default search action
Philip W. L. Fong
Person information
- affiliation: University of Calgary, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c42]Si Zhang, Philip W. L. Fong:
Mining Domain-Based Policies. CODASPY 2024: 403-414 - [c41]Md Mushfekur Rahman, Philip W. L. Fong:
Social Control and Interactivity in Anonymous Public Events. ESORICS (2) 2024: 104-122 - [i7]Si Zhang, Philip W. L. Fong:
Quantifying Policy Administration Cost in an Active Learning Framework. CoRR abs/2401.00086 (2024) - 2023
- [i6]Si Zhang, Philip W. L. Fong:
Mining Domain-Based Policies. CoRR abs/2312.15596 (2023) - 2022
- [c40]Adrian Shuai Li, Reihaneh Safavi-Naini, Philip W. L. Fong:
A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences. SACMAT 2022: 195-206 - [c39]Chahal Arora, Syed Zain R. Rizvi, Philip W. L. Fong:
Higher-Order Relationship-Based Access Control: A Temporal Instantiation with IoT Applications. SACMAT 2022: 223-234 - [i5]Adrian Shuai Li, Reihaneh Safavi-Naini, Philip W. L. Fong:
A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences. CoRR abs/2211.04980 (2022) - 2020
- [j10]Syed Zain R. Rizvi, Philip W. L. Fong:
Efficient Authorization of Graph-database Queries in an Attribute-supporting ReBAC Model. ACM Trans. Priv. Secur. 23(4): 18:1-18:33 (2020)
2010 – 2019
- 2019
- [c38]Philip W. L. Fong:
Results in Workflow Resiliency: Complexity, New Formulation, and ASP Encoding. CODASPY 2019: 185-196 - [c37]Henrique G. G. Pereira, Philip W. L. Fong:
SEPD: An Access Control Model for Resource Sharing in an IoT Environment. ESORICS (2) 2019: 195-216 - [c36]Juan Carlos Fuentes Carranza, Philip W. L. Fong:
Brokering Policies and Execution Monitors for IoT Middleware. SACMAT 2019: 49-60 - 2018
- [c35]Syed Zain R. Rizvi, Philip W. L. Fong:
Efficient Authorization of Graph Database Queries in an Attribute-Supporting ReBAC Model. CODASPY 2018: 204-211 - [c34]Lakshya Tandon, Philip W. L. Fong, Reihaneh Safavi-Naini:
HCAP: A History-Based Capability System for IoT Devices. SACMAT 2018: 247-258 - [c33]Tam Thanh Doan, Reihaneh Safavi-Naini, Shuai Li, Sepideh Avizheh, Muni Venkateswarlu K., Philip W. L. Fong:
Towards a Resilient Smart Home. IoT S&P@SIGCOMM 2018: 15-21 - [i4]Lakshya Tandon, Philip W. L. Fong, Reihaneh Safavi-Naini:
HCAP: A History-Based Capability System for IoT Devices. CoRR abs/1804.00086 (2018) - [i3]Philip W. L. Fong:
Results in Workflow Resiliency: Complexity, New Formulation, and ASP Encoding. CoRR abs/1809.10106 (2018) - [i2]Juan Carlos Fuentes Carranza, Philip W. L. Fong:
Brokering Policies and Execution Monitors for IoT Middleware. CoRR abs/1809.10134 (2018) - 2017
- [c32]Seyed Hossein Ahmadinejad, Philip W. L. Fong:
An Enforcement Model for Preventing Inference Attacks in Social Computing Platforms. SACMAT 2017: 55-66 - 2016
- [j9]Ebrahim Tarameshloo, M. Hosseinkhani Loorak, Philip W. L. Fong, Sheelagh Carpendale:
Using Visualization to Explore Original and Anonymized LBSN Data. Comput. Graph. Forum 35(3): 291-300 (2016) - [c31]Seyed Hossein Ahmadinejad, Philip W. L. Fong, Reihaneh Safavi-Naini:
Privacy and Utility of Inference Control Mechanisms for Social Computing Applications. AsiaCCS 2016: 829-840 - [c30]Syed Zain R. Rizvi, Philip W. L. Fong:
Interoperability of Relationship- and Role-Based Access Control. CODASPY 2016: 231-242 - [c29]Pooya Mehregan, Philip W. L. Fong:
Policy Negotiation for Co-owned Resources in Relationship-Based Access Control. SACMAT 2016: 125-136 - 2015
- [c28]Syed Zain R. Rizvi, Philip W. L. Fong, Jason Crampton, James Sellwood:
Relationship-Based Access Control for an Open-Source Medical Records System. SACMAT 2015: 113-124 - [e2]Frédéric Cuppens, Joaquín García-Alfaro, Nur Zincir-Heywood, Philip W. L. Fong:
Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8930, Springer 2015, ISBN 978-3-319-17039-8 [contents] - [i1]Syed Zain R. Rizvi, Philip W. L. Fong, Jason Crampton, James Sellwood:
Relationship-Based Access Control for OpenMRS. CoRR abs/1503.06154 (2015) - 2014
- [j8]M. Hosseinkhani Loorak, Philip W. L. Fong, Sheelagh Carpendale:
Papilio: Visualizing Android Application Permissions. Comput. Graph. Forum 33(3): 391-400 (2014) - [j7]Seyed Hossein Ahmadinejad, Philip W. L. Fong:
Unintended disclosure of information: Inference attacks by third-party extensions to Social Network Systems. Comput. Secur. 44: 75-91 (2014) - [j6]Mohammad Jafari, Reihaneh Safavi-Naini, Philip W. L. Fong, Ken Barker:
A Framework for Expressing and Enforcing Purpose-Based Privacy Policies. ACM Trans. Inf. Syst. Secur. 17(1): 3:1-3:31 (2014) - [c27]Ebrahim Tarameshloo, Philip W. L. Fong, Payman Mohassel:
On protection in federated social computing systems. CODASPY 2014: 75-86 - [c26]Pooya Mehregan, Philip W. L. Fong:
Design Patterns for Multiple Stakeholders in Social Computing. DBSec 2014: 163-178 - [c25]Ebrahim Tarameshloo, Philip W. L. Fong:
Access control models for geo-social computing systems. SACMAT 2014: 115-126 - 2013
- [c24]Seyed Hossein Ahmadinejad, Philip W. L. Fong:
On the feasibility of inference attacks by third-party extensions to social network systems. AsiaCCS 2013: 161-166 - [c23]Philip W. L. Fong, Pooya Mehregan, Ram Krishnan:
Relational abstraction in community-based secure collaboration. CCS 2013: 585-598 - [c22]Jayalakshmi Balasubramaniam, Philip W. L. Fong:
A white-box policy analysis and its efficient implementation. SACMAT 2013: 149-160 - 2012
- [c21]Cheng Xu, Philip W. L. Fong:
The specification and compilation of obligation policies for program monitoring. AsiaCCS 2012: 77-78 - [c20]Glenn Bruns, Philip W. L. Fong, Ida Sri Rejeki Siahaan, Michael Huth:
Relationship-based access control: its expression and enforcement through hybrid logic. CODASPY 2012: 117-124 - [c19]Arif Akram Khan, Philip W. L. Fong:
Satisfiability and Feasibility in a Relationship-Based Workflow Authorization Model. ESORICS 2012: 109-126 - [c18]Mohd M. Anwar, Philip W. L. Fong:
A visualization tool for evaluating access control policies in facebook-style social network systems. SAC 2012: 1443-1450 - 2011
- [c17]Philip W. L. Fong:
Relationship-based access control: protection model and policy language. CODASPY 2011: 191-202 - [c16]Mohammad Jafari, Philip W. L. Fong, Reihaneh Safavi-Naini, Ken Barker, Nicholas Paul Sheppard:
Towards defining semantic foundations for purpose-based privacy policies. CODASPY 2011: 213-224 - [c15]Seyed Hossein Ahmadinejad, Mohd M. Anwar, Philip W. L. Fong:
Inference attacks by third-party extensions to social network systems. PerCom Workshops 2011: 282-287 - [c14]Philip W. L. Fong, Ida Sri Rejeki Siahaan:
Relationship-based access control policies and their policy languages. SACMAT 2011: 51-60 - [c13]Philip W. L. Fong:
Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems. IEEE Symposium on Security and Privacy 2011: 263-278 - 2010
- [j5]Philip W. L. Fong, Simon A. Orr:
Isolating untrusted software extensions by custom scoping rules. Comput. Lang. Syst. Struct. 36(3): 268-287 (2010) - [e1]Rainer Böhme, Philip W. L. Fong, Reihaneh Safavi-Naini:
Information Hiding - 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6387, Springer 2010, ISBN 978-3-642-16434-7 [contents]
2000 – 2009
- 2009
- [j4]Philip W. L. Fong:
Reading a computer science research paper. ACM SIGCSE Bull. 41(2): 138-140 (2009) - [c12]Fei Yan, Philip W. L. Fong:
Efficient IRM enforcement of history-based access control policies. AsiaCCS 2009: 35-46 - [c11]Mohd M. Anwar, Philip W. L. Fong, Xue-Dong Yang, Howard J. Hamilton:
Visualizing Privacy Implications of Access Control Policies in Social Network Systems. DPM/SETOP 2009: 106-120 - [c10]Philip W. L. Fong, Mohd M. Anwar, Zhen Zhao:
A Privacy Preservation Model for Facebook-Style Social Network Systems. ESORICS 2009: 303-320 - 2008
- [j3]Philip W. L. Fong:
Discretionary capability confinement. Int. J. Inf. Sec. 7(2): 137-154 (2008) - 2007
- [j2]Philip W. L. Fong:
Reasoning about safety properties in a JVM-like environment. Sci. Comput. Program. 67(2-3): 278-300 (2007) - 2006
- [c9]Philip W. L. Fong, Simon A. Orr:
A Module System for Isolating Untrusted Software Extensions. ACSAC 2006: 203-212 - [c8]Philip W. L. Fong:
Discretionary Capability Confinement. ESORICS 2006: 127-144 - 2005
- [c7]Philip W. L. Fong:
Link-Time Enforcement of Confined Types for JVM Bytecode. PST 2005 - 2004
- [c6]Philip W. L. Fong:
Pluggable verification modules: an extensible protection mechanism for the JVM. OOPSLA 2004: 404-418 - [c5]Philip W. L. Fong:
Access Control By Tracking Shallow Execution History. S&P 2004: 43-55 - 2001
- [c4]Philip W. L. Fong, Robert D. Cameron:
Proof Linking: Distributed Verification of Java Classfiles in the Presence of Multiple Classloaders. Java Virtual Machine Research and Technology Symposium 2001: 53-66 - 2000
- [j1]Philip W. L. Fong, Robert D. Cameron:
Proof linking: modular verification of mobile programs in the presence of lazy, dynamic linking. ACM Trans. Softw. Eng. Methodol. 9(4): 379-409 (2000)
1990 – 1999
- 1998
- [c3]Premkumar T. Devanbu, Philip W. L. Fong, Stuart G. Stubblebine:
Techniques for Trusted Software Engineering. ICSE 1998: 126-135 - [c2]Philip W. L. Fong, Robert D. Cameron:
Proof Linking: An Architecture for Modular Verification of Dynamically-Linked Mobile Code. SIGSOFT FSE 1998: 222-230 - 1995
- [c1]Philip W. L. Fong:
A Quantitative Study of Hypothesis Selection. ICML 1995: 226-234
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint