Mohamed Shehab

Orcid: 0000-0002-4189-9118

According to our database1, Mohamed Shehab authored at least 94 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Replication: What Would Motivate Users to Use Gmail's Confidential Mode?
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Managing Access to Confidential Documents: A Case Study of an Email Security Tool.
Future Internet, 2023

Exploring the Usability, Security, and Privacy of Smart Locks from the Perspective of the End User.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023

I Have No Idea What Are These Terms! Exploring Users' Understanding and Interpretation of Genealogy Results.
Proceedings of the HCI International 2023 Posters, 2023

2022
User Perceptions of Gmail's Confidential Mode.
Proc. Priv. Enhancing Technol., 2022

"Why would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

2021
Privacy Policy Analysis of Banks and Mobile Money Services in the Middle East.
Future Internet, 2021

Formal approach to thwart against insider attacks: A bio-inspired auto-resilient policy regulation framework.
Future Gener. Comput. Syst., 2021

Exploring Perceptions of a Localized Content-Sharing System Using Users-as-Beacons.
Proceedings of the Human-Computer Interaction - INTERACT 2021 - 18th IFIP TC 13 International Conference, Bari, Italy, August 30, 2021

The Effectiveness of Video Messaging Campaigns to Use 2FA.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2021

2020
A Study of South Asian Websites on Privacy Compliance.
IEEE Access, 2020

The Impact of Advertisements on User Attention During Permission Authorization.
Proceedings of the HCI International 2020 - Late Breaking Papers: User Experience Design and Case Studies, 2020

Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Seniors' Media Preference for Receiving Internet Security Information: A Pilot Study.
CoRR, 2019

Visual Analysis of Photo Policy Misconfigurations Using Treemaps.
CoRR, 2019

Privacy Is The Best Policy: A Framework for BLE Beacon Privacy Management.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Bio-inspired Approach to Thwart Against Insider Threats: An Access Control Policy Regulation Framework.
Proceedings of the Bio-inspired Information and Communication Technologies, 2019

2018
The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

Trust-Aware Goal Modeling from Use Case for Cooperative Self-Adaptive Systems.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Mobile Users as Advertisers: User Perceptions of Product Sensitivity, Exposure, and Public Influence.
Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia, 2018

CordovaConfig: A Tool for Mobile Hybrid Apps' Configuration.
Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia, 2018

2017
Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids.
IEEE Trans. Dependable Secur. Comput., 2017

Look before you Authorize: Using Eye-Tracking to Enforce User Attention towards Application Permissions.
Proc. Priv. Enhancing Technol., 2017

Towards Improving Comprehension of Touch ID Authentication with Smartphone Applications.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

The Design of Cyber Threat Hunting Games: A Case Study.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Proposing and Testing New Security Cue Designs for OAuth-WebView-Embedded Mobile Applications.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration Model.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Semi-supervised policy recommendation for online social networks.
Soc. Netw. Anal. Min., 2016

Crowdsourcing for Context: Regarding Privacy in Beacon Encounters via Contextual Integrity.
Proc. Priv. Enhancing Technol., 2016

A Methodology for Prevention of Biometric Presentation Attacks.
Proceedings of the 2016 Seventh Latin-American Symposium on Dependable Computing, 2016

Investigating the Animation of Application Permission Dialogs: A Case Study of Facebook.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Maintaining User Interface Integrity on Android.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

The Listening Patterns to System Events by Benign and Malicious Android Apps.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Hardening the OAuth-WebView Implementations in Android Applications by Re-Factoring the Chromium Library.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

2015
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2015

Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

2014
Human Effects of Enhanced Privacy Management Models.
IEEE Trans. Dependable Secur. Comput., 2014

Reducing Attack Surface on Cordova-based Hybrid Mobile Apps.
Proceedings of the 2nd International Workshop on Mobile Development Lifecycle, 2014

Towards Enhancing the Security of OAuth Implementations in Smart Phones.
Proceedings of the IEEE Third International Conference on Mobile Services, Anchorage, AK, USA, June 27, 2014

PERMITME: integrating android permissioning support in the IDE.
Proceedings of the 2014 Workshop on Eclipse Technology eXchange, 2014

Securing OAuth implementations in smart phones.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

POSTER: Android System Broadcast Actions Broadcasts Your Privacy.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Secure Provenance Transmission for Streaming Data.
IEEE Trans. Knowl. Data Eng., 2013

Enabling cross-site interactions in social networks.
Soc. Netw. Anal. Min., 2013

Visualization-based policy analysis for SELinux: framework and user study.
Int. J. Inf. Sec., 2013

Optimizing search for malware by hashing smaller amounts of data.
Proceedings of the 2013 World Congress on Internet Security, 2013

Access Control Policy Misconfiguration Detection in Online Social Networks.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Android keylogging threat.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Game-theoretic approach for user migration in Diaspora.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

Usable object management approaches for online social networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Recommendation Models for Open Authorization.
IEEE Trans. Dependable Secur. Comput., 2012

Policy-driven role-based access management for ad-hoc collaboration.
J. Comput. Secur., 2012

Access control for online social networks third party applications.
Comput. Secur., 2012

Privacy management for online social networks.
Proceedings of the 21st World Wide Web Conference, 2012

Social Networks Profile Mapping Using Games.
Proceedings of the 3rd USENIX Conference on Web Application Development, 2012

Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Policy-by-example for online social networks.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

REM: A runtime browser extension manager with fine-grained access control.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

A Lightweight Secure Provenance Scheme for Wireless Sensor Networks.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

Anomaly Discovery and Resolution in MySQL Access Control Policies.
Proceedings of the Database and Expert Systems Applications, 2012

Towards improving browser extension permission management and user awareness.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Semi-Supervised Policy Recommendation for Online Social Networks.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

How do Facebookers Use Friendlists.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Adaptive Reordering and Clustering-Based Framework for Efficient XACML Policy Evaluation.
IEEE Trans. Serv. Comput., 2011

Security and Privacy in Social Networks.
IEEE Internet Comput., 2011

ROAuth: recommendation based open authorization.
Proceedings of the Symposium On Usable Privacy and Security, 2011

Enabling Cross-Site Content Sharing between Social Networks.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

SEGrapher: Visualization-based SELinux Policy Analysis.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

iLayer: Toward an Application Access Control Framework for Content Management Systems.
Proceedings of the POLICY 2011, 2011

A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

MasterBlaster: Identifying Influential Players in Botnet Transactions.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2010
Privacy policies for shared content in social network sites.
VLDB J., 2010

Social-Networks Connect Services.
Computer, 2010

Learning based access control in online social networks.
Proceedings of the 19th International Conference on World Wide Web, 2010

User Centric Policy Management in Online Social Networks.
Proceedings of the POLICY 2010, 2010

A learning-based approach for SELinux policy optimization with type mining.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Collective privacy management in social networks.
Proceedings of the 18th International Conference on World Wide Web, 2009

Social applications: exploring a more secure framework.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Statistics & Clustering Based Framework for Efficient XACML Policy Evaluation.
Proceedings of the POLICY 2009, 2009

Privacy-Enhanced User-Centric Identity Management.
Proceedings of IEEE International Conference on Communications, 2009

2008
Secure Collaboration in a Mediator-Free Distributed Environment.
IEEE Trans. Parallel Distributed Syst., 2008

Watermarking Relational Databases Using Optimization-Based Techniques.
IEEE Trans. Knowl. Data Eng., 2008

Portable User-Centric Identity Management.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Visualization based policy analysis: case study in SELinux.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Proactive Role Discovery in Mediator-Free Environments.
Proceedings of the Proceedings P2P'08, 2008

Beyond User-to-User Access Control for Online Social Networks.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

2007
Web services discovery in secure collaboration environments.
ACM Trans. Internet Techn., 2007

Towards trust-aware access management for ad-hoc collaborations.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

2006
Workflow authorisation in mediator-free environments.
Int. J. Secur. Networks, 2006

2005
Distributed Access Management in Multimedia IDCs.
Computer, 2005

Efficient hierarchical key generation and key diffusion for sensor networks.
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005

SERAT: SEcure role mApping technique for decentralized secure interoperability.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

Secure collaboration in mediator-free environments.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005


  Loading...