Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mohamed Shehab
@inproceedings{DBLP:conf/hicss/QahtaniJTS24, author = {Elham Al Qahtani and Yousra Javed and Sarah Tabassum and Mohamed Shehab}, editor = {Tung X. Bui}, title = {Replication: What Would Motivate Users to Use Gmail's Confidential Mode?}, booktitle = {57th Hawaii International Conference on System Sciences, {HICSS} 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024}, pages = {7645--7654}, publisher = {ScholarSpace}, year = {2024}, url = {https://hdl.handle.net/10125/107305}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/QahtaniJTS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/QahtaniJTSS23, author = {Elham Al Qahtani and Yousra Javed and Sarah Tabassum and Lipsarani Sahoo and Mohamed Shehab}, title = {Managing Access to Confidential Documents: {A} Case Study of an Email Security Tool}, journal = {Future Internet}, volume = {15}, number = {11}, pages = {356}, year = {2023}, url = {https://doi.org/10.3390/fi15110356}, doi = {10.3390/FI15110356}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/QahtaniJTSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/SahooS23, author = {Lipsarani Sahoo and Mohamed Shehab}, editor = {Constantine Stephanidis and Margherita Antona and Stavroula Ntoa and Gavriel Salvendy}, title = {I Have No Idea What Are These Terms! Exploring Users' Understanding and Interpretation of Genealogy Results}, booktitle = {{HCI} International 2023 Posters - 25th International Conference on Human-Computer Interaction, {HCII} 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings, Part {III}}, series = {Communications in Computer and Information Science}, volume = {1834}, pages = {141--148}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35998-9\_20}, doi = {10.1007/978-3-031-35998-9\_20}, timestamp = {Sun, 12 Nov 2023 02:12:38 +0100}, biburl = {https://dblp.org/rec/conf/hci/SahooS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/HazaziS23, author = {Hussein Hazazi and Mohamed Shehab}, editor = {Patrick Gage Kelley and Apu Kapadia}, title = {Exploring the Usability, Security, and Privacy of Smart Locks from the Perspective of the End User}, booktitle = {Nineteenth Symposium on Usable Privacy and Security, {SOUPS} 2023, Anaheim, CA, USA, August 5-7, 2023}, pages = {559--577}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/soups2023/presentation/hazazi}, timestamp = {Wed, 09 Aug 2023 15:04:34 +0200}, biburl = {https://dblp.org/rec/conf/soups/HazaziS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2023, editor = {Mohamed Shehab and Maribel Fern{\'{a}}ndez and Ninghui Li}, title = {Proceedings of the Thirteenth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577923}, doi = {10.1145/3577923}, timestamp = {Mon, 24 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/QahtaniJS22, author = {Elham Al Qahtani and Yousra Javed and Mohamed Shehab}, title = {User Perceptions of Gmail's Confidential Mode}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {1}, pages = {187--206}, year = {2022}, url = {https://doi.org/10.2478/popets-2022-0010}, doi = {10.2478/POPETS-2022-0010}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/QahtaniJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/QahtaniSJS22, author = {Elham Al Qahtani and Lipsarani Sahoo and Yousra Javed and Mohamed Shehab}, editor = {Sven Dietrich and Omar Chowdhury and Daniel Takabi}, title = {"Why would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA}, booktitle = {{SACMAT} '22: The 27th {ACM} Symposium on Access Control Models and Technologies, New York, NY, USA, June 8 - 10, 2022}, pages = {139--150}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3532105.3535013}, doi = {10.1145/3532105.3535013}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/QahtaniSJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/RaufSQS21, author = {Usman Rauf and Mohamed Shehab and Nafees Qamar and Sheema Sameen}, title = {Formal approach to thwart against insider attacks: {A} bio-inspired auto-resilient policy regulation framework}, journal = {Future Gener. Comput. Syst.}, volume = {117}, pages = {412--425}, year = {2021}, url = {https://doi.org/10.1016/j.future.2020.11.009}, doi = {10.1016/J.FUTURE.2020.11.009}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/RaufSQS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/JavedQS21, author = {Yousra Javed and Elham Al Qahtani and Mohamed Shehab}, title = {Privacy Policy Analysis of Banks and Mobile Money Services in the Middle East}, journal = {Future Internet}, volume = {13}, number = {1}, pages = {10}, year = {2021}, url = {https://doi.org/10.3390/fi13010010}, doi = {10.3390/FI13010010}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/JavedQS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/QahtaniSS21, author = {Elham Al Qahtani and Lipsarani Sahoo and Mohamed Shehab}, editor = {Abbas Moallem}, title = {The Effectiveness of Video Messaging Campaigns to Use 2FA}, booktitle = {{HCI} for Cybersecurity, Privacy and Trust - Third International Conference, {HCI-CPT} 2021, Held as Part of the 23rd {HCI} International Conference, {HCII} 2021, Virtual Event, July 24-29, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12788}, pages = {369--390}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77392-2\_24}, doi = {10.1007/978-3-030-77392-2\_24}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/QahtaniSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interact/MiaziLS21, author = {Md. Nazmus Sakib Miazi and Heather Lipford and Mohamed Shehab}, editor = {Carmelo Ardito and Rosa Lanzilotti and Alessio Malizia and Helen Petrie and Antonio Piccinno and Giuseppe Desolda and Kori Inkpen}, title = {Exploring Perceptions of a Localized Content-Sharing System Using Users-as-Beacons}, booktitle = {Human-Computer Interaction - {INTERACT} 2021 - 18th {IFIP} {TC} 13 International Conference, Bari, Italy, August 30 - September 3, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12933}, pages = {351--372}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85616-8\_21}, doi = {10.1007/978-3-030-85616-8\_21}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/interact/MiaziLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JavedSS20, author = {Yousra Javed and Khondaker Musfakus Salehin and Mohamed Shehab}, title = {A Study of South Asian Websites on Privacy Compliance}, journal = {{IEEE} Access}, volume = {8}, pages = {156067--156083}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3019334}, doi = {10.1109/ACCESS.2020.3019334}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/JavedSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/QahtaniJLS20, author = {Elham Al Qahtani and Yousra Javed and Heather Lipford and Mohamed Shehab}, title = {Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? {A} Case Study of Saudi Arabia and Pakistan}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2020, Genoa, Italy, September 7-11, 2020}, pages = {150--159}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSPW51379.2020.00028}, doi = {10.1109/EUROSPW51379.2020.00028}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/QahtaniJLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/JavedQS20, author = {Yousra Javed and Elham Al Qahtani and Mohamed Shehab}, editor = {Constantine Stephanidis and Aaron Marcus and Elizabeth Rosenzweig and Pei{-}Luen Patrick Rau and Abbas Moallem and Matthias Rauterberg}, title = {The Impact of Advertisements on User Attention During Permission Authorization}, booktitle = {{HCI} International 2020 - Late Breaking Papers: User Experience Design and Case Studies - 22nd {HCI} International Conference, {HCII} 2020, Copenhagen, Denmark, July 19-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12423}, pages = {722--739}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60114-0\_47}, doi = {10.1007/978-3-030-60114-0\_47}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/JavedQS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bionetics/RaufSQS19, author = {Usman Rauf and Mohamed Shehab and Nafees Qamar and Sheema Sameen}, editor = {Adriana B. Compagnoni and William Casey and Yang Cai and Bud Mishra}, title = {Bio-inspired Approach to Thwart Against Insider Threats: An Access Control Policy Regulation Framework}, booktitle = {Bio-inspired Information and Communication Technologies - 11th {EAI} International Conference, {BICT} 2019, Pittsburgh, PA, USA, March 13-14, 2019, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {289}, pages = {39--57}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24202-2\_4}, doi = {10.1007/978-3-030-24202-2\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bionetics/RaufSQS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/Bello-OgunuSM19, author = {Emmanuel Bello{-}Ogunu and Mohamed Shehab and Md. Nazmus Sakib Miazi}, editor = {Vladimir Getov and Jean{-}Luc Gaudiot and Nariyoshi Yamai and Stelvio Cimato and J. Morris Chang and Yuuichi Teranishi and Ji{-}Jiang Yang and Hong Va Leong and Hossain Shahriar and Michiharu Takemoto and Dave Towey and Hiroki Takakura and Atilla El{\c{c}}i and Susumu Takeuchi and Satish Puri}, title = {Privacy Is The Best Policy: {A} Framework for {BLE} Beacon Privacy Management}, booktitle = {43rd {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1}, pages = {823--832}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/COMPSAC.2019.00121}, doi = {10.1109/COMPSAC.2019.00121}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/Bello-OgunuSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-02612, author = {Yousra Javed and Mohamed Shehab}, title = {Visual Analysis of Photo Policy Misconfigurations Using Treemaps}, journal = {CoRR}, volume = {abs/1903.02612}, year = {2019}, url = {http://arxiv.org/abs/1903.02612}, eprinttype = {arXiv}, eprint = {1903.02612}, timestamp = {Sun, 31 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-02612.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-02618, author = {Yousra Javed and Boyd Davis and Mohamed Shehab}, title = {Seniors' Media Preference for Receiving Internet Security Information: {A} Pilot Study}, journal = {CoRR}, volume = {abs/1903.02618}, year = {2019}, url = {http://arxiv.org/abs/1903.02618}, eprinttype = {arXiv}, eprint = {1903.02618}, timestamp = {Sun, 31 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-02618.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mum/JarrahS18, author = {Abeer Al Jarrah and Mohamed Shehab}, editor = {Slim Abdennadher and Florian Alt}, title = {CordovaConfig: {A} Tool for Mobile Hybrid Apps' Configuration}, booktitle = {Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia, {MUM} 2018, Cairo, Egypt, November 25-28, 2018}, pages = {161--170}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3282894.3282931}, doi = {10.1145/3282894.3282931}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mum/JarrahS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mum/MiaziCS18, author = {Md. Nazmus Sakib Miazi and Carlos Alberto Campos Castro and Mohamed Shehab}, editor = {Slim Abdennadher and Florian Alt}, title = {Mobile Users as Advertisers: User Perceptions of Product Sensitivity, Exposure, and Public Influence}, booktitle = {Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia, {MUM} 2018, Cairo, Egypt, November 25-28, 2018}, pages = {253--264}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3282894.3282929}, doi = {10.1145/3282894.3282929}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mum/MiaziCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/KimSLL18, author = {Min{-}Ju Kim and Mohamed Shehab and Hyo{-}Cheol Lee and Seok{-}Won Lee}, title = {Trust-Aware Goal Modeling from Use Case for Cooperative Self-Adaptive Systems}, booktitle = {{IEEE} International Conference on Systems, Man, and Cybernetics, {SMC} 2018, Miyazaki, Japan, October 7-10, 2018}, pages = {4405--4410}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SMC.2018.00744}, doi = {10.1109/SMC.2018.00744}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smc/KimSLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/QahtaniSA18, author = {Elham Al Qahtani and Mohamed Shehab and Abrar Aljohani}, editor = {Mary Ellen Zurko and Heather Richter Lipford}, title = {The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians}, booktitle = {Fourteenth Symposium on Usable Privacy and Security, {SOUPS} 2018, Baltimore, MD, USA, August 12-14, 2018}, pages = {31--46}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/soups2018/presentation/qahtani}, timestamp = {Mon, 01 Feb 2021 08:41:57 +0100}, biburl = {https://dblp.org/rec/conf/soups/QahtaniSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/JavedS17, author = {Yousra Javed and Mohamed Shehab}, title = {Look before you Authorize: Using Eye-Tracking to Enforce User Attention towards Application Permissions}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2017}, number = {2}, pages = {23--37}, year = {2017}, url = {https://doi.org/10.1515/popets-2017-0014}, doi = {10.1515/POPETS-2017-0014}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/JavedS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RahmanMAS17, author = {Mohammad Ashiqur Rahman and Mohammad Hossein Manshaei and Ehab Al{-}Shaer and Mohamed Shehab}, title = {Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {221--234}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2446492}, doi = {10.1109/TDSC.2015.2446492}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RahmanMAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/JavedSB17, author = {Yousra Javed and Mohamed Shehab and Emmanuel Bello{-}Ogunu}, title = {Investigating User Comprehension and Risk Perception of Apple's Touch {ID} Technology}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {35:1--35:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3098974}, doi = {10.1145/3098954.3098974}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/JavedSB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/JarrahS17, author = {Abeer Al Jarrah and Mohamed Shehab}, title = {The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration Model}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {57:1--57:10}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3105825}, doi = {10.1145/3098954.3105825}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/JarrahS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/MohsenS17, author = {Fadi Mohsen and Mohamed Shehab}, title = {Proposing and Testing New Security Cue Designs for OAuth-WebView-Embedded Mobile Applications}, booktitle = {3rd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017}, pages = {443--448}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CIC.2017.00063}, doi = {10.1109/CIC.2017.00063}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/coinco/MohsenS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/MiaziPSCW17, author = {Md. Nazmus Sakib Miazi and Mir Mehedi A. Pritom and Mohamed Shehab and Bill Chu and Jinpeng Wei}, title = {The Design of Cyber Threat Hunting Games: {A} Case Study}, booktitle = {26th International Conference on Computer Communication and Networks, {ICCCN} 2017, Vancouver, BC, Canada, July 31 - Aug. 3, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICCCN.2017.8038527}, doi = {10.1109/ICCCN.2017.8038527}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccn/MiaziPSCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pac/JavedS17, author = {Yousra Javed and Mohamed Shehab}, title = {Towards Improving Comprehension of Touch {ID} Authentication with Smartphone Applications}, booktitle = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington, DC, USA, August 1-4, 2017}, pages = {206--207}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.27}, doi = {10.1109/PAC.2017.27}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pac/JavedS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/Bello-OgunuS16, author = {Emmanuel Bello{-}Ogunu and Mohamed Shehab}, title = {Crowdsourcing for Context: Regarding Privacy in Beacon Encounters via Contextual Integrity}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2016}, number = {3}, pages = {83--95}, year = {2016}, url = {https://doi.org/10.1515/popets-2016-0017}, doi = {10.1515/POPETS-2016-0017}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/Bello-OgunuS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/snam/ShehabTJ16, author = {Mohamed Shehab and Hakim Touati and Yousra Javed}, title = {Semi-supervised policy recommendation for online social networks}, journal = {Soc. Netw. Anal. Min.}, volume = {6}, number = {1}, pages = {61:1--61:12}, year = {2016}, url = {https://doi.org/10.1007/s13278-016-0370-9}, doi = {10.1007/S13278-016-0370-9}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/snam/ShehabTJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/MohsenS16, author = {Fadi Mohsen and Mohamed Shehab}, title = {Hardening the OAuth-WebView Implementations in Android Applications by Re-Factoring the Chromium Library}, booktitle = {2nd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016}, pages = {196--205}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIC.2016.036}, doi = {10.1109/CIC.2016.036}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/MohsenS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/MohsenS16a, author = {Fadi Mohsen and Mohamed Shehab}, title = {The Listening Patterns to System Events by Benign and Malicious Android Apps}, booktitle = {2nd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016}, pages = {546--553}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIC.2016.083}, doi = {10.1109/CIC.2016.083}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/coinco/MohsenS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/JarrahS16, author = {Abeer Al Jarrah and Mohamed Shehab}, title = {Maintaining User Interface Integrity on Android}, booktitle = {40th {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} 2016, Atlanta, GA, USA, June 10-14, 2016}, pages = {449--458}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/COMPSAC.2016.150}, doi = {10.1109/COMPSAC.2016.150}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/JarrahS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JavedS16, author = {Yousra Javed and Mohamed Shehab}, editor = {Giovanni Livraga and Vicen{\c{c}} Torra and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Investigating the Animation of Application Permission Dialogs: {A} Case Study of Facebook}, booktitle = {Data Privacy Management and Security Assurance - 11th International Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9963}, pages = {146--162}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47072-6\_10}, doi = {10.1007/978-3-319-47072-6\_10}, timestamp = {Sat, 30 Sep 2023 09:40:25 +0200}, biburl = {https://dblp.org/rec/conf/esorics/JavedS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ladc/MarascoSC16, author = {Emanuela Marasco and Mohamed Shehab and Bojan Cukic}, title = {A Methodology for Prevention of Biometric Presentation Attacks}, booktitle = {2016 Seventh Latin-American Symposium on Dependable Computing, {LADC} 2016, Cali, Colombia, October 19-21, 2016}, pages = {9--14}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/LADC.2016.13}, doi = {10.1109/LADC.2016.13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ladc/MarascoSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SultanaGBS15, author = {Salmin Sultana and Gabriel Ghinita and Elisa Bertino and Mohamed Shehab}, title = {A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {3}, pages = {256--269}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2013.44}, doi = {10.1109/TDSC.2013.44}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SultanaGBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/JafarianTTHS15, author = {Jafar Haadi Jafarian and Hassan Takabi and Hakim Touati and Ehsan Hesamifard and Mohamed Shehab}, editor = {Edgar R. Weippl and Florian Kerschbaum and Adam J. Lee}, title = {Towards a General Framework for Optimal Role Mining: {A} Constraint Satisfaction Approach}, booktitle = {Proceedings of the 20th {ACM} Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015}, pages = {211--220}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2752952.2752975}, doi = {10.1145/2752952.2752975}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/JafarianTTHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CheekS14, author = {Gorrell P. Cheek and Mohamed Shehab}, title = {Human Effects of Enhanced Privacy Management Models}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {142--154}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.34}, doi = {10.1109/TDSC.2013.34}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CheekS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MohsenSBJ14, author = {Fadi Mohsen and Mohamed Shehab and Emmanuel Bello{-}Ogunu and Abeer Al Jarrah}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Android System Broadcast Actions Broadcasts Your Privacy}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1484--1486}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662388}, doi = {10.1145/2660267.2662388}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MohsenSBJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ShehabM14, author = {Mohamed Shehab and Fadi Mohsen}, editor = {Elisa Bertino and Ravi S. Sandhu and Jaehong Park}, title = {Securing OAuth implementations in smart phones}, booktitle = {Fourth {ACM} Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014}, pages = {167--170}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2557547.2557588}, doi = {10.1145/2557547.2557588}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ShehabM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eclipse/Bello-OgunuS14, author = {Emmanuel Bello{-}Ogunu and Mohamed Shehab}, editor = {Andrew P. Black and Jan S. Rellermeyer and Tim Verbelen}, title = {{PERMITME:} integrating android permissioning support in the {IDE}}, booktitle = {Proceedings of the 2014 Workshop on Eclipse Technology eXchange, {ETX} 2014, Portland, OR, USA, October 20 - 24, 2014}, pages = {15--20}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2688130.2688135}, doi = {10.1145/2688130.2688135}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eclipse/Bello-OgunuS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobserv/ShehabM14, author = {Mohamed Shehab and Fadi Mohsen}, editor = {Rong Chang and Nimish Radia and Yan Wang}, title = {Towards Enhancing the Security of OAuth Implementations in Smart Phones}, booktitle = {{IEEE} Third International Conference on Mobile Services, Anchorage, AK, USA, June 27 - July 2, 2014}, pages = {39--46}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MobServ.2014.15}, doi = {10.1109/MOBSERV.2014.15}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobserv/ShehabM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/oopsla/ShehabJ14, author = {Mohamed Shehab and Abeer Al Jarrah}, editor = {Aharon Abadi and Danny Dig and Eli Tilevich}, title = {Reducing Attack Surface on Cordova-based Hybrid Mobile Apps}, booktitle = {Proceedings of the 2nd International Workshop on Mobile Development Lifecycle, MobileDeLi 2014, Portland, OR, USA, October 20-24, 2014}, pages = {1--8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2688412.2688417}, doi = {10.1145/2688412.2688417}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/oopsla/ShehabJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/XuSA13, author = {Wenjuan Xu and Mohamed Shehab and Gail{-}Joon Ahn}, title = {Visualization-based policy analysis for SELinux: framework and user study}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {3}, pages = {155--171}, year = {2013}, url = {https://doi.org/10.1007/s10207-012-0180-7}, doi = {10.1007/S10207-012-0180-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/XuSA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/snam/ShehabKT13, author = {Mohamed Shehab and Moonam Ko and Hakim Touati}, title = {Enabling cross-site interactions in social networks}, journal = {Soc. Netw. Anal. Min.}, volume = {3}, number = {1}, pages = {93--106}, year = {2013}, url = {https://doi.org/10.1007/s13278-012-0051-2}, doi = {10.1007/S13278-012-0051-2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/snam/ShehabKT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/SultanaSB13, author = {Salmin Sultana and Mohamed Shehab and Elisa Bertino}, title = {Secure Provenance Transmission for Streaming Data}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {25}, number = {8}, pages = {1890--1903}, year = {2013}, url = {https://doi.org/10.1109/TKDE.2012.31}, doi = {10.1109/TKDE.2012.31}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/SultanaSB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/HasanSN13, author = {Mohammad Rashedul Hasan and Mohamed Shehab and Ali Noorollahiravari}, editor = {Jon G. Rokne and Christos Faloutsos}, title = {Game-theoretic approach for user migration in Diaspora}, booktitle = {Advances in Social Networks Analysis and Mining 2013, {ASONAM} '13, Niagara, ON, Canada - August 25 - 29, 2013}, pages = {28--32}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2492517.2492648}, doi = {10.1145/2492517.2492648}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asunam/HasanSN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/CheekS13, author = {Gorrell P. Cheek and Mohamed Shehab}, editor = {Jon G. Rokne and Christos Faloutsos}, title = {Usable object management approaches for online social networks}, booktitle = {Advances in Social Networks Analysis and Mining 2013, {ASONAM} '13, Niagara, ON, Canada - August 25 - 29, 2013}, pages = {541--547}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2492517.2492655}, doi = {10.1145/2492517.2492655}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asunam/CheekS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/MohsenS13, author = {Fadi Mohsen and Mohamed Shehab}, editor = {Elisa Bertino and Dimitrios Georgakopoulos and Mudhakar Srivatsa and Surya Nepal and Alessandro Vinciarelli}, title = {Android keylogging threat}, booktitle = {9th {IEEE} International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013}, pages = {545--552}, publisher = {{ICST} / {IEEE}}, year = {2013}, url = {https://doi.org/10.4108/icst.collaboratecom.2013.254209}, doi = {10.4108/ICST.COLLABORATECOM.2013.254209}, timestamp = {Fri, 15 Mar 2024 12:30:44 +0100}, biburl = {https://dblp.org/rec/conf/colcom/MohsenS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/JavedS13, author = {Yousra Javed and Mohamed Shehab}, title = {Access Control Policy Misconfiguration Detection in Online Social Networks}, booktitle = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013}, pages = {544--549}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SocialCom.2013.82}, doi = {10.1109/SOCIALCOM.2013.82}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/socialcom/JavedS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/worldcis/HudelS13, author = {Christopher Hudel and Mohamed Shehab}, title = {Optimizing search for malware by hashing smaller amounts of data}, booktitle = {2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013}, pages = {112--117}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/WorldCIS.2013.6751028}, doi = {10.1109/WORLDCIS.2013.6751028}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/worldcis/HudelS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShehabSAK12, author = {Mohamed Shehab and Anna Cinzia Squicciarini and Gail{-}Joon Ahn and Irini Kokkinou}, title = {Access control for online social networks third party applications}, journal = {Comput. Secur.}, volume = {31}, number = {8}, pages = {897--911}, year = {2012}, url = {https://doi.org/10.1016/j.cose.2012.07.008}, doi = {10.1016/J.COSE.2012.07.008}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShehabSAK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AhnJS12, author = {Gail{-}Joon Ahn and Jing Jin and Mohamed Shehab}, title = {Policy-driven role-based access management for ad-hoc collaboration}, journal = {J. Comput. Secur.}, volume = {20}, number = {2-3}, pages = {223--257}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0446}, doi = {10.3233/JCS-2012-0446}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AhnJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShehabM12, author = {Mohamed Shehab and Said Marouf}, title = {Recommendation Models for Open Authorization}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {583--596}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.34}, doi = {10.1109/TDSC.2012.34}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShehabM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/JavedS12, author = {Yousra Javed and Mohamed Shehab}, title = {How do Facebookers Use Friendlists}, booktitle = {International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2012, Istanbul, Turkey, 26-29 August 2012}, pages = {343--347}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ASONAM.2012.63}, doi = {10.1109/ASONAM.2012.63}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asunam/JavedS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/ShehabT12, author = {Mohamed Shehab and Hakim Touati}, title = {Semi-Supervised Policy Recommendation for Online Social Networks}, booktitle = {International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2012, Istanbul, Turkey, 26-29 August 2012}, pages = {360--367}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ASONAM.2012.66}, doi = {10.1109/ASONAM.2012.66}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asunam/ShehabT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/MaroufS12, author = {Said Marouf and Mohamed Shehab}, editor = {Calton Pu and James Joshi and Surya Nepal}, title = {Towards improving browser extension permission management and user awareness}, booktitle = {8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA, USA, October 14-17, 2012}, pages = {695--702}, publisher = {{ICST} / {IEEE}}, year = {2012}, url = {https://doi.org/10.4108/icst.collaboratecom.2012.250642}, doi = {10.4108/ICST.COLLABORATECOM.2012.250642}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/MaroufS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/ShehabABA12, author = {Mohamed Shehab and Saeed Al{-}Haj and Salil Bhagurkar and Ehab Al{-}Shaer}, editor = {Stephen W. Liddle and Klaus{-}Dieter Schewe and A Min Tjoa and Xiaofang Zhou}, title = {Anomaly Discovery and Resolution in MySQL Access Control Policies}, booktitle = {Database and Expert Systems Applications - 23rd International Conference, {DEXA} 2012, Vienna, Austria, September 3-6, 2012. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7447}, pages = {514--522}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32597-7\_47}, doi = {10.1007/978-3-642-32597-7\_47}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexa/ShehabABA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/SultanaGBS12, author = {Salmin Sultana and Gabriel Ghinita and Elisa Bertino and Mohamed Shehab}, title = {A Lightweight Secure Provenance Scheme for Wireless Sensor Networks}, booktitle = {18th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2012, Singapore, December 17-19, 2012}, pages = {101--108}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICPADS.2012.24}, doi = {10.1109/ICPADS.2012.24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icpads/SultanaGBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/MaroufSD12, author = {Said Marouf and Mohamed Shehab and Adharsh Desikan}, editor = {Nora Cuppens{-}Boulahia and Philip Fong and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Stephen Marsh and Jan{-}Philipp Stegh{\"{o}}fer}, title = {{REM:} {A} runtime browser extension manager with fine-grained access control}, booktitle = {Tenth Annual International Conference on Privacy, Security and Trust, {PST} 2012, Paris, France, July 16-18, 2012}, pages = {231--232}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/PST.2012.6297947}, doi = {10.1109/PST.2012.6297947}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/MaroufSD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/CheekS12, author = {Gorrell P. Cheek and Mohamed Shehab}, editor = {Vijay Atluri and Jaideep Vaidya and Axel Kern and Murat Kantarcioglu}, title = {Policy-by-example for online social networks}, booktitle = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '12, Newark, NJ, {USA} - June 20 - 22, 2012}, pages = {23--32}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2295136.2295142}, doi = {10.1145/2295136.2295142}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/CheekS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RahmanBSA12, author = {Mohammad Ashiqur Rahman and Libin Bai and Mohamed Shehab and Ehab Al{-}Shaer}, editor = {Geyong Min and Yulei Wu and Lei (Chris) Liu and Xiaolong Jin and Stephen A. Jarvis and Ahmed Yassin Al{-}Dubai}, title = {Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid}, booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012}, pages = {279--286}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TrustCom.2012.252}, doi = {10.1109/TRUSTCOM.2012.252}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RahmanBSA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webapps/ShehabKT12, author = {Mohamed Shehab and Moonam Ko and Hakim Touati}, editor = {E. Michael Maximilien}, title = {Social Networks Profile Mapping Using Games}, booktitle = {3rd {USENIX} Conference on Web Application Development, WebApps'12, Boston, MA, USA, June 13, 2012}, pages = {27--38}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/webapps12/technical-sessions/presentation/shehab}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/webapps/ShehabKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/CheekS12, author = {Gorrell P. Cheek and Mohamed Shehab}, editor = {Alain Mille and Fabien Gandon and Jacques Misselis and Michael Rabinovich and Steffen Staab}, title = {Privacy management for online social networks}, booktitle = {Proceedings of the 21st World Wide Web Conference, {WWW} 2012, Lyon, France, April 16-20, 2012 (Companion Volume)}, pages = {475--476}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2187980.2188084}, doi = {10.1145/2187980.2188084}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/CheekS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/AhnSS11, author = {Gail{-}Joon Ahn and Mohamed Shehab and Anna Cinzia Squicciarini}, title = {Security and Privacy in Social Networks}, journal = {{IEEE} Internet Comput.}, volume = {15}, number = {3}, pages = {10--12}, year = {2011}, url = {https://doi.org/10.1109/MIC.2011.66}, doi = {10.1109/MIC.2011.66}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/AhnSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/MaroufSSS11, author = {Said Marouf and Mohamed Shehab and Anna Cinzia Squicciarini and Smitha Sundareswaran}, title = {Adaptive Reordering and Clustering-Based Framework for Efficient {XACML} Policy Evaluation}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {4}, number = {4}, pages = {300--313}, year = {2011}, url = {https://doi.org/10.1109/TSC.2010.28}, doi = {10.1109/TSC.2010.28}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/MaroufSSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/PaxtonAS11, author = {Napoleon Paxton and Gail{-}Joon Ahn and Mohamed Shehab}, title = {MasterBlaster: Identifying Influential Players in Botnet Transactions}, booktitle = {Proceedings of the 35th Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2011, Munich, Germany, 18-22 July 2011}, pages = {413--419}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/COMPSAC.2011.61}, doi = {10.1109/COMPSAC.2011.61}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/compsac/PaxtonAS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/SultanaBS11, author = {Salmin Sultana and Elisa Bertino and Mohamed Shehab}, title = {A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks}, booktitle = {31st {IEEE} International Conference on Distributed Computing Systems Workshops {(ICDCS} 2011 Workshops), 20-24 June 2011, Minneapolis, Minnesota, {USA}}, pages = {332--338}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICDCSW.2011.54}, doi = {10.1109/ICDCSW.2011.54}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcsw/SultanaBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/CheekSUW11, author = {Gorrell P. Cheek and Mohamed Shehab and Truong Ung and Ebonie Williams}, title = {iLayer: Toward an Application Access Control Framework for Content Management Systems}, booktitle = {{POLICY} 2011, {IEEE} International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011}, pages = {65--72}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/POLICY.2011.28}, doi = {10.1109/POLICY.2011.28}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/policy/CheekSUW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/MaroufS11, author = {Said Marouf and Mohamed Shehab}, editor = {John Banghart and Ehab Al{-}Shaer and Tony Sager and HariGovind V. Ramasamy}, title = {SEGrapher: Visualization-based SELinux Policy Analysis}, booktitle = {4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/SafeConfig.2011.6111675}, doi = {10.1109/SAFECONFIG.2011.6111675}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/MaroufS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/KoTS11, author = {Moonam Ko and Hakim Touati and Mohamed Shehab}, title = {Enabling Cross-Site Content Sharing between Social Networks}, booktitle = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 {IEEE} Third International Conference on and 2011 {IEEE} Third International Conference on Social Computing (SocialCom), Boston, MA, USA, 9-11 Oct., 2011}, pages = {493--496}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PASSAT/SocialCom.2011.117}, doi = {10.1109/PASSAT/SOCIALCOM.2011.117}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/socialcom/KoTS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/ShehabMH11, author = {Mohamed Shehab and Said Marouf and Christopher Hudel}, editor = {Lorrie Faith Cranor}, title = {ROAuth: recommendation based open authorization}, booktitle = {Symposium On Usable Privacy and Security, {SOUPS} '11, Pittsburgh, PA, {USA} - July 20 - 22, 2011}, pages = {11}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2078827.2078842}, doi = {10.1145/2078827.2078842}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/ShehabMH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KoCSS10, author = {Moonam Ko and Gorrell P. Cheek and Mohamed Shehab and Ravi S. Sandhu}, title = {Social-Networks Connect Services}, journal = {Computer}, volume = {43}, number = {8}, pages = {37--43}, year = {2010}, url = {https://doi.org/10.1109/MC.2010.239}, doi = {10.1109/MC.2010.239}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KoCSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vldb/SquicciariniSW10, author = {Anna Cinzia Squicciarini and Mohamed Shehab and Joshua Wede}, title = {Privacy policies for shared content in social network sites}, journal = {{VLDB} J.}, volume = {19}, number = {6}, pages = {777--796}, year = {2010}, url = {https://doi.org/10.1007/s00778-010-0193-7}, doi = {10.1007/S00778-010-0193-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vldb/SquicciariniSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/MaroufPS10, author = {Said Marouf and Doan Minh Phuong and Mohamed Shehab}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {A learning-based approach for SELinux policy optimization with type mining}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {70}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852746}, doi = {10.1145/1852666.1852746}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/MaroufPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/ShehabCTSC10, author = {Mohamed Shehab and Gorrell P. Cheek and Hakim Touati and Anna Cinzia Squicciarini and Pau{-}Chen Cheng}, title = {User Centric Policy Management in Online Social Networks}, booktitle = {{POLICY} 2010, {IEEE} International Symposium on Policies for Distributed Systems and Networks, Fairfax, VA, USA, 21-23 July 2010}, pages = {9--13}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/POLICY.2010.10}, doi = {10.1109/POLICY.2010.10}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/policy/ShehabCTSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/ShehabCTSC10, author = {Mohamed Shehab and Gorrell P. Cheek and Hakim Touati and Anna Cinzia Squicciarini and Pau{-}Chen Cheng}, editor = {Michael Rappa and Paul Jones and Juliana Freire and Soumen Chakrabarti}, title = {Learning based access control in online social networks}, booktitle = {Proceedings of the 19th International Conference on World Wide Web, {WWW} 2010, Raleigh, North Carolina, USA, April 26-30, 2010}, pages = {1179--1180}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1772690.1772863}, doi = {10.1145/1772690.1772863}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/ShehabCTSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/AhnKS09, author = {Gail{-}Joon Ahn and Moonam Ko and Mohamed Shehab}, title = {Privacy-Enhanced User-Centric Identity Management}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5199363}, doi = {10.1109/ICC.2009.5199363}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/AhnKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/MaroufSSS09, author = {Said Marouf and Mohamed Shehab and Anna Cinzia Squicciarini and Smitha Sundareswaran}, title = {Statistics {\&} Clustering Based Framework for Efficient {XACML} Policy Evaluation}, booktitle = {{POLICY} 2009, {IEEE} International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009}, pages = {118--125}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/POLICY.2009.36}, doi = {10.1109/POLICY.2009.36}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/policy/MaroufSSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/BesmerLSC09, author = {Andrew Besmer and Heather Richter Lipford and Mohamed Shehab and Gorrell P. Cheek}, editor = {Lorrie Faith Cranor}, title = {Social applications: exploring a more secure framework}, booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS} 2009, Mountain View, California, USA, July 15-17, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1572532.1572535}, doi = {10.1145/1572532.1572535}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soups/BesmerLSC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/SquicciariniSP09, author = {Anna Cinzia Squicciarini and Mohamed Shehab and Federica Paci}, editor = {Juan Quemada and Gonzalo Le{\'{o}}n and Yo{\"{e}}lle S. Maarek and Wolfgang Nejdl}, title = {Collective privacy management in social networks}, booktitle = {Proceedings of the 18th International Conference on World Wide Web, {WWW} 2009, Madrid, Spain, April 20-24, 2009}, pages = {521--530}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1526709.1526780}, doi = {10.1145/1526709.1526780}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/SquicciariniSP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/ShehabBG08, author = {Mohamed Shehab and Elisa Bertino and Arif Ghafoor}, title = {Watermarking Relational Databases Using Optimization-Based Techniques}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {20}, number = {1}, pages = {116--129}, year = {2008}, url = {https://doi.org/10.1109/TKDE.2007.190668}, doi = {10.1109/TKDE.2007.190668}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/ShehabBG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/ShehabGB08, author = {Mohamed Shehab and Arif Ghafoor and Elisa Bertino}, title = {Secure Collaboration in a Mediator-Free Distributed Environment}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {19}, number = {10}, pages = {1338--1351}, year = {2008}, url = {https://doi.org/10.1109/TPDS.2008.26}, doi = {10.1109/TPDS.2008.26}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/ShehabGB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ShehabSA08, author = {Mohamed Shehab and Anna Cinzia Squicciarini and Gail{-}Joon Ahn}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {Beyond User-to-User Access Control for Online Social Networks}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {174--189}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_12}, doi = {10.1007/978-3-540-88625-9\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ShehabSA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/ShehabBG08, author = {Mohamed Shehab and Elisa Bertino and Arif Ghafoor}, editor = {Klaus Wehrle and Wolfgang Kellerer and Sandeep K. Singhal and Ralf Steinmetz}, title = {Proactive Role Discovery in Mediator-Free Environments}, booktitle = {Proceedings P2P'08, Eighth International Conference on Peer-to-Peer Computing, 8-11 September 2008, Aachen, Germany}, pages = {150--159}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/P2P.2008.52}, doi = {10.1109/P2P.2008.52}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/p2p/ShehabBG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/XuSA08, author = {Wenjuan Xu and Mohamed Shehab and Gail{-}Joon Ahn}, editor = {Indrakshi Ray and Ninghui Li}, title = {Visualization based policy analysis: case study in SELinux}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {165--174}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377863}, doi = {10.1145/1377836.1377863}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/XuSA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/AhnKS08, author = {Gail{-}Joon Ahn and Moonam Ko and Mohamed Shehab}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Portable User-Centric Identity Management}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {573--587}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_37}, doi = {10.1007/978-0-387-09699-5\_37}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/AhnKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/ShehabBG07, author = {Mohamed Shehab and Kamal Bhattacharya and Arif Ghafoor}, title = {Web services discovery in secure collaboration environments}, journal = {{ACM} Trans. Internet Techn.}, volume = {8}, number = {1}, pages = {5}, year = {2007}, url = {https://doi.org/10.1145/1294148.1294153}, doi = {10.1145/1294148.1294153}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/ShehabBG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/JinASH07, author = {Jing Jin and Gail{-}Joon Ahn and Mohamed Shehab and Hongxin Hu}, editor = {Juan Quemada and Tao Zhang}, title = {Towards trust-aware access management for ad-hoc collaborations}, booktitle = {Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, White Plains, New York, USA, November 12-15, 2007}, pages = {41--48}, publisher = {{IEEE} Computer Society / {ICST}}, year = {2007}, url = {https://doi.org/10.1109/COLCOM.2007.4553807}, doi = {10.1109/COLCOM.2007.4553807}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/JinASH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ShehabBG06, author = {Mohamed Shehab and Elisa Bertino and Arif Ghafoor}, title = {Workflow authorisation in mediator-free environments}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {2--12}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010819}, doi = {10.1504/IJSN.2006.010819}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ShehabBG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BhattiSSG05, author = {Rafae Bhatti and Basit Shafiq and Mohamed Shehab and Arif Ghafoor}, title = {Distributed Access Management in Multimedia IDCs}, journal = {Computer}, volume = {38}, number = {9}, pages = {60--69}, year = {2005}, url = {https://doi.org/10.1109/MC.2005.296}, doi = {10.1109/MC.2005.296}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BhattiSSG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShehabBG05, author = {Mohamed Shehab and Elisa Bertino and Arif Ghafoor}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Secure collaboration in mediator-free environments}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {58--67}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102130}, doi = {10.1145/1102120.1102130}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShehabBG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ShehabBG05, author = {Mohamed Shehab and Elisa Bertino and Arif Ghafoor}, editor = {Elena Ferrari and Gail{-}Joon Ahn}, title = {{SERAT:} SEcure role mApping technique for decentralized secure interoperability}, booktitle = {10th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings}, pages = {159--167}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1063979.1064007}, doi = {10.1145/1063979.1064007}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ShehabBG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/ShehabBG05, author = {Mohamed Shehab and Elisa Bertino and Arif Ghafoor}, title = {Efficient hierarchical key generation and key diffusion for sensor networks}, booktitle = {Proceedings of the Second Annual {IEEE} Communications Society Conference on Sensor and Ad Hoc Communications and Networks, {SECON} 2005, September 26-29, 2005, Santa Clara, CA, {USA}}, pages = {76--84}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/SAHCN.2005.1557064}, doi = {10.1109/SAHCN.2005.1557064}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secon/ShehabBG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.