Ensuring distributed accountability for data sharing in the cloud S Sundareswaran, A Squicciarini, D Lin
IEEE transactions on dependable and secure computing 9 (4), 556-568, 2012
288 2012 A brokerage-based approach for cloud service selection S Sundareswaran, A Squicciarini, D Lin
2012 IEEE Fifth International Conference on Cloud Computing, 558-565, 2012
247 2012 Privacy policy inference of user-uploaded images on content sharing sites AC Squicciarini, D Lin, S Sundareswaran, J Wede
IEEE transactions on knowledge and data engineering 27 (1), 193-206, 2014
130 2014 A3p: adaptive policy prediction for shared images over popular content sharing sites AC Squicciarini, S Sundareswaran, D Lin, J Wede
Proceedings of the 22nd ACM conference on Hypertext and hypermedia, 261-270, 2011
112 2011 Preventing information leakage from indexing in the cloud A Squicciarini, S Sundareswaran, D Lin
2010 IEEE 3rd International Conference on Cloud Computing, 188-195, 2010
112 2010 Promoting distributed accountability in the cloud S Sundareswaran, A Squicciarini, D Lin, S Huang
2011 IEEE 4th International Conference on Cloud Computing, 113-120, 2011
85 2011 Adaptive reordering and clustering-based framework for efficient XACML policy evaluation S Marouf, M Shehab, A Squicciarini, S Sundareswaran
IEEE Transactions on Services Computing 4 (4), 300-313, 2010
69 2010 A cloud brokerage architecture for efficient cloud service selection D Lin, AC Squicciarini, VN Dondapati, S Sundareswaran
IEEE Transactions on Services Computing 12 (1), 144-157, 2016
56 2016 PriMa: an effective privacy protection mechanism for social networks A Squicciarini, F Paci, S Sundareswaran
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
55 2010 PriMa: a comprehensive approach to privacy protection in social network sites AC Squicciarini, F Paci, S Sundareswaran
annals of telecommunications-annales des télécommunications 69, 21-36, 2014
47 2014 MMB -Tree: Authenticated Index for Verifiable Cloud Service Selection J Li, AC Squicciarini, D Lin, S Sundareswaran, C Jia
IEEE Transactions on Dependable and Secure computing 14 (2), 185-198, 2015
33 2015 Detecting malicious co-resident virtual machines indulging in load-based attacks S Sundareswaran, AC Squcciarini
Information and Communications Security: 15th International Conference …, 2013
33 2013 Statistics & clustering based framework for efficient XACML policy evaluation S Marouf, M Shehab, A Squicciarini, S Sundareswaran
2009 IEEE International Symposium on Policies for Distributed Systems and …, 2009
27 2009 Towards a game theoretical model for identity validation in social network sites AC Squicciarini, C Griffin, S Sundareswaran
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
17 2011 Web-traveler policies for images on social networks AC Squicciarini, S Sundareswaran
World wide web 12, 461-484, 2009
17 2009 Methods and systems of performing tamper-evident logging using block lattices TM Dierks, I Roxborough, S Thompson, M Kaczorowski, ...
US Patent App. 15/712,243, 2018
15 2018 XSS-Dec: A hybrid solution to mitigate cross-site scripting attacks S Sundareswaran, AC Squicciarini
IFIP Annual Conference on Data and Applications Security and Privacy, 223-238, 2012
15 2012 Image repurposing for gifar-based attacks S Sundareswaran, A Squicciarini
Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, 2010
4 2010 GABE: A cloud brokerage system for service selection, accountability and enforcement S Sundareswaran
The Pennsylvania State University, 2014
3 2014 Decore: Detecting content repurposing attacks on clients’ systems S Sundareswaran, AC Squicciarini
Security and Privacy in Communication Networks: 6th Iternational ICST …, 2010
3 2010