Root Kits;ACM SIGOPS Operating Systems Review;2004-01
5. Applications of Trusted Review to Information Security;Information Security and Privacy;2001