Vladimir A. Oleshchuk

Orcid: 0000-0002-7905-1016

Affiliations:
  • University of Agder, Kristiansand, Norway


According to our database1, Vladimir A. Oleshchuk authored at least 82 papers between 1987 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A survey on blockchain envisioned attribute based access control for internet of things: Overview, comparative analysis, and open research challenges.
Comput. Networks, November, 2023

A Delegatable Attribute Based Encryption Scheme for a Collaborative E-Health Cloud.
IEEE Trans. Serv. Comput., 2023

A Lightweight Access Control Scheme with Attribute Policy for Blockchain-Enabled Internet of Things.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Enforcement of Web3 Security by Use Blockchain and LLMs.
Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2023

2020
Intrusion Detection with Interpretable Rules Generated Using the Tsetlin Machine.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

2019
An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment.
ACM Trans. Internet Techn., 2019

Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

SLFTD: A Subjective Logic Based Framework for Truth Discovery.
Proceedings of the New Trends in Databases and Information Systems, 2019

2018
Blockchain Based Delegatable Access Control Scheme for a Collaborative E-Health Environment.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Towards Risk-aware Access Control Framework for Healthcare Information Sharing.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
Attribute based access control scheme with controlled access delegation for collaborative E-health environments.
J. Inf. Secur. Appl., 2017

A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

A trust-based security enforcement in disruption-tolerant networks.
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017

An Efficient Multi-Show Unlinkable Attribute Based Credential Scheme for a Collaborative E-Health Environment.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

2016
Analysis of key management protocols for social networks.
Soc. Netw. Anal. Min., 2016

Enforcing mobile security with location-aware role-based access control.
Secur. Commun. Networks, 2016

Verifying Group Authentication Protocols by Scyther.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions.
Int. J. Inf. Manag., 2016

Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

A Novel Framework for Security Enforcement in Networks for Disaster and Crisis Management.
Proceedings of the 13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2016

An attribute based access control scheme for secure sharing of electronic health records.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016

A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

2015
Automatic evaluation of information provider reliability and expertise.
World Wide Web, 2015

A novel policy-driven reversible anonymisation scheme for XML-based services.
Inf. Syst., 2015

An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

Constraints validation in privacy-preserving attribute-based access control.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

Traceable hierarchical attribute-based authentication for the cloud.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

A Dynamic Attribute-Based Authentication Scheme.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2014
A Novel Approach to Trust Management in Unattended Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2014

An improvement of the batch-authentication and key agreement framework for P2P-based online social networks.
Proceedings of the 2014 International Conference on Privacy and Security in Mobile Systems, 2014

2013
Measuring Privacy Leakage for IDS Rules.
CoRR, 2013

Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs.
Comput. Commun., 2013

Privacy handling for critical information infrastructures.
Proceedings of the 11th IEEE International Conference on Industrial Informatics, 2013

A novel scheme for privacy preserving in RBAC.
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013

A General Framework for Group Authentication and Key Exchange Protocols.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Addressing the Terms-of-Service Threat - Client-side Security and Policy Control for Free File Storage Services.
Proceedings of the CLOSER 2013, 2013

2012
Decision-cache based XACML authorisation and anonymisation for XML documents.
Comput. Stand. Interfaces, 2012

FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Trust-Aware RBAC.
Proceedings of the Computer Network Security, 2012

An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

Trust-enhanced intelligent security model.
Proceedings of the 6th IEEE International Conference on Intelligent Systems, 2012

Trust-enhanced data integrity model.
Proceedings of the 1st International IEEE Symposium on Wireless Systems, 2012

2011
Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context.
Wirel. Pers. Commun., 2011

A Composite Privacy Leakage Indicator.
Wirel. Pers. Commun., 2011

Remote Patient Monitoring Within a Future 5G Infrastructure.
Wirel. Pers. Commun., 2011

Security in Mobile Wireless Sensor Networks - A Survey.
J. Commun., 2011

Semantic retrieval: an approach to representing, searching and summarising text documents.
Int. J. Inf. Technol. Commun. Convergence, 2011

Mobile Security with Location-Aware Role-Based Access Control.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011

SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Privacy-preserving scheme for mobile ad hoc networks.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

A Cognitive-based scheme for user reliability and expertise assessment in Q&A social networks.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

Ontology-based service matching and discovery.
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011

Collaborative assessment of information provider's reliability and expertise using subjective logic.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

2010
A survey on peer-to-peer SIP based communication systems.
Peer-to-Peer Netw. Appl., 2010

The Design of Secure and Efficient P2PSIP Communication Systems.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Privacy Violation Classification of Snort Ruleset.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs.
Proceedings of the Global Communications Conference, 2010

Secure interworking with P2PSIP and IMS.
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010

Secure Group Communication Using Fractional Public Keys.
Proceedings of the ARES 2010, 2010

2009
A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing.
Proceedings of the 2nd IFIP Wireless Days, 2009

A secure architecture for P2PSIP-based communication systems.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

PRIvacy LEakage Methodology (PRILE) for IDS Rules.
Proceedings of the Privacy and Identity Management for Life, 2009

Secure and Efficient Data Storage in Unattended Wireless Sensor Networks.
Proceedings of the NTMS 2009, 2009

Trust-based framework for security enhancement of P2PSIP communication systems.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

2008
Efficient Hierarchical Group-Oriented Key Establishment and Decryption.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

Secure Team-Based EPR Access Acquisition in Wireless Networks.
Proceedings of the The Third International Conference on Availability, 2008

2007
Privacy Preserving Monitoring and Surveillance in Sensor Networks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

EPR Access Authorization of Medical Teams Based on Patient Consent.
Proceedings of the European Conference on eHealth 2007, 2007

Hierarchical Multi-Party Key Agreement for Wireless Networks.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Semantic Retrieval of Text Documents.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
Location-based Security Framework for use of Handheld Devices in Medical Information Systems.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

Anonymity Preserving Authorization Granting in Medical Information Networks.
Proceedings of the European Conference on eHealth 2006, 2006

2005
Modeling, specification and verification of ad-hoc sensor networks using SPIN.
Comput. Stand. Interfaces, 2005

Location Privacy for Cellular Systems; Analysis and Solution.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Conformance Checking of RBAC Policy and its Implementation.
Proceedings of the Information Security Practice and Experience, 2005

2003
Spatio-temporal exposure control.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

Towards a Probabilistic Framework for Analogous Multi-Modal Human-Computer Interaction.
Proceedings of the Human-Computer Interaction: Universal Access in HCI: Inclusive Design in the Information Society, 2003

Ontology Based Semantic Similarity Comparison of Documents.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

1998
On-line Constraint-based Pattern Matching on Sequences.
Proceedings of the Sequences and their Applications, 1998

1995
Church-Rosser Codes.
Proceedings of the Cryptography and Coding, 1995

On Public-Key Cryptosystem Based on Church-Rosser String-Rewriting Systems (Extended Abstract).
Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995

1987
Stable Finite Automata Mappings and Church-Rosser Systems.
Proceedings of the Fundamentals of Computation Theory, 1987


  Loading...