Mohamed Shehab
Cited by
Cited by
Collective privacy management in social networks
AC Squicciarini, M Shehab, F Paci
Proceedings of the 18th international conference on World wide web, 521-530, 2009
Watermarking relational databases using optimization-based techniques
M Shehab, E Bertino, A Ghafoor
IEEE transactions on Knowledge and Data Engineering 20 (1), 116-129, 2007
Social-networks connect services
MN Ko, GP Cheek, M Shehab, R Sandhu
Computer 43 (8), 37-43, 2010
Privacy policies for shared content in social network sites
AC Squicciarini, M Shehab, J Wede
The VLDB Journal 19, 777-796, 2010
A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks
S Sultana, G Ghinita, E Bertino, M Shehab
IEEE transactions on dependable and secure computing 12 (3), 256-269, 2013
Investigating temporal access in a flipped classroom: procrastination persists
A AlJarrah, MK Thomas, M Shehab
International Journal of Educational Technology in Higher Education 15 (1), 1-18, 2018
Social applications: exploring a more secure framework
A Besmer, HR Lipford, M Shehab, G Cheek
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-10, 2009
Secure provenance transmission for streaming data
S Sultana, M Shehab, E Bertino
IEEE Transactions on Knowledge and Data Engineering 25 (8), 1890-1903, 2012
A provenance based mechanism to identify malicious packet dropping adversaries in sensor networks
S Sultana, E Bertino, M Shehab
2011 31st International Conference on Distributed Computing Systems …, 2011
Privacy-enhanced user-centric identity management
GJ Ahn, M Ko, M Shehab
2009 IEEE International Conference on Communications, 1-5, 2009
Secure collaboration in mediator-free environments
M Shehab, E Bertino, A Ghafoor
Proceedings of the 12th ACM conference on Computer and communications …, 2005
Security and privacy in social networks
GJ Ahn, M Shehab, A Squicciarini
IEEE Internet Computing 15 (3), 10-12, 2011
SERAT: SEcure role mApping technique for decentralized secure interoperability
M Shehab, E Bertino, A Ghafoor
Proceedings of the tenth ACM symposium on Access control models and …, 2005
Adaptive reordering and clustering-based framework for efficient XACML policy evaluation
S Marouf, M Shehab, A Squicciarini, S Sundareswaran
IEEE Transactions on Services Computing 4 (4), 300-313, 2010
Access control for online social networks third party applications
M Shehab, A Squicciarini, GJ Ahn, I Kokkinou
computers & security 31 (8), 897-911, 2012
A lightweight secure provenance scheme for wireless sensor networks
S Sultana, G Ghinita, E Bertino, M Shehab
2012 IEEE 18th International Conference on Parallel and Distributed Systems …, 2012
Secure and private data aggregation for energy consumption scheduling in smart grids
MA Rahman, MH Manshaei, E Al-Shaer, M Shehab
IEEE Transactions on Dependable and Secure Computing 14 (2), 221-234, 2015
Reducing attack surface on cordova-based hybrid mobile apps
M Shehab, A AlJarrah
Proceedings of the 2nd International Workshop on Mobile Development …, 2014
Towards enhancing the security of oauth implementations in smart phones
M Shehab, F Mohsen
2014 IEEE International Conference on Mobile Services, 39-46, 2014
Developing a pilot e-mobile app for dementia caregiver support: Lessons learned
B Davis, M Nies, M Shehab, D Shenk, P Alfonzo, T Shkraida, ...
Online Journal of Nursing Informatics (OJNI) 18 (1), 13, 2014
The system can't perform the operation now. Try again later.
Articles 1–20