Ida Siahaan
Ida Siahaan
Canadian Institute of Cyber Security
Verified email at unb.ca - Homepage
Title
Cited by
Cited by
Year
Relationship-based access control policies and their policy languages
PWL Fong, I Siahaan
Proceedings of the 16th ACM symposium on Access control models and …, 2011
1142011
Relationship-based access control: its expression and enforcement through hybrid logic
G Bruns, PWL Fong, I Siahaan, M Huth
Proceedings of the second ACM conference on Data and Application Security …, 2012
882012
Security-by-contract: Toward a semantics for digital signatures on mobile code
N Dragoni, F Massacci, K Naliuka, I Siahaan
European Public Key Infrastructure Workshop, 297-312, 2007
842007
Security-by-contract on the. net platform
L Desmet, W Joosen, F Massacci, P Philippaerts, F Piessens, I Siahaan, ...
Information Security Technical Report 13 (1), 25-32, 2008
792008
Matching midlet’s security claims with a platform security policy using automata modulo theory
F Massacci, I Siahaan
Proc. of The 12th Nordic Workshop on Secure IT Systems (NordSec’07), 2007
272007
Matching in security-by-contract for mobile code
N Bielova, N Dragoni, F Massacci, K Naliuka, I Siahaan
The Journal of Logic and Algebraic Programming 78 (5), 340-358, 2009
232009
Fast signature matching using extended finite automaton (XFA)
R Smith, C Estan, S Jha, I Siahaan
International Conference on Information Systems Security, 158-172, 2008
232008
Simulating midlet's security claims with automata modulo theory
F Massacci, ISR Siahaan
Proceedings of the third ACM SIGPLAN workshop on Programming languages and …, 2008
122008
Matching policies with security claims of mobile applications
N Bielova, M Dalla Torre, N Dragoni, I Siahaan
Availability, Reliability and Security, 2008. ARES 08. Third International …, 2008
112008
Testing decision procedures for security-by-contract
N Bielova, I Siahaan
Joint Workshop on Foundations of Computer Security, Automated Reasoning for …, 2008
52008
A Security Architecture for Web 2.0 Applications.
L Desmet, W Joosen, F Massacci, K Naliuka, P Philippaerts, F Piessens, ...
Future Internet Assembly, 35-46, 2009
42009
Security-by-contract for the future internet
F Massacci, F Piessens, I Siahaan
Future Internet Symposium, 29-43, 2008
42008
Secure Routing in Wireless Sensor Networks
I Siahaan, L Fernandes
University of Trento http://dit. unitn. it/~ fernand/downloads/IWSNSlides. pdf, 2008
42008
Optimizing IRM with Automata Modulo Theory⋆
F Massacci, I Siahaan
Proceedings of the 5th International Workshop on Security and Trust …, 2009
22009
Secure Routing in Wireless Sensor Networks
LL Fernandes, ISR Siahaan, R Passarone
22007
Security-by-Contract using Automata Modulo Theory
ISR Siahaan
University of Trento, 2010
2010
Inclusion Matching Implementation of Automata Modulo Theory (AMT)
F Massacci, I Siahaan
2009
Automata Modulo Theory (AMT)
F Massacci, I Siahaan
University of Trento, 2009
2009
Automata Modulo Theory (AMT)
F Massacci, I Siahaan
University of Trento, 2009
2009
Discrete Real-Time And Quantitative Temporal Analysis
ISR Siahaan
2005
The system can't perform the operation now. Try again later.
Articles 1–20