According to our database1, Basit Shafiq authored at least 57 papers between 2001 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Discovering Events from Social Media for Emergency Planning.
Proceedings of the 20th Annual International Conference on Digital Government Research, 2019
Differentially Private Outlier Detection in a Collaborative Environment.
Int. J. Cooperative Inf. Syst., 2018
ASSEMBLE: a collaborative business process development tool.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
Emergency response plan recommendation and composition system (ERPRCS).
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018
Composability Verification of Multi-Service Workflows in a Policy-Driven Cloud Computing Environment.
IEEE Trans. Dependable Secur. Comput., 2017
Secure and Efficient k-NN Queries.
Proceedings of the ICT Systems Security and Privacy Protection, 2017
A Scalable Privacy-preserving Data Generation Methodology for Exploratory Analysis.
Proceedings of the AMIA 2017, 2017
Big Data-based Smart City Platform: Real-Time Crime Analysis.
Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, 2016
Collaborative Differentially Private Outlier Detection for Categorical Data.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Preserving Privacy in Collaborative Business Process Composition.
Proceedings of the SECRYPT 2015, 2015
A Framework for Policy Similarity Evaluation and Migration Based on Change Detection.
Proceedings of the Network and System Security - 9th International Conference, 2015
A Privacy-Sensitive Collaborative Approach to Business Process Development.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015
A Random Decision Tree Framework for Privacy-Preserving Data Mining.
IEEE Trans. Dependable Secur. Comput., 2014
Enhancing the government service experience through QR codes on mobile platforms.
Gov. Inf. Q., 2014
Teaching privacy in an interactive fashion.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014
Utilizing social media to improve local government responsiveness.
Proceedings of the 15th Annual International Conference on Digital Government Research, 2014
Differentially Private Naive Bayes Classification.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013
Incorporating Privacy into the Undergraduate Curriculum.
Proceedings of the 2013 Information Security Curriculum Development Conference, 2013
Community based emergency response.
Proceedings of the 14th Annual International Conference on Digital Government Research, 2013
Structure-aware graph anonymization.
Web Intell. Agent Syst., 2012
Semantics-Based Automated Service Discovery.
IEEE Trans. Serv. Comput., 2012
Spatial Computing and Social Media in the Context of Disaster Management.
IEEE Intell. Syst., 2012
Privacy Preserving Maximum-Flow Computation in Distributed Graphs.
Proceedings of the 2012 International Conference on Privacy, 2012
Risk Based Access Control Using Classification.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012
A framework for verification and optimal reconfiguration of event-driven role based access control policies.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Using QR codes for enhancing the scope of digital government services.
Proceedings of the 13th Annual International Conference on Digital Government Research, 2012
Privacy-Preserving Subgraph Discovery.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Secure composition of cascaded Web services.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Privacy-Preserving Tabu Search for Distributed Graph Coloring.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
UICDS-based information sharing among emergency response application systems.
Proceedings of the 12th Annual International Conference on Digital Government Research, 2011
Privacy Preserving Integration of Health Care Data.
Int. J. Comput. Model. Algorithms Medicine, 2010
Reachability Analysis in Privacy-Preserving Perturbed Graphs.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010
Privacy-preserving trust verification.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
UICDS compliant resource management system for emergency response.
Proceedings of the 11th Annual International Conference on Digital Government Research, 2010
Preserving Privacy in Social Networks: A Structure-Aware Approach.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009
Efficient Privacy-Preserving Link Discovery.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009
Privacy-preserving link discovery.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Secure information sharing and analysis for effective emergency management.
Proceedings of the 9th Annual International Conference on Digital Government Research, 2008
Secure Information Sharing in a Virtual Multi-Agency Team Environment.
Electron. Notes Theor. Comput. Sci., 2007
A QoS framework for multimedia applications in mobile ad hoc networks.
Comput. Syst. Sci. Eng., 2007
Policy based Web Service Orchestration and Goal Reachability Analysis using MSC and CP Nets.
Proceedings of the 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, 2007
Approach for Discovering and Handling Crisis in a Service-Oriented Environment.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
A QoS Framewor kfor Multimedia Communication for Wireless Mobile Ad Hoc Defense Networks.
Proceedings of the Handbook of Mobile Middleware., 2006
Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints.
Proceedings of the 22nd International Conference on Data Engineering, 2006
Secure Interoperation in a Multidomain Environment Employing RBAC Policies.
IEEE Trans. Knowl. Data Eng., 2005
X-gtrbac admin: A decentralized administration model for enterprise-wide access control.
ACM Trans. Inf. Syst. Secur., 2005
Distributed Access Management in Multimedia IDCs.
IEEE Computer, 2005
A Role-Based Access Control Policy Verification Framework for Real-Time Systems.
Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005), 2005
A GTRBAC Based System for Dynamic Workflow Composition and Management.
Proceedings of the Eighth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2005), 2005
Access control management in a distributed environment supporting dynamic collaboration.
Proceedings of the 2005 Workshop on Digital Identity Management, 2005
Wireless network resource management for Web-based multimedia document services.
IEEE Communications Magazine, 2003
Provision of Multimedia Services in a Mobile Ad Hoc Network.
Proceedings of the 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 2003
Dependencies and separation of duty constraints in GTRBAC.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
A model for secure multimedia document database system in a distributed environment.
IEEE Trans. Multimedia, 2002
Real-Time Resource Reservation for Synchronized Multimedia Object over Wireless LAN.
Proceedings of the 5th International Symposiun on Object Oriented Real-Time Distributed Computing, 2002
Distributed web-based framework for real-time multimedia object communication.
Comput. Syst. Sci. Eng., 2001