Lili Sun

Lili Sun
University of Southern Queensland 

About

29
Publications
1,435
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
491
Citations
Citations since 2016
0 Research Items
344 Citations
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120
2016201720182019202020212022020406080100120

Publications

Publications (29)
Article
This paper proposes a purpose-based access control model in distributed computing environment for privacy preserving policies and mechanisms, and describes algorithms for policy conflicting problems. The mechanism enforces access policy to data containing personally identifiable information. The key component is purpose involved access control mode...
Article
Data outsourcing is a major component for cloud computing because data owners are able to distribute resources to external services for sharing with users and organizations. A crucial problem for owners is how to secure sensitive information accessed by legitimate users only using the trusted services. We address the problem with access control met...
Conference Paper
Outlier detection is an important long-standing research problem in data mining and has enjoyed applications in a wide range of applications in business, engineering, biology and security, etc. However, the traditional outlier detection methods inevitably need to use different parameters for detection such as those used to specify the distance or d...
Article
With the growing importance of privacy in data access, much research has been done on the privacy protecting technology in the recent years. Developing an access control model and related mechanisms to support a selective access data has become important. The extensible markup language (XML) is rapidly emerging as the new standard language for semi...
Article
With the increased development of cloud computing, access control policies have become an important issue in the security filed of cloud computing. Semantic web is the extension of current Web which aims at automation, integration and reuse of data among different web applications such as clouding computing. However, Semantic web applications pose...
Article
E-learning defined as learning activities performed over electronic devices is rapidly increasing and has become one of the key e-commerce applications with a growing commercial market in the near future. Access control and authorization in E-learning workflow is a vital problem with low costs and no location limits for students. E-learning organiz...
Article
This paper proposes a framework for privacy preserving access control policies and mechanisms, and describes algorithms for access policy conflicting problems. The mechanism enforces access policy to data containing personally identifiable information. The key component of the framework is purpose involved access control models (PAC) that provide f...
Conference Paper
Information privacy becomes a major concern for customers to provide their private data that can promote future business service, especially in E-healthcare services. E-healthcare is the use of web-based systems to share and deliver information across the Internet that is easy to disclose private data provided by customers. The private data has to...
Article
p-Sensitive k-anonymity model has been recently defined as a sophistication of k-anonymity. This new property requires that there be at least p distinct values for each sensitive attribute within the records sharing a set of quasi-identifier attributes. In this paper, we identify the situations when the p-sensitive k-anonymity property is not enoug...
Conference Paper
In mobile wireless systems, the data on air can be accessed by a large number of mobile clients. The organization of data on wireless channels, which aims to reduce the access time of clients, is a key problem in data broadcast systems. Existing algorithms for periodic data broadcasts generally make assumptions that the clients' queries are already...
Conference Paper
With the growing importance of privacy in data access, much research has been done on the privacy protecting technology in recent years. Developing an access control model and related mechanisms to support a selective access data become important. The extensible markup language (XML) is rapidly emerging as the new standard language for semi-structu...
Conference Paper
This paper proposes a trust involved management framework for supporting privacy preserving access control policies and mechanisms. The mechanism enforces access policy to data containing personally identifiable information. The key component of the framework is an access control model that provides full support for expressing highly complex privac...
Conference Paper
Full-text available
This paper proposes a purpose-based framework for supporting privacy preserving access control policies and mechanisms. The mechanism enforces access policy to data containing personally identifiable information. The key component of the framework is purpose involved access control models (PAC) that provide full support for expressing highly comple...
Conference Paper
P-sensitive k-anonymity model has been recently defined as a sophistication of k-anonymity. This new property requires that there be at least p distinct values for each sensitive attribute within the records sharing a combination of key attributes. However, as shown in this paper, it may not protect sensitive information in some way. In this paper,...
Article
XML documents usually contain private information that cannot be shared by every user communities. It is widely used in web environment. XML database is becoming increasingly important since it consists of XML documents. Several applications for supporting selective access to data are available over the web. Usage control has been considered as the...
Article
Permission-role assignments (PRA) is one important process in Role-based access control (RBAC) which has been proven to be a flexible and useful access model for information sharing in distributed collaborative environments. However, problems may arise during the procedures of PRA. Conflicting permissions may assign to one role, and as a result, th...
Conference Paper
This paper focuses on the challenges on the privacy of Radio Frequency Identification (RFID) systems. RFID systems have already widely applied in industry and have been bringing lots of benefits to our daily life, it also creates new security and privacy problems to individuals and organizations. The security and privacy challenges are analysed aft...
Conference Paper
With an increasing amount of semi-structured data XML has become important. XML documents may contain private information that cannot be shared by all user communities. Therefore, securing XML data is becoming important. Several specifications progressed toward providing a comprehensive standards framework for securing XML-based application have be...
Conference Paper
E-Learning organisers prefer to disseminate their message as widely as possible, and in the same time authorised people only can access some disseminative information. It becomes a challenge to protect the digital message from access such as reading and updating which has been disseminated out from the organisations. The paper aims to substantiall...
Article
Summary With an increasing amount of semi-structured data, XML has become significant to humans and programs. XML promoted by the World Wide Web Consortium (W3C) is rapidly emerging as a new standard language for semi-structured data representation and exchange on the Internet. XML documents usually contain private information that cannot be shared...
Article
Summary In recent years an increasing amount of semi-structured data has become important to humans and programs. XML promoted by the World Wide Web Consortium (W3C) is rapidly emerging as the new standard language for semi-structured data representation and exchange on the Internet. XML documents may contain private information that cannot be shar...
Conference Paper
This paper presents M-commerce issues and a framework for M-commerce. The issues include mobile devices, trust and privacy, payment system, management and security and so on. The position and the importance of each topic in M-commerce are discussed extensively. Finally, a new framework for M-commerce is proposed. The framework has three dimensions...
Conference Paper
Full-text available
XML promoted by the World Wide Web Consortium (W3C) is a de facto standard language for document representation and exchange on the Internet. XML documents may contain private information that cannot be shared by all user communities. Several approaches are designed to protect information in a website. However, these approaches typically are used a...
Conference Paper
Full-text available
This paper presents an anonymous access scheme for electronic-services. The scheme based on tickets supports efficient authentications of users, services and service providers over different domains. Tickets are issued by a Credential Centre through a signature protocol and are used to verify correctness of the requested service as well as to direc...