Mohamed Shehab
Cited by
Cited by
Collective privacy management in social networks
AC Squicciarini, M Shehab, F Paci
Proceedings of the 18th international conference on World wide web, 521-530, 2009
Watermarking relational databases using optimization-based techniques
M Shehab, E Bertino, A Ghafoor
IEEE transactions on Knowledge and Data Engineering 20 (1), 116-129, 2007
Social-networks connect services
MN Ko, GP Cheek, M Shehab, R Sandhu
Computer 43 (8), 37-43, 2010
Privacy policies for shared content in social network sites
AC Squicciarini, M Shehab, J Wede
The VLDB Journal 19, 777-796, 2010
Social applications: exploring a more secure framework
A Besmer, HR Lipford, M Shehab, G Cheek
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-10, 2009
A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks
S Sultana, G Ghinita, E Bertino, M Shehab
IEEE transactions on dependable and secure computing 12 (3), 256-269, 2013
Secure provenance transmission for streaming data
S Sultana, M Shehab, E Bertino
IEEE Transactions on Knowledge and Data Engineering 25 (8), 1890-1903, 2012
A provenance based mechanism to identify malicious packet dropping adversaries in sensor networks
S Sultana, E Bertino, M Shehab
2011 31st International Conference on Distributed Computing Systems …, 2011
Secure collaboration in mediator-free environments
M Shehab, E Bertino, A Ghafoor
Proceedings of the 12th ACM conference on Computer and communications …, 2005
Investigating temporal access in a flipped classroom: procrastination persists
A AlJarrah, MK Thomas, M Shehab
International Journal of Educational Technology in Higher Education 15 (1), 1-18, 2018
Privacy-enhanced user-centric identity management
GJ Ahn, M Ko, M Shehab
2009 IEEE International Conference on Communications, 1-5, 2009
Security and privacy in social networks
GJ Ahn, M Shehab, A Squicciarini
IEEE Internet Computing 15 (3), 10-12, 2011
Adaptive reordering and clustering-based framework for efficient XACML policy evaluation
S Marouf, M Shehab, A Squicciarini, S Sundareswaran
IEEE Transactions on Services Computing 4 (4), 300-313, 2010
SERAT: SEcure role mApping technique for decentralized secure interoperability
M Shehab, E Bertino, A Ghafoor
Proceedings of the tenth ACM symposium on Access control models and …, 2005
A lightweight secure provenance scheme for wireless sensor networks
S Sultana, G Ghinita, E Bertino, M Shehab
2012 IEEE 18th International Conference on Parallel and Distributed Systems …, 2012
Access control for online social networks third party applications
M Shehab, A Squicciarini, GJ Ahn, I Kokkinou
computers & security 31 (8), 897-911, 2012
Reducing attack surface on Cordova-based hybrid mobile apps
M Shehab, A AlJarrah
Proceedings of the 2nd International Workshop on Mobile Development …, 2014
Towards enhancing the security of oauth implementations in smart phones
M Shehab, F Mohsen
2014 IEEE International Conference on Mobile Services, 39-46, 2014
Visualization based policy analysis: case study in selinux
W Xu, M Shehab, GJ Ahn
Proceedings of the 13th ACM symposium on Access control models and …, 2008
Policy-by-example for online social networks
GP Cheek, M Shehab
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20