ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading
- Sokol Kosta, Andrius Aucinas, P. Hui, R. Mortier, Xinwen Zhang
- Computer ScienceProceedings IEEE INFOCOM
- 25 March 2012
This paper proposes ThinkAir, a framework that makes it simple for developers to migrate their smartphone applications to the cloud and enhances the power of mobile cloud computing by parallelizing method execution using multiple virtual machine (VM) images.
Apex: extending Android permission model and enforcement with user-defined runtime constraints
- M. Nauman, Sohail Khan, Xinwen Zhang
- Computer ScienceACM Asia Conference on Computer and…
- 13 April 2010
A policy enforcement framework for Android that allows a user to selectively grant permissions to applications as well as impose constraints on the usage of resources and an extended package installer that allows the user to set these constraints through an easy-to-use interface is presented.
Taming Information-Stealing Smartphone Applications (on Android)
- Yajin Zhou, Xinwen Zhang, Xuxian Jiang, V. Freeh
- Computer ScienceTrust and Trustworthy Computing
- 22 June 2011
A system called TISSA is developed that implements a new privacy mode in smartphones that can empower users to flexibly control in a fine-grained manner what kinds of personal information will be accessible to an application.
PBDM: a flexible delegation model in RBAC
- Xinwen Zhang, Sejong Oh, R. Sandhu
- Computer ScienceACM Symposium on Access Control Models and…
- 2 June 2003
This paper proposes a flexible delegation model named Permission-based Delegation Model (PBDM), which is built on the well known RBAC96 model, and supports both role and permission level delegation, which provides great flexibility in authority management.
Formal model and policy specification of usage control
- Xinwen Zhang, F. Parisi-Presicce, R. Sandhu, Jaehong Park
- Computer ScienceTSEC
- 1 November 2005
A formal model and logical specification of UCON with an extension of Lamport's temporal logic of actions (TLA) is developed and shown the flexibility and expressive capability of this formal model by specifying the core models of U CON and some applications.
Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing
- Xinwen Zhang, A. Kunjithapatham, Sangoh Jeong, S. Gibbs
- Computer ScienceMob. Networks Appl.
- 1 June 2011
A new elastic application model that enables seamless and transparent use of cloud resources to augment the capability of resource-constrained mobile devices is proposed and promising results of the proposed application model are demonstrated.
Securing elastic applications on mobile devices for cloud computing
- Xinwen Zhang, Joshua Schiffman, S. Gibbs, A. Kunjithapatham, Sangoh Jeong
- Computer ScienceCloud Computing Security Workshop
- 13 November 2009
This paper aims to build elastic applications which augment resource-constrained platforms, such as mobile phones, with elastic computing resources from clouds, and proposes a solution for authentication and secure session management between weblets running device side and those on the cloud.
MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication
- Dijiang Huang, Xinwen Zhang, Myong H. Kang, Jim Luo
- Computer ScienceFifth IEEE International Symposium on Service…
- 4 June 2010
The proposed MobiCloud framework enhances the operation of the ad hoc network itself by treating mobile devices as service nodes and will enhance communication by addressing trust management, secure routing, and risk management issues in the network.
Toward a Usage-Based Security Framework for Collaborative Computing Systems
- Xinwen Zhang, Masayuki Nakae, M. Covington, R. Sandhu
- Computer ScienceTSEC
- 1 February 2008
This article proposes a usage control (UCON) based security framework for collaborative applications, by following a layered approach with policy, enforcement, and implementation models, called the PEI framework.
CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud
- Lei Xu, Xiaoxin Wu, Xinwen Zhang
- Computer ScienceACM Asia Conference on Computer and…
- 2 May 2012
This work proposes CL-PRE, a certificateless proxy re-encryption scheme for secure data sharing with public cloud, which leverages maximal cloud resources to reduce the computing and communication cost for data owner and proposes multi-proxy and randomized CL- PRE, which enhance the security and robustness of CL- Pre.
...
...