Mohamed Shehab

According to our database1, Mohamed Shehab authored at least 76 papers between 2005 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Mobile Users as Advertisers: User Perceptions of Product Sensitivity, Exposure, and Public Influence.
Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia, 2018

CordovaConfig: A Tool for Mobile Hybrid Apps' Configuration.
Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia, 2018

2017
Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids.
IEEE Trans. Dependable Sec. Comput., 2017

Look before you Authorize: Using Eye-Tracking to Enforce User Attention towards Application Permissions.
PoPETs, 2017

Towards Improving Comprehension of Touch ID Authentication with Smartphone Applications.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

The Design of Cyber Threat Hunting Games: A Case Study.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Proposing and Testing New Security Cue Designs for OAuth-WebView-Embedded Mobile Applications.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration Model.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Semi-supervised policy recommendation for online social networks.
Social Netw. Analys. Mining, 2016

Crowdsourcing for Context: Regarding Privacy in Beacon Encounters via Contextual Integrity.
PoPETs, 2016

A Methodology for Prevention of Biometric Presentation Attacks.
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016

Investigating the Animation of Application Permission Dialogs: A Case Study of Facebook.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Maintaining User Interface Integrity on Android.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

The Listening Patterns to System Events by Benign and Malicious Android Apps.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Hardening the OAuth-WebView Implementations in Android Applications by Re-Factoring the Chromium Library.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

2015
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks.
IEEE Trans. Dependable Sec. Comput., 2015

Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

2014
Human Effects of Enhanced Privacy Management Models.
IEEE Trans. Dependable Sec. Comput., 2014

Reducing Attack Surface on Cordova-based Hybrid Mobile Apps.
Proceedings of the 2nd International Workshop on Mobile Development Lifecycle, 2014

Towards Enhancing the Security of OAuth Implementations in Smart Phones.
Proceedings of the IEEE Third International Conference on Mobile Services, Anchorage, AK, USA, June 27, 2014

PERMITME: integrating android permissioning support in the IDE.
Proceedings of the 2014 Workshop on Eclipse Technology eXchange, 2014

Securing OAuth implementations in smart phones.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

POSTER: Android System Broadcast Actions Broadcasts Your Privacy.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Secure Provenance Transmission for Streaming Data.
IEEE Trans. Knowl. Data Eng., 2013

Enabling cross-site interactions in social networks.
Social Netw. Analys. Mining, 2013

Visualization-based policy analysis for SELinux: framework and user study.
Int. J. Inf. Sec., 2013

Optimizing search for malware by hashing smaller amounts of data.
Proceedings of the 2013 World Congress on Internet Security, 2013

Access Control Policy Misconfiguration Detection in Online Social Networks.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Android keylogging threat.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Game-theoretic approach for user migration in Diaspora.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

Usable object management approaches for online social networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Recommendation Models for Open Authorization.
IEEE Trans. Dependable Sec. Comput., 2012

Policy-driven role-based access management for ad-hoc collaboration.
Journal of Computer Security, 2012

Access control for online social networks third party applications.
Computers & Security, 2012

Privacy management for online social networks.
Proceedings of the 21st World Wide Web Conference, 2012

Social Networks Profile Mapping Using Games.
Proceedings of the 3rd USENIX Conference on Web Application Development, 2012

Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Policy-by-example for online social networks.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

REM: A runtime browser extension manager with fine-grained access control.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

A Lightweight Secure Provenance Scheme for Wireless Sensor Networks.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

Anomaly Discovery and Resolution in MySQL Access Control Policies.
Proceedings of the Database and Expert Systems Applications, 2012

Towards improving browser extension permission management and user awareness.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Semi-Supervised Policy Recommendation for Online Social Networks.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

How do Facebookers Use Friendlists.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Adaptive Reordering and Clustering-Based Framework for Efficient XACML Policy Evaluation.
IEEE Trans. Services Computing, 2011

Security and Privacy in Social Networks.
IEEE Internet Computing, 2011

ROAuth: recommendation based open authorization.
Proceedings of the Symposium On Usable Privacy and Security, 2011

Enabling Cross-Site Content Sharing between Social Networks.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

SEGrapher: Visualization-based SELinux Policy Analysis.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

iLayer: Toward an Application Access Control Framework for Content Management Systems.
Proceedings of the POLICY 2011, 2011

A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

MasterBlaster: Identifying Influential Players in Botnet Transactions.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2010
Privacy policies for shared content in social network sites.
VLDB J., 2010

Social-Networks Connect Services.
IEEE Computer, 2010

Learning based access control in online social networks.
Proceedings of the 19th International Conference on World Wide Web, 2010

User Centric Policy Management in Online Social Networks.
Proceedings of the POLICY 2010, 2010

A learning-based approach for SELinux policy optimization with type mining.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Collective privacy management in social networks.
Proceedings of the 18th International Conference on World Wide Web, 2009

Social applications: exploring a more secure framework.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Statistics & Clustering Based Framework for Efficient XACML Policy Evaluation.
Proceedings of the POLICY 2009, 2009

Privacy-Enhanced User-Centric Identity Management.
Proceedings of IEEE International Conference on Communications, 2009

2008
Secure Collaboration in a Mediator-Free Distributed Environment.
IEEE Trans. Parallel Distrib. Syst., 2008

Watermarking Relational Databases Using Optimization-Based Techniques.
IEEE Trans. Knowl. Data Eng., 2008

Portable User-Centric Identity Management.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Visualization based policy analysis: case study in SELinux.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Proactive Role Discovery in Mediator-Free Environments.
Proceedings of the Proceedings P2P'08, 2008

Beyond User-to-User Access Control for Online Social Networks.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

2007
Web services discovery in secure collaboration environments.
ACM Trans. Internet Techn., 2007

Towards trust-aware access management for ad-hoc collaborations.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

2006
Workflow authorisation in mediator-free environments.
IJSN, 2006

2005
Distributed Access Management in Multimedia IDCs.
IEEE Computer, 2005

Efficient hierarchical key generation and key diffusion for sensor networks.
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor, 2005

SERAT: SEcure role mApping technique for decentralized secure interoperability.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

Secure collaboration in mediator-free environments.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005


  Loading...