BibTeX records: Mohamed Shehab

download as .bib file

@inproceedings{DBLP:conf/hicss/QahtaniJTS24,
  author       = {Elham Al Qahtani and
                  Yousra Javed and
                  Sarah Tabassum and
                  Mohamed Shehab},
  editor       = {Tung X. Bui},
  title        = {Replication: What Would Motivate Users to Use Gmail's Confidential
                  Mode?},
  booktitle    = {57th Hawaii International Conference on System Sciences, {HICSS} 2024,
                  Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January
                  3-6, 2024},
  pages        = {7645--7654},
  publisher    = {ScholarSpace},
  year         = {2024},
  url          = {https://hdl.handle.net/10125/107305},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/QahtaniJTS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/QahtaniJTSS23,
  author       = {Elham Al Qahtani and
                  Yousra Javed and
                  Sarah Tabassum and
                  Lipsarani Sahoo and
                  Mohamed Shehab},
  title        = {Managing Access to Confidential Documents: {A} Case Study of an Email
                  Security Tool},
  journal      = {Future Internet},
  volume       = {15},
  number       = {11},
  pages        = {356},
  year         = {2023},
  url          = {https://doi.org/10.3390/fi15110356},
  doi          = {10.3390/FI15110356},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/QahtaniJTSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/SahooS23,
  author       = {Lipsarani Sahoo and
                  Mohamed Shehab},
  editor       = {Constantine Stephanidis and
                  Margherita Antona and
                  Stavroula Ntoa and
                  Gavriel Salvendy},
  title        = {I Have No Idea What Are These Terms! Exploring Users' Understanding
                  and Interpretation of Genealogy Results},
  booktitle    = {{HCI} International 2023 Posters - 25th International Conference on
                  Human-Computer Interaction, {HCII} 2023, Copenhagen, Denmark, July
                  23-28, 2023, Proceedings, Part {III}},
  series       = {Communications in Computer and Information Science},
  volume       = {1834},
  pages        = {141--148},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35998-9\_20},
  doi          = {10.1007/978-3-031-35998-9\_20},
  timestamp    = {Sun, 12 Nov 2023 02:12:38 +0100},
  biburl       = {https://dblp.org/rec/conf/hci/SahooS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/HazaziS23,
  author       = {Hussein Hazazi and
                  Mohamed Shehab},
  editor       = {Patrick Gage Kelley and
                  Apu Kapadia},
  title        = {Exploring the Usability, Security, and Privacy of Smart Locks from
                  the Perspective of the End User},
  booktitle    = {Nineteenth Symposium on Usable Privacy and Security, {SOUPS} 2023,
                  Anaheim, CA, USA, August 5-7, 2023},
  pages        = {559--577},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/soups2023/presentation/hazazi},
  timestamp    = {Wed, 09 Aug 2023 15:04:34 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/HazaziS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2023,
  editor       = {Mohamed Shehab and
                  Maribel Fern{\'{a}}ndez and
                  Ninghui Li},
  title        = {Proceedings of the Thirteenth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26,
                  2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577923},
  doi          = {10.1145/3577923},
  timestamp    = {Mon, 24 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/QahtaniJS22,
  author       = {Elham Al Qahtani and
                  Yousra Javed and
                  Mohamed Shehab},
  title        = {User Perceptions of Gmail's Confidential Mode},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {1},
  pages        = {187--206},
  year         = {2022},
  url          = {https://doi.org/10.2478/popets-2022-0010},
  doi          = {10.2478/POPETS-2022-0010},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/QahtaniJS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/QahtaniSJS22,
  author       = {Elham Al Qahtani and
                  Lipsarani Sahoo and
                  Yousra Javed and
                  Mohamed Shehab},
  editor       = {Sven Dietrich and
                  Omar Chowdhury and
                  Daniel Takabi},
  title        = {"Why would Someone Hack Me out of Thousands of Students":
                  Video Presenter's Impact on Motivating Users to Adopt 2FA},
  booktitle    = {{SACMAT} '22: The 27th {ACM} Symposium on Access Control Models and
                  Technologies, New York, NY, USA, June 8 - 10, 2022},
  pages        = {139--150},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3532105.3535013},
  doi          = {10.1145/3532105.3535013},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/QahtaniSJS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/RaufSQS21,
  author       = {Usman Rauf and
                  Mohamed Shehab and
                  Nafees Qamar and
                  Sheema Sameen},
  title        = {Formal approach to thwart against insider attacks: {A} bio-inspired
                  auto-resilient policy regulation framework},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {117},
  pages        = {412--425},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.future.2020.11.009},
  doi          = {10.1016/J.FUTURE.2020.11.009},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/RaufSQS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/JavedQS21,
  author       = {Yousra Javed and
                  Elham Al Qahtani and
                  Mohamed Shehab},
  title        = {Privacy Policy Analysis of Banks and Mobile Money Services in the
                  Middle East},
  journal      = {Future Internet},
  volume       = {13},
  number       = {1},
  pages        = {10},
  year         = {2021},
  url          = {https://doi.org/10.3390/fi13010010},
  doi          = {10.3390/FI13010010},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/JavedQS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/QahtaniSS21,
  author       = {Elham Al Qahtani and
                  Lipsarani Sahoo and
                  Mohamed Shehab},
  editor       = {Abbas Moallem},
  title        = {The Effectiveness of Video Messaging Campaigns to Use 2FA},
  booktitle    = {{HCI} for Cybersecurity, Privacy and Trust - Third International Conference,
                  {HCI-CPT} 2021, Held as Part of the 23rd {HCI} International Conference,
                  {HCII} 2021, Virtual Event, July 24-29, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12788},
  pages        = {369--390},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77392-2\_24},
  doi          = {10.1007/978-3-030-77392-2\_24},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/QahtaniSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/interact/MiaziLS21,
  author       = {Md. Nazmus Sakib Miazi and
                  Heather Lipford and
                  Mohamed Shehab},
  editor       = {Carmelo Ardito and
                  Rosa Lanzilotti and
                  Alessio Malizia and
                  Helen Petrie and
                  Antonio Piccinno and
                  Giuseppe Desolda and
                  Kori Inkpen},
  title        = {Exploring Perceptions of a Localized Content-Sharing System Using
                  Users-as-Beacons},
  booktitle    = {Human-Computer Interaction - {INTERACT} 2021 - 18th {IFIP} {TC} 13
                  International Conference, Bari, Italy, August 30 - September 3, 2021,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12933},
  pages        = {351--372},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85616-8\_21},
  doi          = {10.1007/978-3-030-85616-8\_21},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/interact/MiaziLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JavedSS20,
  author       = {Yousra Javed and
                  Khondaker Musfakus Salehin and
                  Mohamed Shehab},
  title        = {A Study of South Asian Websites on Privacy Compliance},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {156067--156083},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3019334},
  doi          = {10.1109/ACCESS.2020.3019334},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JavedSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/QahtaniJLS20,
  author       = {Elham Al Qahtani and
                  Yousra Javed and
                  Heather Lipford and
                  Mohamed Shehab},
  title        = {Do Women in Conservative Societies (Not) Follow Smartphone Security
                  Advice? {A} Case Study of Saudi Arabia and Pakistan},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P
                  Workshops 2020, Genoa, Italy, September 7-11, 2020},
  pages        = {150--159},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSPW51379.2020.00028},
  doi          = {10.1109/EUROSPW51379.2020.00028},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/QahtaniJLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/JavedQS20,
  author       = {Yousra Javed and
                  Elham Al Qahtani and
                  Mohamed Shehab},
  editor       = {Constantine Stephanidis and
                  Aaron Marcus and
                  Elizabeth Rosenzweig and
                  Pei{-}Luen Patrick Rau and
                  Abbas Moallem and
                  Matthias Rauterberg},
  title        = {The Impact of Advertisements on User Attention During Permission Authorization},
  booktitle    = {{HCI} International 2020 - Late Breaking Papers: User Experience Design
                  and Case Studies - 22nd {HCI} International Conference, {HCII} 2020,
                  Copenhagen, Denmark, July 19-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12423},
  pages        = {722--739},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-60114-0\_47},
  doi          = {10.1007/978-3-030-60114-0\_47},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/JavedQS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bionetics/RaufSQS19,
  author       = {Usman Rauf and
                  Mohamed Shehab and
                  Nafees Qamar and
                  Sheema Sameen},
  editor       = {Adriana B. Compagnoni and
                  William Casey and
                  Yang Cai and
                  Bud Mishra},
  title        = {Bio-inspired Approach to Thwart Against Insider Threats: An Access
                  Control Policy Regulation Framework},
  booktitle    = {Bio-inspired Information and Communication Technologies - 11th {EAI}
                  International Conference, {BICT} 2019, Pittsburgh, PA, USA, March
                  13-14, 2019, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {289},
  pages        = {39--57},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-24202-2\_4},
  doi          = {10.1007/978-3-030-24202-2\_4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bionetics/RaufSQS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/Bello-OgunuSM19,
  author       = {Emmanuel Bello{-}Ogunu and
                  Mohamed Shehab and
                  Md. Nazmus Sakib Miazi},
  editor       = {Vladimir Getov and
                  Jean{-}Luc Gaudiot and
                  Nariyoshi Yamai and
                  Stelvio Cimato and
                  J. Morris Chang and
                  Yuuichi Teranishi and
                  Ji{-}Jiang Yang and
                  Hong Va Leong and
                  Hossain Shahriar and
                  Michiharu Takemoto and
                  Dave Towey and
                  Hiroki Takakura and
                  Atilla El{\c{c}}i and
                  Susumu Takeuchi and
                  Satish Puri},
  title        = {Privacy Is The Best Policy: {A} Framework for {BLE} Beacon Privacy
                  Management},
  booktitle    = {43rd {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 1},
  pages        = {823--832},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/COMPSAC.2019.00121},
  doi          = {10.1109/COMPSAC.2019.00121},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/Bello-OgunuSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-02612,
  author       = {Yousra Javed and
                  Mohamed Shehab},
  title        = {Visual Analysis of Photo Policy Misconfigurations Using Treemaps},
  journal      = {CoRR},
  volume       = {abs/1903.02612},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.02612},
  eprinttype    = {arXiv},
  eprint       = {1903.02612},
  timestamp    = {Sun, 31 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-02612.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-02618,
  author       = {Yousra Javed and
                  Boyd Davis and
                  Mohamed Shehab},
  title        = {Seniors' Media Preference for Receiving Internet Security Information:
                  {A} Pilot Study},
  journal      = {CoRR},
  volume       = {abs/1903.02618},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.02618},
  eprinttype    = {arXiv},
  eprint       = {1903.02618},
  timestamp    = {Sun, 31 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-02618.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mum/JarrahS18,
  author       = {Abeer Al Jarrah and
                  Mohamed Shehab},
  editor       = {Slim Abdennadher and
                  Florian Alt},
  title        = {CordovaConfig: {A} Tool for Mobile Hybrid Apps' Configuration},
  booktitle    = {Proceedings of the 17th International Conference on Mobile and Ubiquitous
                  Multimedia, {MUM} 2018, Cairo, Egypt, November 25-28, 2018},
  pages        = {161--170},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3282894.3282931},
  doi          = {10.1145/3282894.3282931},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mum/JarrahS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mum/MiaziCS18,
  author       = {Md. Nazmus Sakib Miazi and
                  Carlos Alberto Campos Castro and
                  Mohamed Shehab},
  editor       = {Slim Abdennadher and
                  Florian Alt},
  title        = {Mobile Users as Advertisers: User Perceptions of Product Sensitivity,
                  Exposure, and Public Influence},
  booktitle    = {Proceedings of the 17th International Conference on Mobile and Ubiquitous
                  Multimedia, {MUM} 2018, Cairo, Egypt, November 25-28, 2018},
  pages        = {253--264},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3282894.3282929},
  doi          = {10.1145/3282894.3282929},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mum/MiaziCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/KimSLL18,
  author       = {Min{-}Ju Kim and
                  Mohamed Shehab and
                  Hyo{-}Cheol Lee and
                  Seok{-}Won Lee},
  title        = {Trust-Aware Goal Modeling from Use Case for Cooperative Self-Adaptive
                  Systems},
  booktitle    = {{IEEE} International Conference on Systems, Man, and Cybernetics,
                  {SMC} 2018, Miyazaki, Japan, October 7-10, 2018},
  pages        = {4405--4410},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SMC.2018.00744},
  doi          = {10.1109/SMC.2018.00744},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/KimSLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/QahtaniSA18,
  author       = {Elham Al Qahtani and
                  Mohamed Shehab and
                  Abrar Aljohani},
  editor       = {Mary Ellen Zurko and
                  Heather Richter Lipford},
  title        = {The Effectiveness of Fear Appeals in Increasing Smartphone Locking
                  Behavior among Saudi Arabians},
  booktitle    = {Fourteenth Symposium on Usable Privacy and Security, {SOUPS} 2018,
                  Baltimore, MD, USA, August 12-14, 2018},
  pages        = {31--46},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/soups2018/presentation/qahtani},
  timestamp    = {Mon, 01 Feb 2021 08:41:57 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/QahtaniSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/JavedS17,
  author       = {Yousra Javed and
                  Mohamed Shehab},
  title        = {Look before you Authorize: Using Eye-Tracking to Enforce User Attention
                  towards Application Permissions},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2017},
  number       = {2},
  pages        = {23--37},
  year         = {2017},
  url          = {https://doi.org/10.1515/popets-2017-0014},
  doi          = {10.1515/POPETS-2017-0014},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/JavedS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RahmanMAS17,
  author       = {Mohammad Ashiqur Rahman and
                  Mohammad Hossein Manshaei and
                  Ehab Al{-}Shaer and
                  Mohamed Shehab},
  title        = {Secure and Private Data Aggregation for Energy Consumption Scheduling
                  in Smart Grids},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {2},
  pages        = {221--234},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2446492},
  doi          = {10.1109/TDSC.2015.2446492},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RahmanMAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/JavedSB17,
  author       = {Yousra Javed and
                  Mohamed Shehab and
                  Emmanuel Bello{-}Ogunu},
  title        = {Investigating User Comprehension and Risk Perception of Apple's Touch
                  {ID} Technology},
  booktitle    = {Proceedings of the 12th International Conference on Availability,
                  Reliability and Security, Reggio Calabria, Italy, August 29 - September
                  01, 2017},
  pages        = {35:1--35:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098954.3098974},
  doi          = {10.1145/3098954.3098974},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/JavedSB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/JarrahS17,
  author       = {Abeer Al Jarrah and
                  Mohamed Shehab},
  title        = {The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration
                  Model},
  booktitle    = {Proceedings of the 12th International Conference on Availability,
                  Reliability and Security, Reggio Calabria, Italy, August 29 - September
                  01, 2017},
  pages        = {57:1--57:10},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098954.3105825},
  doi          = {10.1145/3098954.3105825},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/JarrahS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/MohsenS17,
  author       = {Fadi Mohsen and
                  Mohamed Shehab},
  title        = {Proposing and Testing New Security Cue Designs for OAuth-WebView-Embedded
                  Mobile Applications},
  booktitle    = {3rd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017},
  pages        = {443--448},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CIC.2017.00063},
  doi          = {10.1109/CIC.2017.00063},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/coinco/MohsenS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/MiaziPSCW17,
  author       = {Md. Nazmus Sakib Miazi and
                  Mir Mehedi A. Pritom and
                  Mohamed Shehab and
                  Bill Chu and
                  Jinpeng Wei},
  title        = {The Design of Cyber Threat Hunting Games: {A} Case Study},
  booktitle    = {26th International Conference on Computer Communication and Networks,
                  {ICCCN} 2017, Vancouver, BC, Canada, July 31 - Aug. 3, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICCCN.2017.8038527},
  doi          = {10.1109/ICCCN.2017.8038527},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/MiaziPSCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pac/JavedS17,
  author       = {Yousra Javed and
                  Mohamed Shehab},
  title        = {Towards Improving Comprehension of Touch {ID} Authentication with
                  Smartphone Applications},
  booktitle    = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington,
                  DC, USA, August 1-4, 2017},
  pages        = {206--207},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.27},
  doi          = {10.1109/PAC.2017.27},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pac/JavedS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/Bello-OgunuS16,
  author       = {Emmanuel Bello{-}Ogunu and
                  Mohamed Shehab},
  title        = {Crowdsourcing for Context: Regarding Privacy in Beacon Encounters
                  via Contextual Integrity},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2016},
  number       = {3},
  pages        = {83--95},
  year         = {2016},
  url          = {https://doi.org/10.1515/popets-2016-0017},
  doi          = {10.1515/POPETS-2016-0017},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/Bello-OgunuS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/snam/ShehabTJ16,
  author       = {Mohamed Shehab and
                  Hakim Touati and
                  Yousra Javed},
  title        = {Semi-supervised policy recommendation for online social networks},
  journal      = {Soc. Netw. Anal. Min.},
  volume       = {6},
  number       = {1},
  pages        = {61:1--61:12},
  year         = {2016},
  url          = {https://doi.org/10.1007/s13278-016-0370-9},
  doi          = {10.1007/S13278-016-0370-9},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/snam/ShehabTJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/MohsenS16,
  author       = {Fadi Mohsen and
                  Mohamed Shehab},
  title        = {Hardening the OAuth-WebView Implementations in Android Applications
                  by Re-Factoring the Chromium Library},
  booktitle    = {2nd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016},
  pages        = {196--205},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIC.2016.036},
  doi          = {10.1109/CIC.2016.036},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/MohsenS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/MohsenS16a,
  author       = {Fadi Mohsen and
                  Mohamed Shehab},
  title        = {The Listening Patterns to System Events by Benign and Malicious Android
                  Apps},
  booktitle    = {2nd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016},
  pages        = {546--553},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIC.2016.083},
  doi          = {10.1109/CIC.2016.083},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/coinco/MohsenS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/JarrahS16,
  author       = {Abeer Al Jarrah and
                  Mohamed Shehab},
  title        = {Maintaining User Interface Integrity on Android},
  booktitle    = {40th {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2016, Atlanta, GA, USA, June 10-14, 2016},
  pages        = {449--458},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMPSAC.2016.150},
  doi          = {10.1109/COMPSAC.2016.150},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/JarrahS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JavedS16,
  author       = {Yousra Javed and
                  Mohamed Shehab},
  editor       = {Giovanni Livraga and
                  Vicen{\c{c}} Torra and
                  Alessandro Aldini and
                  Fabio Martinelli and
                  Neeraj Suri},
  title        = {Investigating the Animation of Application Permission Dialogs: {A}
                  Case Study of Facebook},
  booktitle    = {Data Privacy Management and Security Assurance - 11th International
                  Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016,
                  Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9963},
  pages        = {146--162},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47072-6\_10},
  doi          = {10.1007/978-3-319-47072-6\_10},
  timestamp    = {Sat, 30 Sep 2023 09:40:25 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/JavedS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ladc/MarascoSC16,
  author       = {Emanuela Marasco and
                  Mohamed Shehab and
                  Bojan Cukic},
  title        = {A Methodology for Prevention of Biometric Presentation Attacks},
  booktitle    = {2016 Seventh Latin-American Symposium on Dependable Computing, {LADC}
                  2016, Cali, Colombia, October 19-21, 2016},
  pages        = {9--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/LADC.2016.13},
  doi          = {10.1109/LADC.2016.13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ladc/MarascoSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/SultanaGBS15,
  author       = {Salmin Sultana and
                  Gabriel Ghinita and
                  Elisa Bertino and
                  Mohamed Shehab},
  title        = {A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet
                  DropAttacks in Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {12},
  number       = {3},
  pages        = {256--269},
  year         = {2015},
  url          = {https://doi.org/10.1109/TDSC.2013.44},
  doi          = {10.1109/TDSC.2013.44},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/SultanaGBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/JafarianTTHS15,
  author       = {Jafar Haadi Jafarian and
                  Hassan Takabi and
                  Hakim Touati and
                  Ehsan Hesamifard and
                  Mohamed Shehab},
  editor       = {Edgar R. Weippl and
                  Florian Kerschbaum and
                  Adam J. Lee},
  title        = {Towards a General Framework for Optimal Role Mining: {A} Constraint
                  Satisfaction Approach},
  booktitle    = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
                  Technologies, Vienna, Austria, June 1-3, 2015},
  pages        = {211--220},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2752952.2752975},
  doi          = {10.1145/2752952.2752975},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/JafarianTTHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CheekS14,
  author       = {Gorrell P. Cheek and
                  Mohamed Shehab},
  title        = {Human Effects of Enhanced Privacy Management Models},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {142--154},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.34},
  doi          = {10.1109/TDSC.2013.34},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CheekS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MohsenSBJ14,
  author       = {Fadi Mohsen and
                  Mohamed Shehab and
                  Emmanuel Bello{-}Ogunu and
                  Abeer Al Jarrah},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{POSTER:} Android System Broadcast Actions Broadcasts Your Privacy},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1484--1486},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2662388},
  doi          = {10.1145/2660267.2662388},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MohsenSBJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ShehabM14,
  author       = {Mohamed Shehab and
                  Fadi Mohsen},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Jaehong Park},
  title        = {Securing OAuth implementations in smart phones},
  booktitle    = {Fourth {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},
  pages        = {167--170},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2557547.2557588},
  doi          = {10.1145/2557547.2557588},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ShehabM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eclipse/Bello-OgunuS14,
  author       = {Emmanuel Bello{-}Ogunu and
                  Mohamed Shehab},
  editor       = {Andrew P. Black and
                  Jan S. Rellermeyer and
                  Tim Verbelen},
  title        = {{PERMITME:} integrating android permissioning support in the {IDE}},
  booktitle    = {Proceedings of the 2014 Workshop on Eclipse Technology eXchange, {ETX}
                  2014, Portland, OR, USA, October 20 - 24, 2014},
  pages        = {15--20},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2688130.2688135},
  doi          = {10.1145/2688130.2688135},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eclipse/Bello-OgunuS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobserv/ShehabM14,
  author       = {Mohamed Shehab and
                  Fadi Mohsen},
  editor       = {Rong Chang and
                  Nimish Radia and
                  Yan Wang},
  title        = {Towards Enhancing the Security of OAuth Implementations in Smart Phones},
  booktitle    = {{IEEE} Third International Conference on Mobile Services, Anchorage,
                  AK, USA, June 27 - July 2, 2014},
  pages        = {39--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MobServ.2014.15},
  doi          = {10.1109/MOBSERV.2014.15},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobserv/ShehabM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/oopsla/ShehabJ14,
  author       = {Mohamed Shehab and
                  Abeer Al Jarrah},
  editor       = {Aharon Abadi and
                  Danny Dig and
                  Eli Tilevich},
  title        = {Reducing Attack Surface on Cordova-based Hybrid Mobile Apps},
  booktitle    = {Proceedings of the 2nd International Workshop on Mobile Development
                  Lifecycle, MobileDeLi 2014, Portland, OR, USA, October 20-24, 2014},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2688412.2688417},
  doi          = {10.1145/2688412.2688417},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/oopsla/ShehabJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/XuSA13,
  author       = {Wenjuan Xu and
                  Mohamed Shehab and
                  Gail{-}Joon Ahn},
  title        = {Visualization-based policy analysis for SELinux: framework and user
                  study},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {3},
  pages        = {155--171},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-012-0180-7},
  doi          = {10.1007/S10207-012-0180-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/XuSA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/snam/ShehabKT13,
  author       = {Mohamed Shehab and
                  Moonam Ko and
                  Hakim Touati},
  title        = {Enabling cross-site interactions in social networks},
  journal      = {Soc. Netw. Anal. Min.},
  volume       = {3},
  number       = {1},
  pages        = {93--106},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13278-012-0051-2},
  doi          = {10.1007/S13278-012-0051-2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/snam/ShehabKT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/SultanaSB13,
  author       = {Salmin Sultana and
                  Mohamed Shehab and
                  Elisa Bertino},
  title        = {Secure Provenance Transmission for Streaming Data},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {25},
  number       = {8},
  pages        = {1890--1903},
  year         = {2013},
  url          = {https://doi.org/10.1109/TKDE.2012.31},
  doi          = {10.1109/TKDE.2012.31},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/SultanaSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/HasanSN13,
  author       = {Mohammad Rashedul Hasan and
                  Mohamed Shehab and
                  Ali Noorollahiravari},
  editor       = {Jon G. Rokne and
                  Christos Faloutsos},
  title        = {Game-theoretic approach for user migration in Diaspora},
  booktitle    = {Advances in Social Networks Analysis and Mining 2013, {ASONAM} '13,
                  Niagara, ON, Canada - August 25 - 29, 2013},
  pages        = {28--32},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2492517.2492648},
  doi          = {10.1145/2492517.2492648},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asunam/HasanSN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/CheekS13,
  author       = {Gorrell P. Cheek and
                  Mohamed Shehab},
  editor       = {Jon G. Rokne and
                  Christos Faloutsos},
  title        = {Usable object management approaches for online social networks},
  booktitle    = {Advances in Social Networks Analysis and Mining 2013, {ASONAM} '13,
                  Niagara, ON, Canada - August 25 - 29, 2013},
  pages        = {541--547},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2492517.2492655},
  doi          = {10.1145/2492517.2492655},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asunam/CheekS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/MohsenS13,
  author       = {Fadi Mohsen and
                  Mohamed Shehab},
  editor       = {Elisa Bertino and
                  Dimitrios Georgakopoulos and
                  Mudhakar Srivatsa and
                  Surya Nepal and
                  Alessandro Vinciarelli},
  title        = {Android keylogging threat},
  booktitle    = {9th {IEEE} International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, Austin, TX, USA, October 20-23, 2013},
  pages        = {545--552},
  publisher    = {{ICST} / {IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2013.254209},
  doi          = {10.4108/ICST.COLLABORATECOM.2013.254209},
  timestamp    = {Fri, 15 Mar 2024 12:30:44 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/MohsenS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/JavedS13,
  author       = {Yousra Javed and
                  Mohamed Shehab},
  title        = {Access Control Policy Misconfiguration Detection in Online Social
                  Networks},
  booktitle    = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom
                  2013, Washington, DC, USA, 8-14 September, 2013},
  pages        = {544--549},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SocialCom.2013.82},
  doi          = {10.1109/SOCIALCOM.2013.82},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/socialcom/JavedS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/worldcis/HudelS13,
  author       = {Christopher Hudel and
                  Mohamed Shehab},
  title        = {Optimizing search for malware by hashing smaller amounts of data},
  booktitle    = {2013 World Congress on Internet Security, WorldCIS 2013, London, United
                  Kingdom, December 9-12, 2013},
  pages        = {112--117},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WorldCIS.2013.6751028},
  doi          = {10.1109/WORLDCIS.2013.6751028},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/worldcis/HudelS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShehabSAK12,
  author       = {Mohamed Shehab and
                  Anna Cinzia Squicciarini and
                  Gail{-}Joon Ahn and
                  Irini Kokkinou},
  title        = {Access control for online social networks third party applications},
  journal      = {Comput. Secur.},
  volume       = {31},
  number       = {8},
  pages        = {897--911},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.cose.2012.07.008},
  doi          = {10.1016/J.COSE.2012.07.008},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShehabSAK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AhnJS12,
  author       = {Gail{-}Joon Ahn and
                  Jing Jin and
                  Mohamed Shehab},
  title        = {Policy-driven role-based access management for ad-hoc collaboration},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {2-3},
  pages        = {223--257},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2012-0446},
  doi          = {10.3233/JCS-2012-0446},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AhnJS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShehabM12,
  author       = {Mohamed Shehab and
                  Said Marouf},
  title        = {Recommendation Models for Open Authorization},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {583--596},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.34},
  doi          = {10.1109/TDSC.2012.34},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShehabM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/JavedS12,
  author       = {Yousra Javed and
                  Mohamed Shehab},
  title        = {How do Facebookers Use Friendlists},
  booktitle    = {International Conference on Advances in Social Networks Analysis and
                  Mining, {ASONAM} 2012, Istanbul, Turkey, 26-29 August 2012},
  pages        = {343--347},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ASONAM.2012.63},
  doi          = {10.1109/ASONAM.2012.63},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asunam/JavedS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/ShehabT12,
  author       = {Mohamed Shehab and
                  Hakim Touati},
  title        = {Semi-Supervised Policy Recommendation for Online Social Networks},
  booktitle    = {International Conference on Advances in Social Networks Analysis and
                  Mining, {ASONAM} 2012, Istanbul, Turkey, 26-29 August 2012},
  pages        = {360--367},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ASONAM.2012.66},
  doi          = {10.1109/ASONAM.2012.66},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asunam/ShehabT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/MaroufS12,
  author       = {Said Marouf and
                  Mohamed Shehab},
  editor       = {Calton Pu and
                  James Joshi and
                  Surya Nepal},
  title        = {Towards improving browser extension permission management and user
                  awareness},
  booktitle    = {8th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA,
                  USA, October 14-17, 2012},
  pages        = {695--702},
  publisher    = {{ICST} / {IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2012.250642},
  doi          = {10.4108/ICST.COLLABORATECOM.2012.250642},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/MaroufS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/ShehabABA12,
  author       = {Mohamed Shehab and
                  Saeed Al{-}Haj and
                  Salil Bhagurkar and
                  Ehab Al{-}Shaer},
  editor       = {Stephen W. Liddle and
                  Klaus{-}Dieter Schewe and
                  A Min Tjoa and
                  Xiaofang Zhou},
  title        = {Anomaly Discovery and Resolution in MySQL Access Control Policies},
  booktitle    = {Database and Expert Systems Applications - 23rd International Conference,
                  {DEXA} 2012, Vienna, Austria, September 3-6, 2012. Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7447},
  pages        = {514--522},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32597-7\_47},
  doi          = {10.1007/978-3-642-32597-7\_47},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/ShehabABA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/SultanaGBS12,
  author       = {Salmin Sultana and
                  Gabriel Ghinita and
                  Elisa Bertino and
                  Mohamed Shehab},
  title        = {A Lightweight Secure Provenance Scheme for Wireless Sensor Networks},
  booktitle    = {18th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2012, Singapore, December 17-19, 2012},
  pages        = {101--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICPADS.2012.24},
  doi          = {10.1109/ICPADS.2012.24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icpads/SultanaGBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/MaroufSD12,
  author       = {Said Marouf and
                  Mohamed Shehab and
                  Adharsh Desikan},
  editor       = {Nora Cuppens{-}Boulahia and
                  Philip Fong and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Stephen Marsh and
                  Jan{-}Philipp Stegh{\"{o}}fer},
  title        = {{REM:} {A} runtime browser extension manager with fine-grained access
                  control},
  booktitle    = {Tenth Annual International Conference on Privacy, Security and Trust,
                  {PST} 2012, Paris, France, July 16-18, 2012},
  pages        = {231--232},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/PST.2012.6297947},
  doi          = {10.1109/PST.2012.6297947},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/MaroufSD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/CheekS12,
  author       = {Gorrell P. Cheek and
                  Mohamed Shehab},
  editor       = {Vijay Atluri and
                  Jaideep Vaidya and
                  Axel Kern and
                  Murat Kantarcioglu},
  title        = {Policy-by-example for online social networks},
  booktitle    = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '12, Newark, NJ, {USA} - June 20 - 22, 2012},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2295136.2295142},
  doi          = {10.1145/2295136.2295142},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/CheekS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RahmanBSA12,
  author       = {Mohammad Ashiqur Rahman and
                  Libin Bai and
                  Mohamed Shehab and
                  Ehab Al{-}Shaer},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {Secure Distributed Solution for Optimal Energy Consumption Scheduling
                  in Smart Grid},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {279--286},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.252},
  doi          = {10.1109/TRUSTCOM.2012.252},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RahmanBSA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webapps/ShehabKT12,
  author       = {Mohamed Shehab and
                  Moonam Ko and
                  Hakim Touati},
  editor       = {E. Michael Maximilien},
  title        = {Social Networks Profile Mapping Using Games},
  booktitle    = {3rd {USENIX} Conference on Web Application Development, WebApps'12,
                  Boston, MA, USA, June 13, 2012},
  pages        = {27--38},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/webapps12/technical-sessions/presentation/shehab},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/webapps/ShehabKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/CheekS12,
  author       = {Gorrell P. Cheek and
                  Mohamed Shehab},
  editor       = {Alain Mille and
                  Fabien Gandon and
                  Jacques Misselis and
                  Michael Rabinovich and
                  Steffen Staab},
  title        = {Privacy management for online social networks},
  booktitle    = {Proceedings of the 21st World Wide Web Conference, {WWW} 2012, Lyon,
                  France, April 16-20, 2012 (Companion Volume)},
  pages        = {475--476},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2187980.2188084},
  doi          = {10.1145/2187980.2188084},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/CheekS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/AhnSS11,
  author       = {Gail{-}Joon Ahn and
                  Mohamed Shehab and
                  Anna Cinzia Squicciarini},
  title        = {Security and Privacy in Social Networks},
  journal      = {{IEEE} Internet Comput.},
  volume       = {15},
  number       = {3},
  pages        = {10--12},
  year         = {2011},
  url          = {https://doi.org/10.1109/MIC.2011.66},
  doi          = {10.1109/MIC.2011.66},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/internet/AhnSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/MaroufSSS11,
  author       = {Said Marouf and
                  Mohamed Shehab and
                  Anna Cinzia Squicciarini and
                  Smitha Sundareswaran},
  title        = {Adaptive Reordering and Clustering-Based Framework for Efficient {XACML}
                  Policy Evaluation},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {4},
  number       = {4},
  pages        = {300--313},
  year         = {2011},
  url          = {https://doi.org/10.1109/TSC.2010.28},
  doi          = {10.1109/TSC.2010.28},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/MaroufSSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/PaxtonAS11,
  author       = {Napoleon Paxton and
                  Gail{-}Joon Ahn and
                  Mohamed Shehab},
  title        = {MasterBlaster: Identifying Influential Players in Botnet Transactions},
  booktitle    = {Proceedings of the 35th Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2011, Munich, Germany, 18-22
                  July 2011},
  pages        = {413--419},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/COMPSAC.2011.61},
  doi          = {10.1109/COMPSAC.2011.61},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/PaxtonAS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/SultanaBS11,
  author       = {Salmin Sultana and
                  Elisa Bertino and
                  Mohamed Shehab},
  title        = {A Provenance Based Mechanism to Identify Malicious Packet Dropping
                  Adversaries in Sensor Networks},
  booktitle    = {31st {IEEE} International Conference on Distributed Computing Systems
                  Workshops {(ICDCS} 2011 Workshops), 20-24 June 2011, Minneapolis,
                  Minnesota, {USA}},
  pages        = {332--338},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICDCSW.2011.54},
  doi          = {10.1109/ICDCSW.2011.54},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcsw/SultanaBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/CheekSUW11,
  author       = {Gorrell P. Cheek and
                  Mohamed Shehab and
                  Truong Ung and
                  Ebonie Williams},
  title        = {iLayer: Toward an Application Access Control Framework for Content
                  Management Systems},
  booktitle    = {{POLICY} 2011, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, Pisa, Italy, 6-8 June 2011},
  pages        = {65--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/POLICY.2011.28},
  doi          = {10.1109/POLICY.2011.28},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/policy/CheekSUW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/MaroufS11,
  author       = {Said Marouf and
                  Mohamed Shehab},
  editor       = {John Banghart and
                  Ehab Al{-}Shaer and
                  Tony Sager and
                  HariGovind V. Ramasamy},
  title        = {SEGrapher: Visualization-based SELinux Policy Analysis},
  booktitle    = {4th Symposium on Configuration Analytics and Automation, SafeConfig
                  2011, Arlington, VA, USA, October 31 - November 1, 2011},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/SafeConfig.2011.6111675},
  doi          = {10.1109/SAFECONFIG.2011.6111675},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/MaroufS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/KoTS11,
  author       = {Moonam Ko and
                  Hakim Touati and
                  Mohamed Shehab},
  title        = {Enabling Cross-Site Content Sharing between Social Networks},
  booktitle    = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT),
                  2011 {IEEE} Third International Conference on and 2011 {IEEE} Third
                  International Conference on Social Computing (SocialCom), Boston,
                  MA, USA, 9-11 Oct., 2011},
  pages        = {493--496},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PASSAT/SocialCom.2011.117},
  doi          = {10.1109/PASSAT/SOCIALCOM.2011.117},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/socialcom/KoTS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/ShehabMH11,
  author       = {Mohamed Shehab and
                  Said Marouf and
                  Christopher Hudel},
  editor       = {Lorrie Faith Cranor},
  title        = {ROAuth: recommendation based open authorization},
  booktitle    = {Symposium On Usable Privacy and Security, {SOUPS} '11, Pittsburgh,
                  PA, {USA} - July 20 - 22, 2011},
  pages        = {11},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2078827.2078842},
  doi          = {10.1145/2078827.2078842},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/ShehabMH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KoCSS10,
  author       = {Moonam Ko and
                  Gorrell P. Cheek and
                  Mohamed Shehab and
                  Ravi S. Sandhu},
  title        = {Social-Networks Connect Services},
  journal      = {Computer},
  volume       = {43},
  number       = {8},
  pages        = {37--43},
  year         = {2010},
  url          = {https://doi.org/10.1109/MC.2010.239},
  doi          = {10.1109/MC.2010.239},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KoCSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vldb/SquicciariniSW10,
  author       = {Anna Cinzia Squicciarini and
                  Mohamed Shehab and
                  Joshua Wede},
  title        = {Privacy policies for shared content in social network sites},
  journal      = {{VLDB} J.},
  volume       = {19},
  number       = {6},
  pages        = {777--796},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00778-010-0193-7},
  doi          = {10.1007/S00778-010-0193-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vldb/SquicciariniSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MaroufPS10,
  author       = {Said Marouf and
                  Doan Minh Phuong and
                  Mohamed Shehab},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A learning-based approach for SELinux policy optimization with type
                  mining},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {70},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852746},
  doi          = {10.1145/1852666.1852746},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/MaroufPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/ShehabCTSC10,
  author       = {Mohamed Shehab and
                  Gorrell P. Cheek and
                  Hakim Touati and
                  Anna Cinzia Squicciarini and
                  Pau{-}Chen Cheng},
  title        = {User Centric Policy Management in Online Social Networks},
  booktitle    = {{POLICY} 2010, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, Fairfax, VA, USA, 21-23 July 2010},
  pages        = {9--13},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/POLICY.2010.10},
  doi          = {10.1109/POLICY.2010.10},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/policy/ShehabCTSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/ShehabCTSC10,
  author       = {Mohamed Shehab and
                  Gorrell P. Cheek and
                  Hakim Touati and
                  Anna Cinzia Squicciarini and
                  Pau{-}Chen Cheng},
  editor       = {Michael Rappa and
                  Paul Jones and
                  Juliana Freire and
                  Soumen Chakrabarti},
  title        = {Learning based access control in online social networks},
  booktitle    = {Proceedings of the 19th International Conference on World Wide Web,
                  {WWW} 2010, Raleigh, North Carolina, USA, April 26-30, 2010},
  pages        = {1179--1180},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1772690.1772863},
  doi          = {10.1145/1772690.1772863},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/ShehabCTSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/AhnKS09,
  author       = {Gail{-}Joon Ahn and
                  Moonam Ko and
                  Mohamed Shehab},
  title        = {Privacy-Enhanced User-Centric Identity Management},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICC.2009.5199363},
  doi          = {10.1109/ICC.2009.5199363},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/AhnKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/MaroufSSS09,
  author       = {Said Marouf and
                  Mohamed Shehab and
                  Anna Cinzia Squicciarini and
                  Smitha Sundareswaran},
  title        = {Statistics {\&} Clustering Based Framework for Efficient {XACML}
                  Policy Evaluation},
  booktitle    = {{POLICY} 2009, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, London, UK, 20-22 July 2009},
  pages        = {118--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/POLICY.2009.36},
  doi          = {10.1109/POLICY.2009.36},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/policy/MaroufSSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/BesmerLSC09,
  author       = {Andrew Besmer and
                  Heather Richter Lipford and
                  Mohamed Shehab and
                  Gorrell P. Cheek},
  editor       = {Lorrie Faith Cranor},
  title        = {Social applications: exploring a more secure framework},
  booktitle    = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS}
                  2009, Mountain View, California, USA, July 15-17, 2009},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1572532.1572535},
  doi          = {10.1145/1572532.1572535},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/BesmerLSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/SquicciariniSP09,
  author       = {Anna Cinzia Squicciarini and
                  Mohamed Shehab and
                  Federica Paci},
  editor       = {Juan Quemada and
                  Gonzalo Le{\'{o}}n and
                  Yo{\"{e}}lle S. Maarek and
                  Wolfgang Nejdl},
  title        = {Collective privacy management in social networks},
  booktitle    = {Proceedings of the 18th International Conference on World Wide Web,
                  {WWW} 2009, Madrid, Spain, April 20-24, 2009},
  pages        = {521--530},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1526709.1526780},
  doi          = {10.1145/1526709.1526780},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/SquicciariniSP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/ShehabBG08,
  author       = {Mohamed Shehab and
                  Elisa Bertino and
                  Arif Ghafoor},
  title        = {Watermarking Relational Databases Using Optimization-Based Techniques},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {20},
  number       = {1},
  pages        = {116--129},
  year         = {2008},
  url          = {https://doi.org/10.1109/TKDE.2007.190668},
  doi          = {10.1109/TKDE.2007.190668},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/ShehabBG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ShehabGB08,
  author       = {Mohamed Shehab and
                  Arif Ghafoor and
                  Elisa Bertino},
  title        = {Secure Collaboration in a Mediator-Free Distributed Environment},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {19},
  number       = {10},
  pages        = {1338--1351},
  year         = {2008},
  url          = {https://doi.org/10.1109/TPDS.2008.26},
  doi          = {10.1109/TPDS.2008.26},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/ShehabGB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ShehabSA08,
  author       = {Mohamed Shehab and
                  Anna Cinzia Squicciarini and
                  Gail{-}Joon Ahn},
  editor       = {Liqun Chen and
                  Mark Dermot Ryan and
                  Guilin Wang},
  title        = {Beyond User-to-User Access Control for Online Social Networks},
  booktitle    = {Information and Communications Security, 10th International Conference,
                  {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5308},
  pages        = {174--189},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88625-9\_12},
  doi          = {10.1007/978-3-540-88625-9\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ShehabSA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/p2p/ShehabBG08,
  author       = {Mohamed Shehab and
                  Elisa Bertino and
                  Arif Ghafoor},
  editor       = {Klaus Wehrle and
                  Wolfgang Kellerer and
                  Sandeep K. Singhal and
                  Ralf Steinmetz},
  title        = {Proactive Role Discovery in Mediator-Free Environments},
  booktitle    = {Proceedings P2P'08, Eighth International Conference on Peer-to-Peer
                  Computing, 8-11 September 2008, Aachen, Germany},
  pages        = {150--159},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/P2P.2008.52},
  doi          = {10.1109/P2P.2008.52},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/p2p/ShehabBG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/XuSA08,
  author       = {Wenjuan Xu and
                  Mohamed Shehab and
                  Gail{-}Joon Ahn},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Visualization based policy analysis: case study in SELinux},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {165--174},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377863},
  doi          = {10.1145/1377836.1377863},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/XuSA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/AhnKS08,
  author       = {Gail{-}Joon Ahn and
                  Moonam Ko and
                  Mohamed Shehab},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Portable User-Centric Identity Management},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {573--587},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_37},
  doi          = {10.1007/978-0-387-09699-5\_37},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/AhnKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/ShehabBG07,
  author       = {Mohamed Shehab and
                  Kamal Bhattacharya and
                  Arif Ghafoor},
  title        = {Web services discovery in secure collaboration environments},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {8},
  number       = {1},
  pages        = {5},
  year         = {2007},
  url          = {https://doi.org/10.1145/1294148.1294153},
  doi          = {10.1145/1294148.1294153},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/ShehabBG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/JinASH07,
  author       = {Jing Jin and
                  Gail{-}Joon Ahn and
                  Mohamed Shehab and
                  Hongxin Hu},
  editor       = {Juan Quemada and
                  Tao Zhang},
  title        = {Towards trust-aware access management for ad-hoc collaborations},
  booktitle    = {Proceedings of the 3rd International Conference on Collaborative Computing:
                  Networking, Applications and Worksharing, White Plains, New York,
                  USA, November 12-15, 2007},
  pages        = {41--48},
  publisher    = {{IEEE} Computer Society / {ICST}},
  year         = {2007},
  url          = {https://doi.org/10.1109/COLCOM.2007.4553807},
  doi          = {10.1109/COLCOM.2007.4553807},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/JinASH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ShehabBG06,
  author       = {Mohamed Shehab and
                  Elisa Bertino and
                  Arif Ghafoor},
  title        = {Workflow authorisation in mediator-free environments},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {2--12},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010819},
  doi          = {10.1504/IJSN.2006.010819},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ShehabBG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BhattiSSG05,
  author       = {Rafae Bhatti and
                  Basit Shafiq and
                  Mohamed Shehab and
                  Arif Ghafoor},
  title        = {Distributed Access Management in Multimedia IDCs},
  journal      = {Computer},
  volume       = {38},
  number       = {9},
  pages        = {60--69},
  year         = {2005},
  url          = {https://doi.org/10.1109/MC.2005.296},
  doi          = {10.1109/MC.2005.296},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BhattiSSG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShehabBG05,
  author       = {Mohamed Shehab and
                  Elisa Bertino and
                  Arif Ghafoor},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Secure collaboration in mediator-free environments},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {58--67},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102130},
  doi          = {10.1145/1102120.1102130},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ShehabBG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ShehabBG05,
  author       = {Mohamed Shehab and
                  Elisa Bertino and
                  Arif Ghafoor},
  editor       = {Elena Ferrari and
                  Gail{-}Joon Ahn},
  title        = {{SERAT:} SEcure role mApping technique for decentralized secure interoperability},
  booktitle    = {10th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2005, Stockholm, Sweden, June 1-3, 2005, Proceedings},
  pages        = {159--167},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1063979.1064007},
  doi          = {10.1145/1063979.1064007},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/ShehabBG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/ShehabBG05,
  author       = {Mohamed Shehab and
                  Elisa Bertino and
                  Arif Ghafoor},
  title        = {Efficient hierarchical key generation and key diffusion for sensor
                  networks},
  booktitle    = {Proceedings of the Second Annual {IEEE} Communications Society Conference
                  on Sensor and Ad Hoc Communications and Networks, {SECON} 2005, September
                  26-29, 2005, Santa Clara, CA, {USA}},
  pages        = {76--84},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/SAHCN.2005.1557064},
  doi          = {10.1109/SAHCN.2005.1557064},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/ShehabBG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics