Information Assurance • Access Control • Data Security and Privacy
Ph.D. Student in Information Security, University of Pittsburgh, Pittsburgh, U.S.
M.S. in Computer Science, Beihang University, Beijing, China
B.E. in Software Engineering, Northwestern Polytechnical University, Xi’an, China.
Beihang University, previously known as Beijing University of Aeronautics and Astronautics
Runhua Xu, James B.D. Joshi, Prashant Krishnamurthy and David Tipper.“Insider Threat Mitigation in Attribute based Encryption.” In 9th Annual National Cyber Summit (Research Track), Von Braun Center, Huntsville, AL, USA. 2017.
Runhua Xu and James B.D. Joshi.“Enabling Attribute Based Encryption as an Internet Service.” In 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, Pittsburgh, USA. pp. 417-426.IEEE, 2016.
Runhua Xu and James B.D. Joshi.“An Integrated Privacy Preserving Attribute Based Access Control Framework.”In 2016 IEEE 9th International Conference on Cloud Computing (Research Track), San Francisco, USA. pp. 68-76. IEEE, 2016
Runhua Xu, Yang Wang, and Bo Lang.“A Tree-Based CP-ABE Scheme with Hidden Policy Supporting Secure Data Sharing in Cloud Computing.” In Advanced Cloud and Big Data (CBD), 2013 International Conference on, Nanjing, China. pp. 51-57. IEEE, 2013.
Bo Lang, Runhua Xu, and Yawei Duan.“Extending the ciphertext-policy attribute based encryption scheme for supporting flexible access control.” In Security and Cryptography (SECRYPT), 2013 International Conference on, Reykjavik, Iceland. pp. 1-11. IEEE, 2013.
Runhua Xu and Bo Lang.“Survey on security model of authenticated key exchange protocols.” The 9th Graduate Students Academic Forum of Beihang University. pp. 434-442. 2012. (in Chinese)
Runhua Xu, and Bo Lang.“A CP-ABE scheme with hidden policy and its application in cloud computing.”International Journal of Cloud Computing, Advanced Cloud and Big Data. vol. 4, no. 4, pp. 279-298. 2015.
Bo Lang, Runhua Xu, and Yawei Duan. “Self-contained Data Protection Scheme Based on CP-ABE.”EBusiness and Telecommunications, Communications in Computer and Information Science. pp. 306-321. 2014
Service & Activities
IEEE Transactions on Information Forensics and Security(TIFS); IEEE Transactions on Services Computing (TSC);
Conference Review/External Review
IEEE International Conference on Big Data (BigData 2016); IEEE International Conference on Collaboration and Internet Computing (CIC 2016); IEEE International Conference on Services Computing (SCC 2017); ACM Conference on Data and Application Security and Privacy (CODASPY 2016, 2017); ACM Symposium on Access Control Models and Technologies (SACMAT 2017); ACM International Conference on Information and Knowledge Management (CIKM 2017);