Ida Sri Rejeki Siahaan

Orcid: 0000-0002-0827-6381

According to our database1, Ida Sri Rejeki Siahaan authored at least 15 papers between 2007 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Sniffing Serial-Based Substation Devices: A Complement to Security-Centric Data Collection.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Europe, 2021

Recommending Location for Placing Data Collector in the OPC Classic.
Proceedings of the 4th IEEE International Conference on Industrial Cyber-Physical Systems, 2021

2020
Real-time reasoning in OWL2 for GDPR compliance.
Artif. Intell., 2020

2016
Privacy modelling of sensitive data in universal healthcare coverage in Indonesia.
Proceedings of the 11th International Conference on Knowledge, 2016

2012
Relationship-based access control: its expression and enforcement through hybrid logic.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Relationship-based access control policies and their policy languages.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

2010
Security-by-Contract using Automata Modulo Theory.
PhD thesis, 2010

2009
Matching in security-by-contract for mobile code.
J. Log. Algebraic Methods Program., 2009

A Security Architecture for Web 2.0 Applications.
Proceedings of the Towards the Future Internet - A European Research Perspective, 2009

2008
Security-by-contract on the .NET platform.
Inf. Secur. Tech. Rep., 2008

Simulating midlet's security claims with automata modulo theory.
Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, 2008

Fast Signature Matching Using Extended Finite Automaton (XFA).
Proceedings of the Information Systems Security, 4th International Conference, 2008

Security-By-Contract for the Future Internet.
Proceedings of the Future Internet - FIS 2008, First Future Internet Symposium, 2008

Matching Policies with Security Claims of Mobile Applications.
Proceedings of the The Third International Conference on Availability, 2008

2007
Security-by-Contract: Toward a Semantics for Digital Signatures on Mobile Code.
Proceedings of the Public Key Infrastructure, 2007


  Loading...