Year |
Citation |
Score |
2020 |
Javed Y, Salehin KM, Shehab M. A Study of South Asian Websites on Privacy Compliance Ieee Access. 8: 156067-156083. DOI: 10.1109/Access.2020.3019334 |
0.306 |
|
2017 |
Rahman MA, Manshaei MH, Al-Shaer E, Shehab M. Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids Ieee Transactions On Dependable and Secure Computing. 14: 221-234. DOI: 10.1109/Tdsc.2015.2446492 |
0.463 |
|
2015 |
Davis BH, Shehab M, Shenk D, Nies M. E-mobile pilot for community-based dementia caregivers identifies desire for security Gerontechnology. 13: 332-336. DOI: 10.4017/Gt.2015.13.3.003.00 |
0.324 |
|
2015 |
Sultana S, Ghinita G, Bertino E, Shehab M. A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks Ieee Transactions On Dependable and Secure Computing. 12: 256-269. DOI: 10.1109/Tdsc.2013.44 |
0.351 |
|
2014 |
Shehab M, Aljarrah A. Reducing attack surface on cordova-based hybrid mobile apps Mobiledeli 2014 - Proceedings of the 2nd International Workshop On Mobile Development Lifecycle, Part of Splash 2014. 1-8. DOI: 10.1145/2688412.2688417 |
0.324 |
|
2014 |
Bello-Ogunu E, Shehab M. PERMITME: Integrating android permissioning support in the IDE Etx 2014 - Proceedings of the 2014 Acm Sigplan Workshop On Eclipse Technology Exchange, Part of Splash 2014. 15-20. DOI: 10.1145/2688130.2688135 |
0.319 |
|
2014 |
Shehab M, Mohsen F. Securing OAuth implementations in smart phones Codaspy 2014 - Proceedings of the 4th Acm Conference On Data and Application Security and Privacy. 167-169. DOI: 10.1145/2557547.2557588 |
0.413 |
|
2014 |
Cheek GP, Shehab M. Human effects of enhanced privacy management models Ieee Transactions On Dependable and Secure Computing. 11: 142-154. DOI: 10.1109/Tdsc.2013.34 |
0.421 |
|
2014 |
Shehab M, Mohsen F. Towards enhancing the security of OAuth implementations in smart phones Proceedings - 2014 Ieee 3rd International Conference On Mobile Services, Ms 2014. 39-46. DOI: 10.1109/MobServ.2014.15 |
0.42 |
|
2013 |
Mohsen F, Shehab M. Android keylogging threat Proceedings of the 9th Ieee International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2013. 545-552. DOI: 10.4108/icst.collaboratecom.2013.254209 |
0.328 |
|
2013 |
Sultana S, Shehab M, Bertino E. Secure provenance transmission for streaming data Ieee Transactions On Knowledge and Data Engineering. 25: 1890-1903. DOI: 10.1109/Tkde.2012.31 |
0.404 |
|
2013 |
Javed Y, Shehab M. Access control policy misconfiguration detection in online social networks Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 544-549. DOI: 10.1109/SocialCom.2013.82 |
0.328 |
|
2013 |
Shehab M, Ko M, Touati H. Enabling cross-site interactions in social networks Social Network Analysis and Mining. 3: 93-106. DOI: 10.1007/S13278-012-0051-2 |
0.361 |
|
2013 |
Xu W, Shehab M, Ahn GJ. Visualization-based policy analysis for SELinux: Framework and user study International Journal of Information Security. 12: 155-171. DOI: 10.1007/S10207-012-0180-7 |
0.339 |
|
2012 |
Marouf S, Shehab M. Towards improving browser extension permission management and user awareness Collaboratecom 2012 - Proceedings of the 8th International Conference On Collaborative Computing: Networking, Applications and Worksharing. 695-702. DOI: 10.4108/icst.collaboratecom.2012.250642 |
0.312 |
|
2012 |
Ahn GJ, Jin J, Shehab M. Policy-driven role-based access management for ad-hoc collaboration Journal of Computer Security. 20: 223-257. DOI: 10.3233/Jcs-2012-0446 |
0.481 |
|
2012 |
Cheek GP, Shehab M. Policy-by-example for online social networks Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 23-32. DOI: 10.1145/2295136.2295142 |
0.311 |
|
2012 |
Cheek GP, Shehab M. Privacy Management for online social networks Www'12 - Proceedings of the 21st Annual Conference On World Wide Web Companion. 475-476. DOI: 10.1145/2187980.2188084 |
0.336 |
|
2012 |
Rahman MA, Bai L, Shehab M, Al-Shaer E. Secure distributed solution for optimal energy consumption scheduling in smart grid Proc. of the 11th Ieee Int. Conference On Trust, Security and Privacy in Computing and Communications, Trustcom-2012 - 11th Ieee Int. Conference On Ubiquitous Computing and Communications, Iucc-2012. 279-286. DOI: 10.1109/TrustCom.2012.252 |
0.313 |
|
2012 |
Shehab M, Marouf S. Recommendation models for open authorization Ieee Transactions On Dependable and Secure Computing. 9: 583-595. DOI: 10.1109/Tdsc.2012.34 |
0.411 |
|
2012 |
Marouf SM, Shehab M, Desikan A. REM: A runtime browser extension manager with fine-grained access control 2012 10th Annual International Conference On Privacy, Security and Trust, Pst 2012. 231-232. DOI: 10.1109/PST.2012.6297947 |
0.37 |
|
2012 |
Shehab M, Squicciarini A, Ahn GJ, Kokkinou I. Access control for online social networks third party applications Computers and Security. 31: 897-911. DOI: 10.1016/J.Cose.2012.07.008 |
0.444 |
|
2012 |
Shehab M, Touati H. Semi-supervised policy recommendation for online social networks Proceedings of the 2012 Ieee/Acm International Conference On Advances in Social Networks Analysis and Mining, Asonam 2012. 360-367. DOI: 10.1007/S13278-016-0370-9 |
0.379 |
|
2011 |
Shehab M, Marouf S, Hudel C. ROAuth: Recommendation based open authorization Soups 2011 - Proceedings of the 7th Symposium On Usable Privacy and Security. DOI: 10.1145/2078827.2078842 |
0.322 |
|
2011 |
Marouf S, Shehab M, Squicciarini A, Sundareswaran S. Adaptive reordering and clustering-based framework for efficient XACML policy evaluation Ieee Transactions On Services Computing. 4: 300-313. DOI: 10.1109/Tsc.2010.28 |
0.33 |
|
2011 |
Cheek G, Shehab M, Ung T, Williams E. iLayer: Toward an application access control framework for content management systems Proceedings - 2011 Ieee International Symposium On Policies For Distributed Systems and Networks, Policy 2011. 65-72. DOI: 10.1109/POLICY.2011.28 |
0.35 |
|
2011 |
Ahn GJ, Shehab M, Squicciarini A. Security and privacy in social networks Ieee Internet Computing. 15: 10-12. DOI: 10.1109/Mic.2011.66 |
0.386 |
|
2010 |
Shehab M, Cheek G, Touati H, Squicciarini AC, Cheng PC. Learning based access control in online social networks Proceedings of the 19th International Conference On World Wide Web, Www '10. 1179-1180. DOI: 10.1145/1772690.1772863 |
0.321 |
|
2010 |
Shehab M, Cheek G, Touati H, Squicciarini AC, Cheng PC. User centric policy management in online social networks Proceedings - 2010 Ieee International Symposium On Policies For Distributed Systems and Networks, Policy 2010. 9-13. DOI: 10.1109/POLICY.2010.10 |
0.326 |
|
2010 |
Ko MN, Cheek GP, Shehab M, Sandhu R. Social-networks connect services Computer. 43: 37-43. DOI: 10.1109/Mc.2010.239 |
0.385 |
|
2009 |
Besmer A, Lipford HR, Shehab M, Cheek G. Social applications: Exploring a more secure framework Soups 2009 - Proceedings of the 5th Symposium On Usable Privacy and Security. DOI: 10.1145/1572532.1572535 |
0.35 |
|
2009 |
Ahn GJ, Ko M, Shehab M. Privacy-enhanced user-centric identity management Ieee International Conference On Communications. DOI: 10.1109/ICC.2009.5199363 |
0.304 |
|
2008 |
Shehab M, Ghafoor A, Bertino E. Secure collaboration in a mediator-free distributed environment Ieee Transactions On Parallel and Distributed Systems. 19: 1338-1351. DOI: 10.1109/Tpds.2008.26 |
0.59 |
|
2008 |
Shehab M, Bertino E, Ghafoor A. Watermarking relational databases using optimization based techniques Ieee Transactions On Knowledge and Data Engineering. 20. DOI: 10.1109/Tkde.2007.190668 |
0.52 |
|
2008 |
Shehab M, Bertino E, Ghafoor A. Proactive role discovery in mediator-free environments Proceedings - P2p'08, 8th International Conference On Peer-to-Peer Computing. 150-159. DOI: 10.1109/P2P.2008.52 |
0.356 |
|
2008 |
Shehab M, Squicciarini AC, Ahn GJ. Beyond user-to-user access control for online social networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5308: 174-189. DOI: 10.1007/978-3-540-88625-9-12 |
0.347 |
|
2008 |
Ahn GJ, Ko MN, Shehab M. Portable user-centric identity management Ifip International Federation For Information Processing. 278: 573-587. DOI: 10.1007/978-0-387-09699-5_37 |
0.313 |
|
2007 |
Shehab M, Bhattacharya K, Ghafoor A. Web services discovery in secure collaboration environments Acm Transactions On Internet Technology. 8. DOI: 10.1145/1294148.1294153 |
0.607 |
|
2007 |
Jin J, Ahn GJ, Shehab M, Hu H. Towards trust-aware access management for ad-hoc collaborations Proceedings of the 3rd International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2007. 41-48. DOI: 10.1109/COLCOM.2007.4553807 |
0.37 |
|
2006 |
Shehab M, Bertino E, Ghafoor A. Workflow authorisation in mediator-free environments International Journal of Security and Networks. 1: 2-12. DOI: 10.1504/Ijsn.2006.010819 |
0.529 |
|
2005 |
Shehab M, Bertino E, Ghafoor A. Secure collaboration in mediator-free environments Proceedings of the Acm Conference On Computer and Communications Security. 58-67. DOI: 10.1145/1102120.1102130 |
0.378 |
|
2005 |
Shehab M, Bertino E, Ghafoor A. SERAT: SEcure Role mApping Technique for decentralized secure interoperability Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 159-167. DOI: 10.1145/1063979.1064007 |
0.368 |
|
2005 |
Bhatti R, Shafiq B, Shehab M, Ghafoor A. Distributed access management in multimedia IDCs Computer. 38: 60-69. DOI: 10.1109/Mc.2005.296 |
0.62 |
|
Show low-probability matches. |