Publication

Journal Publications

  1. Hui Shen, Ram Krishnan, Rocky Slavin, and Jianwei Niu. "Sequence Diagrams Aided Privacy Policy Specification". IEEE Transactions on Dependable and Secure Computing vol.13, no.3, pages 381--393, May 2016
  2. Jianwei Niu, Mark Reith, and William H. Winsborough. "Formal Verification of Security Properties in Trust Management Policy". Journal of Computer Security vol.22, no.1, pages 69--153, January 2014.
  3. Ram Krishnan, Jianwei Niu, Ravi Sandhu, and William H. Winsborough. "Group-Centric Secure Information Sharing Models for Isolated Groups", ACM Transactions on Information and System security, vol.14, no.3, pages 23:1--23:29, November 2011. (pdf)
  4. Shahram Esmaeilsabzali, Nancy A. Day, Joanne M. Atlee, and Jianwei Niu. "Deconstructing the Semantics of Big-Step Modeling Languages", Requirements Engineering Journal 15(2) , pages 235--265, April 2010. (pdf)
  5. Jianwei Niu, Joanne M. Atlee, and Nancy A. Day. "Template Semantics for Model-Based Notations", IEEE Transactions on Software Engineering, vol. 29, no.10, pages 866--882, October 2003. (pdf)

Ph.D. Dissertation

Jianwei Niu. "Template Semantics: A Parameterized Approach to Semantics-Based Model Compilation", PhD thesis, University of Waterloo, May 2005. (pdf)

Book Chapter

Mark Robinson, Hui Shen, and Jianwei Niu. "High Assurance BPEL Process Models", Book Chapter in High Assurance Services Computing, pages 219--240 (Chapter 11), Springer, 2009. (pdf)

Refereed Conference and Workshop Publications

  1. Rocky Slavin, Xiaoyin Wang, Mitra Bokaer Hosserni, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis Breaux, and Jianwei Niu. "Toward a Framework for Detecting Privacy Policy Violation in Android Application Code". 38th ACM/IEEE International Conference on Software Engineering (ICSE) pages: 25--36, May 2016.
  2. Jonathan Shahen, Jianwei Niu, and Mahesh Tripunitara. "Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies", 20th ACM Symposium on Access Control Models and Technologies (SACMAT), pages 15--26, June 2015. Best Paper Award Runner-Up.
  3. Rocky Slavin, Jean-Michel Lekher, Jianwei Niu, and Travis Breaux. "Managing Security Requirements Patterns using Feature Diagram Hierarchies". 22nd IEEE International Requirements Engineering Conference (RE), pages 193-202, August 2014.
  4. Omar Chowdhury, Andreas Gampe, Jianwei Niu, Jeffery von Ronne, Jared Bennatttt, Anupam Datta, and Limin Jia. " Privacy Promises That Can Be Kept: A Policy Analysis Method with Application to the HIPAA Privacy Rule", Proceedings of the 18th ACM SIGSAC Symposium on Access Control Models and Technologies (SACMAT), pages 3--14, June 2013. (pdf)
  5. Kevin Baldor and Jianwei Niu. "Monitoring Dense-Time, Continuous-Semantics, Metric Temporal Logic", Lecture Notes in Computer Science Vol. 7687, Proceedings of the 3rd International Conference on Runtime Verification (RV), pages 245--259, September 2012, Turkey.
  6. Rocky Slavin, Hui Shen, and Jianwei Niu. "Characterizations and Boundaries of Security Requirements Patterns", Second International Workshop on Requirements Patterns (RePa), 6 pages, September 2012, Chicago.
  7. Omar Chowdhury, Haining Chen, Jianwei Niu, Ninghui Li, and Elisa Bertino. "On XACML's Adequacy to Specify and to Enforce HIPAA", Proceedings of the 3rd USENIX Workshop on Health Security and Privacy (HealthSec), 10 pages, August 2012, Seattle. (pdf)
  8. Hui Shen, Mark Robinson, and Jianwei Niu. "Formal Analysis of Sequence Diagram with Combined Fragments", Proceedings of the 7th International Conference on Software Paradigm Trends (ICSOFT), pages 44--54, July 2012, Italy. (pdf)
  9. Omar Chowdhury, Murillo Pontual, William H. Winsborough, Ting Yu, Keith Irwin, and Jianwei Niu. "Ensuring Authorization Privileges for Cascading User Obligations", Proceedings of the 17th ACM SIGSAC Symposium on Access Control Models and Technologies (SACMAT), pages 33--44, June 2012. (Best Paper Award) (pdf)
  10. Wanying Zhao, Jianwei Niu, and William H. Winsborough. "Refinement-Based Design of a Group-Centric Secure Information Sharing Model", Proceedings of the 2nd ACM SIGSAC Conference on Data and Application Security and Privacy (CODASPY), pages 149--156, February 2012. (pdf)
  11. Mark Robinson, Jianwei Niu, and Macneil Shonle. "GitBAC: Flexible Access Control for Non-Modular Concerns", Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE), pages 500-503, November 2011. (pdf)
  12. Qing Yi, Jianwei Niu, and Anitha R. Marneri. "Collective Specification and Verification of Behavior Models and Object-Oriented Implementations", Proceedinds of the 6th International Conference on Software and Data Engineering (ICSOFT), pages 15-24, July 2011. (pdf)
  13. Ravi Sandhu, Ram Krishnan, Jianwei Niu, and William H. Winsborough. "Group-Centric Models for Secure and Agile Information Sharing", Proceedings of the 5th IEEE International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS), Lecture Notes in Computer Science, series 6258, pages 55-69, September 2010. (pdf)
  14. Ram Krishnan, Ravi Sandhu, Jianwei Niu, and William H. Winsborough. "Towards a Framework for Group-Based Secure Collaboration", Proceedings of the 5th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), November 20009. (pdf)
  15. Shahram Esmaeilsabzali, Nancy A. Day, Joanne M. Atlee, and Jianwei Niu. "Semantic Criteria for Choosing a Language for Big-Step Models", Proceedings of the 17th IEEE International Requirements Engineering Conference (RE), September 2009. (pdf)
  16. Ram Krishnan, Ravi Sandhu, Jianwei Niu, and William H. Winsborough. "Foundations for Group-Centric Secure Information Sharing Models", Proceedings of the 14th ACM SIGSAC Symposium on Access Control Models and Technologies (SACMAT), pages 115-124, June 2009. (pdf)
  17. Mark Reith, Jianwei Niu, and William H. Winsborough. "Towards Practical Analysis for Trust Management Policy", Proceedings of the 4th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS), pages, 310-321, March 2009. (pdf)
  18. Ram Krishnan, Ravi Sandhu, Jianwei Niu, and William H. Winsborough. "A Conceptual Framework for Group-Centric Secure Information Sharing", Proceedings of the 4th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS) , pages 384-387, March 2009. (pdf)
  19. Hui Shen, Aliya Virani, and Jianwei Niu. "Formalizing UML2 Sequence Diagrams", Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium (HASE), pages 437-440, December 2008. (pdf)
  20. Ram Krishnan, Jianwei Niu, Ravi Sandhu, and William H. Winsborough. "Stale-Safe Security Properties for Group-Based Secure Information Sharing", Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering (FMSE) co-located with the ACM Conference on Computer and Communications Security (CCS), pages 53-62, October 2008. (pdf)
  21. T. Finin, A. Joshi, L. Kagal, Jianwei Niu, R. Sandhu, W. Winsborough, and B. Thuraisingham. "ROWLBAC - Representing Role Based Access Control in OWL", Proceedings of the 13th ACM symposium on Access Control Models and Technologies (SACMAT), pages 73-82, June 2008. (pdf)
  22. Mark Reith, Jianwei Niu, and William H. Winsborough. "Role-Based Trust Management Security Policy Analysis and Correction Environment (RT-SPACE)", Proceedings of the 30th ACM/IEEE International Conference on Software Engineering (ICSE) Research Demonstration, pages 929-930, May 2008. (pdf)
  23. Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi Sandhu, William H. Winsborough, and Bhavani Thuraisingham. "Role Based Access Control and OWL", Proceedings of the fourth International Workshop in The OWL: Experiences and Directions (OWLED), 12 pages, April 2008. (pdf)
  24. Mark Reith, Jianwei Niu, and William H. Winsborough. "Engineering Trust Management into Software Models", Proceedings of ICSE Workshop on Modeling in Software Engineering (MISE07), 6 pages, May 2007. (pdf)
  25. Mark Reith, Jianwei Niu, William H. Winsborough. "Apply Model Checking to Security Analysis in Trust Management", Proceedings of the ICDE Workshop SECOBAP, 10 pages, April 2007. (pdf)
  26. Yun Lu, Joanne M. Atlee, Nancy A. Day, and Jianwei Niu. "Mapping Template Semantics to SMV", Proceedings of the 19th IEEE International Conference on Automated Software Engineering (ASE), pages 320-325, September 2004. (pdf)
  27. Jianwei Niu, Joanne M. Atlee, and Nancy A. Day. "Comparing and Understanding Model-Based Specification Notations", Proceedings of the 11th IEEE International Requirements Engineering Conference(RE), pages 188-199, September 2003. (pdf)
  28. Jianwei Niu. "A Semantics-Based Approach for Mapping Specification Notations to Analysis Tools" (abstract), Proceedings of the IEEE International Conference on Software Engineering (ICSE) Doctoral Symposium , page 762, May 2003. (pdf)
  29. Jianwei Niu, Joanne M. Atlee, and Nancy A. Day. "Composable Semantics for Model-Based Notations", Proceedings of the 10th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE), pages 149-158, November 2002. (pdf)