Mohamed Shehab
Mohamed Shehab
E-mail confirmado em uncc.edu - Página inicial
Título
Citado por
Citado por
Ano
Collective privacy management in social networks
AC Squicciarini, M Shehab, F Paci
Proceedings of the 18th international conference on World wide web, 521-530, 2009
2692009
Watermarking relational databases using optimization-based techniques
M Shehab, E Bertino, A Ghafoor
IEEE transactions on Knowledge and Data Engineering 20 (1), 116-129, 2007
1562007
Social-networks connect services
MN Ko, GP Cheek, M Shehab, R Sandhu
Computer 43 (8), 37-43, 2010
1552010
Privacy policies for shared content in social network sites
AC Squicciarini, M Shehab, J Wede
The VLDB Journal 19 (6), 777-796, 2010
1212010
Social applications: exploring a more secure framework
A Besmer, HR Lipford, M Shehab, G Cheek
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-10, 2009
902009
A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks
S Sultana, G Ghinita, E Bertino, M Shehab
IEEE transactions on dependable and secure computing 12 (3), 256-269, 2013
842013
Secure collaboration in mediator-free environments
M Shehab, E Bertino, A Ghafoor
Proceedings of the 12th ACM conference on Computer and communications …, 2005
812005
Secure provenance transmission for streaming data
S Sultana, M Shehab, E Bertino
IEEE Transactions on Knowledge and Data Engineering 25 (8), 1890-1903, 2012
802012
A provenance based mechanism to identify malicious packet dropping adversaries in sensor networks
S Sultana, E Bertino, M Shehab
2011 31st International Conference on Distributed Computing Systems …, 2011
802011
Privacy-enhanced user-centric identity management
GJ Ahn, M Ko, M Shehab
2009 IEEE International Conference on Communications, 1-5, 2009
782009
SERAT: SEcure role mApping technique for decentralized secure interoperability
M Shehab, E Bertino, A Ghafoor
Proceedings of the tenth ACM symposium on Access control models and …, 2005
702005
Adaptive reordering and clustering-based framework for efficient XACML policy evaluation
S Marouf, M Shehab, A Squicciarini, S Sundareswaran
IEEE Transactions on Services Computing 4 (4), 300-313, 2010
632010
Security and privacy in social networks
GJ Ahn, M Shehab, A Squicciarini
IEEE Internet Computing 15 (3), 10-12, 2011
592011
Access control for online social networks third party applications
M Shehab, A Squicciarini, GJ Ahn, I Kokkinou
computers & security 31 (8), 897-911, 2012
572012
Investigating temporal access in a flipped classroom: procrastination persists
A AlJarrah, MK Thomas, M Shehab
International Journal of Educational Technology in Higher Education 15 (1), 1-18, 2018
522018
A lightweight secure provenance scheme for wireless sensor networks
S Sultana, G Ghinita, E Bertino, M Shehab
2012 IEEE 18th International Conference on Parallel and Distributed Systems …, 2012
492012
Reducing attack surface on Cordova-based hybrid mobile apps
M Shehab, A AlJarrah
Proceedings of the 2nd International Workshop on Mobile Development …, 2014
422014
Policy-by-example for online social networks
GP Cheek, M Shehab
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
382012
Visualization based policy analysis: case study in selinux
W Xu, M Shehab, GJ Ahn
Proceedings of the 13th ACM Symposium on Access control models and …, 2008
382008
Towards enhancing the security of oauth implementations in smart phones
M Shehab, F Mohsen
2014 IEEE International Conference on Mobile Services, 39-46, 2014
352014
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20