Collective privacy management in social networks AC Squicciarini, M Shehab, F Paci Proceedings of the 18th international conference on World wide web, 521-530, 2009 | 306 | 2009 |
Watermarking relational databases using optimization-based techniques M Shehab, E Bertino, A Ghafoor IEEE transactions on Knowledge and Data Engineering 20 (1), 116-129, 2007 | 187 | 2007 |
Social-networks connect services MN Ko, GP Cheek, M Shehab, R Sandhu Computer 43 (8), 37-43, 2010 | 161 | 2010 |
Privacy policies for shared content in social network sites AC Squicciarini, M Shehab, J Wede The VLDB Journal 19, 777-796, 2010 | 133 | 2010 |
A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks S Sultana, G Ghinita, E Bertino, M Shehab IEEE transactions on dependable and secure computing 12 (3), 256-269, 2013 | 101 | 2013 |
Investigating temporal access in a flipped classroom: procrastination persists A AlJarrah, MK Thomas, M Shehab International Journal of Educational Technology in Higher Education 15 (1), 1-18, 2018 | 100 | 2018 |
Social applications: exploring a more secure framework A Besmer, HR Lipford, M Shehab, G Cheek Proceedings of the 5th Symposium on Usable Privacy and Security, 1-10, 2009 | 94 | 2009 |
Secure provenance transmission for streaming data S Sultana, M Shehab, E Bertino IEEE Transactions on Knowledge and Data Engineering 25 (8), 1890-1903, 2012 | 90 | 2012 |
A provenance based mechanism to identify malicious packet dropping adversaries in sensor networks S Sultana, E Bertino, M Shehab 2011 31st International Conference on Distributed Computing Systems …, 2011 | 89 | 2011 |
Privacy-enhanced user-centric identity management GJ Ahn, M Ko, M Shehab 2009 IEEE International Conference on Communications, 1-5, 2009 | 88 | 2009 |
Secure collaboration in mediator-free environments M Shehab, E Bertino, A Ghafoor Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 82 | 2005 |
Security and privacy in social networks GJ Ahn, M Shehab, A Squicciarini IEEE Internet Computing 15 (3), 10-12, 2011 | 74 | 2011 |
SERAT: SEcure role mApping technique for decentralized secure interoperability M Shehab, E Bertino, A Ghafoor Proceedings of the tenth ACM symposium on Access control models and …, 2005 | 68 | 2005 |
Adaptive reordering and clustering-based framework for efficient XACML policy evaluation S Marouf, M Shehab, A Squicciarini, S Sundareswaran IEEE Transactions on Services Computing 4 (4), 300-313, 2010 | 67 | 2010 |
Access control for online social networks third party applications M Shehab, A Squicciarini, GJ Ahn, I Kokkinou computers & security 31 (8), 897-911, 2012 | 59 | 2012 |
A lightweight secure provenance scheme for wireless sensor networks S Sultana, G Ghinita, E Bertino, M Shehab 2012 IEEE 18th International Conference on Parallel and Distributed Systems …, 2012 | 58 | 2012 |
Secure and private data aggregation for energy consumption scheduling in smart grids MA Rahman, MH Manshaei, E Al-Shaer, M Shehab IEEE Transactions on Dependable and Secure Computing 14 (2), 221-234, 2015 | 49 | 2015 |
Reducing attack surface on cordova-based hybrid mobile apps M Shehab, A AlJarrah Proceedings of the 2nd International Workshop on Mobile Development …, 2014 | 48 | 2014 |
Towards enhancing the security of oauth implementations in smart phones M Shehab, F Mohsen 2014 IEEE International Conference on Mobile Services, 39-46, 2014 | 44 | 2014 |
Developing a pilot e-mobile app for dementia caregiver support: Lessons learned B Davis, M Nies, M Shehab, D Shenk, P Alfonzo, T Shkraida, ... Online Journal of Nursing Informatics (OJNI) 18 (1), 13, 2014 | 44 | 2014 |