Mohamed Shehab, Ph.D. - Publications

Affiliations: 
2007 Electrical and Computer Engineering Purdue University, West Lafayette, IN, United States 
Area:
Electronics and Electrical Engineering, Computer Science

43 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Javed Y, Salehin KM, Shehab M. A Study of South Asian Websites on Privacy Compliance Ieee Access. 8: 156067-156083. DOI: 10.1109/Access.2020.3019334  0.306
2017 Rahman MA, Manshaei MH, Al-Shaer E, Shehab M. Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids Ieee Transactions On Dependable and Secure Computing. 14: 221-234. DOI: 10.1109/Tdsc.2015.2446492  0.463
2015 Davis BH, Shehab M, Shenk D, Nies M. E-mobile pilot for community-based dementia caregivers identifies desire for security Gerontechnology. 13: 332-336. DOI: 10.4017/Gt.2015.13.3.003.00  0.324
2015 Sultana S, Ghinita G, Bertino E, Shehab M. A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks Ieee Transactions On Dependable and Secure Computing. 12: 256-269. DOI: 10.1109/Tdsc.2013.44  0.351
2014 Shehab M, Aljarrah A. Reducing attack surface on cordova-based hybrid mobile apps Mobiledeli 2014 - Proceedings of the 2nd International Workshop On Mobile Development Lifecycle, Part of Splash 2014. 1-8. DOI: 10.1145/2688412.2688417  0.324
2014 Bello-Ogunu E, Shehab M. PERMITME: Integrating android permissioning support in the IDE Etx 2014 - Proceedings of the 2014 Acm Sigplan Workshop On Eclipse Technology Exchange, Part of Splash 2014. 15-20. DOI: 10.1145/2688130.2688135  0.319
2014 Shehab M, Mohsen F. Securing OAuth implementations in smart phones Codaspy 2014 - Proceedings of the 4th Acm Conference On Data and Application Security and Privacy. 167-169. DOI: 10.1145/2557547.2557588  0.413
2014 Cheek GP, Shehab M. Human effects of enhanced privacy management models Ieee Transactions On Dependable and Secure Computing. 11: 142-154. DOI: 10.1109/Tdsc.2013.34  0.421
2014 Shehab M, Mohsen F. Towards enhancing the security of OAuth implementations in smart phones Proceedings - 2014 Ieee 3rd International Conference On Mobile Services, Ms 2014. 39-46. DOI: 10.1109/MobServ.2014.15  0.42
2013 Mohsen F, Shehab M. Android keylogging threat Proceedings of the 9th Ieee International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2013. 545-552. DOI: 10.4108/icst.collaboratecom.2013.254209  0.328
2013 Sultana S, Shehab M, Bertino E. Secure provenance transmission for streaming data Ieee Transactions On Knowledge and Data Engineering. 25: 1890-1903. DOI: 10.1109/Tkde.2012.31  0.404
2013 Javed Y, Shehab M. Access control policy misconfiguration detection in online social networks Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 544-549. DOI: 10.1109/SocialCom.2013.82  0.328
2013 Shehab M, Ko M, Touati H. Enabling cross-site interactions in social networks Social Network Analysis and Mining. 3: 93-106. DOI: 10.1007/S13278-012-0051-2  0.361
2013 Xu W, Shehab M, Ahn GJ. Visualization-based policy analysis for SELinux: Framework and user study International Journal of Information Security. 12: 155-171. DOI: 10.1007/S10207-012-0180-7  0.339
2012 Marouf S, Shehab M. Towards improving browser extension permission management and user awareness Collaboratecom 2012 - Proceedings of the 8th International Conference On Collaborative Computing: Networking, Applications and Worksharing. 695-702. DOI: 10.4108/icst.collaboratecom.2012.250642  0.312
2012 Ahn GJ, Jin J, Shehab M. Policy-driven role-based access management for ad-hoc collaboration Journal of Computer Security. 20: 223-257. DOI: 10.3233/Jcs-2012-0446  0.481
2012 Cheek GP, Shehab M. Policy-by-example for online social networks Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 23-32. DOI: 10.1145/2295136.2295142  0.311
2012 Cheek GP, Shehab M. Privacy Management for online social networks Www'12 - Proceedings of the 21st Annual Conference On World Wide Web Companion. 475-476. DOI: 10.1145/2187980.2188084  0.336
2012 Rahman MA, Bai L, Shehab M, Al-Shaer E. Secure distributed solution for optimal energy consumption scheduling in smart grid Proc. of the 11th Ieee Int. Conference On Trust, Security and Privacy in Computing and Communications, Trustcom-2012 - 11th Ieee Int. Conference On Ubiquitous Computing and Communications, Iucc-2012. 279-286. DOI: 10.1109/TrustCom.2012.252  0.313
2012 Shehab M, Marouf S. Recommendation models for open authorization Ieee Transactions On Dependable and Secure Computing. 9: 583-595. DOI: 10.1109/Tdsc.2012.34  0.411
2012 Marouf SM, Shehab M, Desikan A. REM: A runtime browser extension manager with fine-grained access control 2012 10th Annual International Conference On Privacy, Security and Trust, Pst 2012. 231-232. DOI: 10.1109/PST.2012.6297947  0.37
2012 Shehab M, Squicciarini A, Ahn GJ, Kokkinou I. Access control for online social networks third party applications Computers and Security. 31: 897-911. DOI: 10.1016/J.Cose.2012.07.008  0.444
2012 Shehab M, Touati H. Semi-supervised policy recommendation for online social networks Proceedings of the 2012 Ieee/Acm International Conference On Advances in Social Networks Analysis and Mining, Asonam 2012. 360-367. DOI: 10.1007/S13278-016-0370-9  0.379
2011 Shehab M, Marouf S, Hudel C. ROAuth: Recommendation based open authorization Soups 2011 - Proceedings of the 7th Symposium On Usable Privacy and Security. DOI: 10.1145/2078827.2078842  0.322
2011 Marouf S, Shehab M, Squicciarini A, Sundareswaran S. Adaptive reordering and clustering-based framework for efficient XACML policy evaluation Ieee Transactions On Services Computing. 4: 300-313. DOI: 10.1109/Tsc.2010.28  0.33
2011 Cheek G, Shehab M, Ung T, Williams E. iLayer: Toward an application access control framework for content management systems Proceedings - 2011 Ieee International Symposium On Policies For Distributed Systems and Networks, Policy 2011. 65-72. DOI: 10.1109/POLICY.2011.28  0.35
2011 Ahn GJ, Shehab M, Squicciarini A. Security and privacy in social networks Ieee Internet Computing. 15: 10-12. DOI: 10.1109/Mic.2011.66  0.386
2010 Shehab M, Cheek G, Touati H, Squicciarini AC, Cheng PC. Learning based access control in online social networks Proceedings of the 19th International Conference On World Wide Web, Www '10. 1179-1180. DOI: 10.1145/1772690.1772863  0.321
2010 Shehab M, Cheek G, Touati H, Squicciarini AC, Cheng PC. User centric policy management in online social networks Proceedings - 2010 Ieee International Symposium On Policies For Distributed Systems and Networks, Policy 2010. 9-13. DOI: 10.1109/POLICY.2010.10  0.326
2010 Ko MN, Cheek GP, Shehab M, Sandhu R. Social-networks connect services Computer. 43: 37-43. DOI: 10.1109/Mc.2010.239  0.385
2009 Besmer A, Lipford HR, Shehab M, Cheek G. Social applications: Exploring a more secure framework Soups 2009 - Proceedings of the 5th Symposium On Usable Privacy and Security. DOI: 10.1145/1572532.1572535  0.35
2009 Ahn GJ, Ko M, Shehab M. Privacy-enhanced user-centric identity management Ieee International Conference On Communications. DOI: 10.1109/ICC.2009.5199363  0.304
2008 Shehab M, Ghafoor A, Bertino E. Secure collaboration in a mediator-free distributed environment Ieee Transactions On Parallel and Distributed Systems. 19: 1338-1351. DOI: 10.1109/Tpds.2008.26  0.59
2008 Shehab M, Bertino E, Ghafoor A. Watermarking relational databases using optimization based techniques Ieee Transactions On Knowledge and Data Engineering. 20. DOI: 10.1109/Tkde.2007.190668  0.52
2008 Shehab M, Bertino E, Ghafoor A. Proactive role discovery in mediator-free environments Proceedings - P2p'08, 8th International Conference On Peer-to-Peer Computing. 150-159. DOI: 10.1109/P2P.2008.52  0.356
2008 Shehab M, Squicciarini AC, Ahn GJ. Beyond user-to-user access control for online social networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5308: 174-189. DOI: 10.1007/978-3-540-88625-9-12  0.347
2008 Ahn GJ, Ko MN, Shehab M. Portable user-centric identity management Ifip International Federation For Information Processing. 278: 573-587. DOI: 10.1007/978-0-387-09699-5_37  0.313
2007 Shehab M, Bhattacharya K, Ghafoor A. Web services discovery in secure collaboration environments Acm Transactions On Internet Technology. 8. DOI: 10.1145/1294148.1294153  0.607
2007 Jin J, Ahn GJ, Shehab M, Hu H. Towards trust-aware access management for ad-hoc collaborations Proceedings of the 3rd International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2007. 41-48. DOI: 10.1109/COLCOM.2007.4553807  0.37
2006 Shehab M, Bertino E, Ghafoor A. Workflow authorisation in mediator-free environments International Journal of Security and Networks. 1: 2-12. DOI: 10.1504/Ijsn.2006.010819  0.529
2005 Shehab M, Bertino E, Ghafoor A. Secure collaboration in mediator-free environments Proceedings of the Acm Conference On Computer and Communications Security. 58-67. DOI: 10.1145/1102120.1102130  0.378
2005 Shehab M, Bertino E, Ghafoor A. SERAT: SEcure Role mApping Technique for decentralized secure interoperability Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 159-167. DOI: 10.1145/1063979.1064007  0.368
2005 Bhatti R, Shafiq B, Shehab M, Ghafoor A. Distributed access management in multimedia IDCs Computer. 38: 60-69. DOI: 10.1109/Mc.2005.296  0.62
Show low-probability matches.