This is a personal website of Runhua Xu (许,润华)
My advisor is Dr. James B.D. Joshi
... more about me
Runhua Xu, Balaji Palanisamy and James B.D. Joshi. “QueryGuard: Privacy-preserving Latency-aware Query Optimization for Edge Computing.” In 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom-18), New York, USA. 2018.
[ pdf ] [ slides ]
Runhua Xu, James B.D. Joshi, Prashant Krishnamurthy and David Tipper. “Insider Threat Mitigation in Attribute based Encryption.” In 9th Annual National Cyber Summit (Research Track), Von Braun Center, Huntsville, AL, USA. 2017.
Runhua Xu and James B.D. Joshi. “Enabling Attribute Based Encryption as an Internet Service.” In 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, Pittsburgh, USA. pp. 417-426.IEEE, 2016.
Runhua Xu and James B.D. Joshi. “An Integrated Privacy Preserving Attribute Based Access Control Framework.” In 2016 IEEE 9th International Conference on Cloud Computing (IEEE CLOUD 2016) (Research Track), San Francisco, USA. pp. 68-76. IEEE, 2016
Runhua Xu, Yang Wang, and Bo Lang. “A Tree-Based CP-ABE Scheme with Hidden Policy Supporting Secure Data Sharing in Cloud Computing.” In Advanced Cloud and Big Data (CBD), 2013 International Conference on, Nanjing, China. pp. 51-57. IEEE, 2013.
Bo Lang, Runhua Xu, and Yawei Duan. “Extending the ciphertext-policy attribute based encryption scheme for supporting flexible access control.” In Security and Cryptography (SECRYPT), 2013 International Conference on, Reykjavik, Iceland. pp. 1-11. IEEE, 2013.
Runhua Xu, James B.D. Joshi and Prashant Krishnamurthy “An Integrated Privacy Preserving Attribute Based Access Control Framework Supporting Secure Deduplication.” (under peer review).
[ pdf ]
Runhua Xu, and Bo Lang. “A CP-ABE scheme with hidden policy and its application in cloud computing.” International Journal of Cloud Computing, Advanced Cloud and Big Data. vol. 4, no. 4, pp. 279-298. 2015.
[ pdf ]
Bo Lang, Runhua Xu, and Yawei Duan. “Self-contained Data Protection Scheme Based on CP-ABE.” EBusiness and Telecommunications, Communications in Computer and Information Science. pp. 306-321. 2014
[ pdf ]