Osnac: An ontology-based access control model for social networking systems A Masoumzadeh, J Joshi 2010 IEEE Second International Conference on Social Computing, 751-759, 2010 | 90 | 2010 |
A survey of security issue in multi-agent systems Y Jung, M Kim, A Masoumzadeh, JBD Joshi Artificial Intelligence Review 37, 239-260, 2012 | 77 | 2012 |
PuRBAC: Purpose-aware role-based access control A Masoumzadeh, JBD Joshi OTM Confederated International Conferences" On the Move to Meaningful …, 2008 | 62 | 2008 |
Mining positive and negative attribute-based access control policy rules P Iyer, A Masoumzadeh Proceedings of the 23nd ACM on Symposium on Access Control Models and …, 2018 | 59 | 2018 |
Ontology-based access control for social network systems A Masoumzadeh, J Joshi International Journal of Information Privacy, Security and Integrity 1 (1 …, 2011 | 38 | 2011 |
Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks A Masoumzadeh, J Joshi IEEE Transactions on Dependable and Secure Computing 9 (6), 877-889, 2012 | 35 | 2012 |
Conflict detection and resolution in context-aware authorization A Masoumzadeh, M Amini, R Jalili 21st International Conference on Advanced Information Networking and …, 2007 | 33 | 2007 |
Generalized mining of relationship-based access control policies in evolving systems P Iyer, A Masoumzadeh Proceedings of the 24th ACM Symposium on Access Control Models and …, 2019 | 21 | 2019 |
An alternative approach to k-anonymity for location-based services A Masoumzadeh, J Joshi Procedia Computer Science 5, 522-530, 2011 | 20 | 2011 |
Privacy settings in social networking systems: What you cannot control A Masoumzadeh, J Joshi Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 19 | 2013 |
Active learning of relationship-based access control policies P Iyer, A Masoumzadeh Proceedings of the 25th ACM Symposium on Access Control Models and …, 2020 | 18 | 2020 |
A secure, constraint-aware role-based access control interoperation framework N Baracaldo, A Masoumzadeh, J Joshi 2011 5th International Conference on Network and System Security, 200-207, 2011 | 18 | 2011 |
Context-aware provisional access control A Masoumzadeh, M Amini, R Jalili Information Systems Security, 132-146, 2006 | 16 | 2006 |
Top Location Anonymization for Geosocial Network Datasets. A Masoumzadeh, J Joshi Trans. Data Priv. 6 (1), 107-126, 2013 | 15 | 2013 |
Anonymizing geo-social network datasets A Masoumzadeh, J Joshi Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and …, 2011 | 14 | 2011 |
Active defense against social engineering: The case for human language technology A Dalton, E Aghaei, E Al-Shaer, A Bhatia, E Castillo, Z Cheng, ... Proceedings for the First International Workshop on Social Threats in Online …, 2020 | 12 | 2020 |
LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users A Masoumzadeh, J Joshi, HA Karimi Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances …, 2009 | 9 | 2009 |
Security analysis of relationship-based access control policies A Masoumzadeh Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 8 | 2018 |
Preserving structural properties in anonymization of social networks A Masoumzadeh, J Joshi 6th International Conference on Collaborative Computing: Networking …, 2010 | 8 | 2010 |
The panacea threat intelligence and active defense platform A Dalton, E Aghaei, E Al-Shaer, A Bhatia, E Castillo, Z Cheng, ... arXiv preprint arXiv:2004.09662, 2020 | 7 | 2020 |