Assistant Professor Shouhuai Xu

Role: Investigator
Affiliation: UTSA
Department: Computer Science
Business: 210-857-0160
Business Address: Department of Computer Science, University of Texas at San Antonio, 6900 North Loop 1604 West, San Antonio, Texas 78249, USA
Before joining University of Texas at San Antonio, I was a research associate working for Prof. Gene Tsudik, Secure Computing and Networking Center (SCONCE), Department of Information and Computer Science, University of California, Irvine.

Before that, I was post-doc of Prof. Ravi Sandhu, Laboratory for Information Security Technology (LIST), Department of Information and Software Engineering, George Mason University.

Before that, I was a graduate student at Department of Computer Science, Fudan University and I obtained my PhD degree in April 2000.

Author of 13 resources

  1. Shouhuai Xu, Ravi Sandhu, Elisa Bertino, "Trustworthiness-centric Assured Information Sharing", InProceedings, The 3rd IFIP International Conference on Trust Management (IFIPTM'09), June 16, 2009.
  2. Shouhuai Xu, Ravi Sandhu, Elisa Bertino, "TIUPAM: A Framework for Trustworthiness-Centric Information Sharing", InProceedings, 3rd IFIP WG 11.11 International Conference on Trust Management, June 15, 2009, 563 downloads.
  3. Shouhuai Xu, Qun ni, Elisa Bertino, Ravi Sandhu, "A Characterization of the Problem of Secure Provenance Management", InProceedings, IEEE International Conference on Intelligence and Security Informatics (ISI-2009), June 11, 2009, 843 downloads.
  4. Justin Leonard, Shouhuai Xu, Ravi Sandhu, "A First Step Towards Characterizing Stealthy Botnets", InProceedings, 4th International Conference on Availability, Reliability and Security (ARES), March 16, 2009, 413 downloads.
  5. Justin Leonard, Shouhuai Xu, Ravi Sandhu, "A Framework for Understanding Botnets", InProceedings, rd International Workshop on Advances in Information Security (WAIS at ARES), March 16, 2009, 443 downloads.
  6. Shouhuai Xu, Moti Yung, "Expecting the Unexpected: Towards Robust Credential Infrastructure", InProceedings, 2009 International Conference on Financial Cryptography and Data Security (FC’09)., February 23, 2009.
  7. Xuhua Ding, Gene Tsudik, Shouhuai Xu, "Leak-free Mediated Group Signatures", Article, Journal of Computer Security, February 02, 2009, 553 downloads.
  8. Shouhuai Xu, Xiaohu Li, Paul Parker, "Exploiting social networks for threshold signing: attack-resilience vs. availability", Article, 3rd ACM Symposium on Information, Computer and Communications Security (ASIACCS’08), pp 325-336, ACM, December 31, 2008.
  9. Aggelos Kiayias, Shouhuai Xu, Moti Yung, "Privacy Preserving Data Mining within Anonymous Credential Systems", InProceedings, International Conference on Security and Cryptography for Networks (SCN’08), LNCS 5229, pp 57-76, November 30, 2008.
  10. Shouhuai Xu, "On the Cryptographic Utilities of Social Networks", Poster, September 11, 2008, 864 downloads.
  11. Shouhuai Xu, "Privacy-preserving Data Mining within Anonymous Credential Systems", Poster, September 11, 2008, 655 downloads.
  12. Daryl Walleck, Yingjiu Li, Shouhuai Xu, "An Empirical Analysis of Certificate Revocation Lists", InProceedings, Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security, September 02, 2008, 783 downloads.
  13. Xiaohu Li, Paul Parker, Shouhuai Xu, "A Stochastic Model for Quantitative Security Analysis of Networked Systems", InProceedings, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), February 02, 2008, 881 downloads.