Vincent C. Hu

2.7k total citations · 1 hit paper
32 papers, 757 citations indexed

About

Vincent C. Hu is a scholar working on Sociology and Political Science, Artificial Intelligence and Information Systems. According to data from OpenAlex, Vincent C. Hu has authored 32 papers receiving a total of 757 indexed citations (citations by other indexed papers that have themselves been cited), including 29 papers in Sociology and Political Science, 26 papers in Artificial Intelligence and 7 papers in Information Systems. Recurrent topics in Vincent C. Hu's work include Access Control and Trust (29 papers), Security and Verification in Computing (23 papers) and Cryptography and Data Security (9 papers). Vincent C. Hu is often cited by papers focused on Access Control and Trust (29 papers), Security and Verification in Computing (23 papers) and Cryptography and Data Security (9 papers). Vincent C. Hu collaborates with scholars based in United States, Egypt and Greece. Vincent C. Hu's co-authors include D. Richard Kuhn, David F. Ferraiolo, Jeffrey Voas, Tao Xie, JeeHyun Hwang, David Ferraiolo, Rick Kuhn, Ramaswamy Chandramouli, Evan Martin and Antonios Gouglidis and has published in prestigious journals such as Building and Environment, Computer and International Journal of Information Security.

In The Last Decade

Vincent C. Hu

31 papers receiving 706 citations

Hit Papers

Attribute-Based Access Control 2015 2026 2018 2022 2015 100 200 300

Peers

Vincent C. Hu
Vincent C. Hu
Citations per year, relative to Vincent C. Hu Vincent C. Hu (= 1×) peers Pietro Colombo

Countries citing papers authored by Vincent C. Hu

Since Specialization
Citations

This map shows the geographic impact of Vincent C. Hu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Vincent C. Hu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Vincent C. Hu more than expected).

Fields of papers citing papers by Vincent C. Hu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Vincent C. Hu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Vincent C. Hu. The network helps show where Vincent C. Hu may publish in the future.

Co-authorship network of co-authors of Vincent C. Hu

This figure shows the co-authorship network connecting the top 25 collaborators of Vincent C. Hu. A scholar is included among the top collaborators of Vincent C. Hu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Vincent C. Hu. Vincent C. Hu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Hu, Vincent C., D. Richard Kuhn, & David F. Ferraiolo. (2018). Access Control for Emerging Distributed Systems. Computer. 51(10). 100–103. 13 indexed citations
2.
Li, Qinghua, et al.. (2016). Differentiating Non-Isomorphic Graphlets for Graph Analytics. 349–356.
3.
Kuhn, D. Richard, Vincent C. Hu, David F. Ferraiolo, Raghu N. Kacker, & Yu Lei. (2016). Pseudo-Exhaustive Testing of Attribute Based Access Control Rules. 51–58. 9 indexed citations
4.
Li, Ang, et al.. (2015). Evaluating the capability and performance of access control policy verification tools. 200502. 366–371. 9 indexed citations
5.
Hu, Vincent C., David F. Ferraiolo, D. Richard Kuhn, Raghu N. Kacker, & Yu Lei. (2015). Implementing and Managing Policy Rules in Attribute Based Access Control. 518–525. 7 indexed citations
6.
Hu, Vincent C., Tim Grance, David Ferraiolo, & D. Kühn. (2014). An Access Control Scheme for Big Data Processing. 26 indexed citations
7.
Hu, Vincent C.. (2014). Attribute Based Access Control (ABAC) Definition and Considerations. 2 indexed citations
8.
Hu, Vincent C. & Karen Scarfone. (2013). Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit. 10. 494–501. 4 indexed citations
9.
Gouglidis, Antonios, Ioannis Mavridis, & Vincent C. Hu. (2013). Security policy verification for multi-domains in cloud systems. International Journal of Information Security. 13(2). 97–111. 26 indexed citations
10.
Hwang, JeeHyun, et al.. (2010). ACPT: A Tool for Modeling and Verifying Access Control Policies. 40–43. 24 indexed citations
11.
Shiue, Angus, et al.. (2010). Validation and application of adsorption breakthrough models for the chemical filters used in the make-up air unit (MAU) of a cleanroom. Building and Environment. 46(2). 468–477. 36 indexed citations
12.
Hwang, JeeHyun, Tao Xie, & Vincent C. Hu. (2009). Detection of Multiple-Duty-Related Security Leakage in Access Control Policies. 65–74. 4 indexed citations
13.
Hu, Vincent C., et al.. (2008). Access Control Policy Composition for Resource Federation Networks Using Semantic Web and Resource Description Framework (RDF). 497–502. 1 indexed citations
14.
Hu, Vincent C., D. Richard Kuhn, & Tao Xie. (2008). Property verification for access control models via model checking. NCSU Libraries Repository (North Carolina State University Libraries). 1 indexed citations
15.
Martin, Evan, JeeHyun Hwang, Tao Xie, & Vincent C. Hu. (2008). Assessing Quality of Policy Properties in Verification of Access Control Policies. 163–172. 16 indexed citations
16.
Hu, Vincent C., David F. Ferraiolo, & Karen Scarfone. (2007). Access Control Policy Combinations for the Grid Using the Policy Machine. 9 indexed citations
17.
Hu, Vincent C., D. Richard Kuhn, & David F. Ferraiolo. (2006). The computational complexity of enforceability validation for generic access control rules. 1. 260–267. 10 indexed citations
18.
Hu, Vincent C., D. Richard Kuhn, & David F. Ferraiolo. (2006). The Computational Complexity of Enforceability Validation for Generic Access Control Rules. 1. 260–267. 7 indexed citations
19.
Ferraiolo, David F., Serban I. Gavrila, Vincent C. Hu, & D. Richard Kuhn. (2005). Composing and combining policies under the policy machine. 11–20. 16 indexed citations
20.
Kuhn, D. Richard, et al.. (2001). SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure. 24 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026