Amirreza Masoumzadeh

Orcid: 0000-0003-0647-7785

Affiliations:
  • University at Albany - State University of New York (SUNY Albany), USA
  • University of Pittsburgh, PA, USA (former)


According to our database1, Amirreza Masoumzadeh authored at least 31 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Converting Rule-Based Access Control Policies: From Complemented Conditions to Deny Rules.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

2023
Towards Automated Learning of Access Control Policies Enforced by Web Applications.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

2022
Learning Relationship-Based Access Control Policies from Black-Box Systems.
ACM Trans. Priv. Secur., 2022

On the Expressive Power of Negated Conditions and Negative Authorizations in Access Control Models.
Comput. Secur., 2022

BlueSky: Physical Access Control: Characteristics, Challenges, and Research Opportunities.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

Effective Evaluation of Relationship-Based Access Control Policy Mining.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

2021
Towards a Theory for Semantics and Expressiveness Analysis of Rule-Based Access Control Models.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

2020
The Panacea Threat Intelligence and Active Defense Platform.
CoRR, 2020

Active Learning of Relationship-Based Access Control Policies.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

Active Defense Against Social Engineering: The Case for Human Language Technology.
Proceedings of the Proceedings for the First International Workshop on Social Threats in Online Conversations: Understanding and Management, 2020

2019
Generalized Mining of Relationship-Based Access Control Policies in Evolving Systems.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

2018
Mining Positive and Negative Attribute-Based Access Control Policy Rules.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Security Analysis of Relationship-Based Access Control Policies.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Modeling Exposure in Online Social Networks.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

2016
Towards Measuring Knowledge Exposure in Online Social Networks.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

2015
Inferring Unknown Privacy Control Policies in a Social Networking System.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

2013
Top Location Anonymization for Geosocial Network Datasets.
Trans. Data Priv., 2013

Privacy settings in social networking systems: what you cannot control.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks.
IEEE Trans. Dependable Secur. Comput., 2012

A survey of security issue in multi-agent systems.
Artif. Intell. Rev., 2012

2011
An Alternative Approach to k-Anonymity for Location-Based Services.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

Ontology-based access control for social network systems.
Int. J. Inf. Priv. Secur. Integr., 2011

A secure, constraint-aware role-based access control interoperation framework.
Proceedings of the 5th International Conference on Network and System Security, 2011

Anonymizing geo-social network datasets.
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2011

2010
OSNAC: An Ontology-based Access Control Model for Social Networking Systems.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Preserving structural properties in anonymization of social networks.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users.
Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2009

2008
PuRBAC: Purpose-Aware Role-Based Access Control.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

RiBAC: Role Interaction Based Access Control Model for Community Computing.
Proceedings of the Collaborative Computing: Networking, 2008

2007
Conflict Detection and Resolution in Context-Aware Authorization.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Context-Aware Provisional Access Control.
Proceedings of the Information Systems Security, Second International Conference, 2006


  Loading...