Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semi-supervised policy recommendation for online social networks., , and . Soc. Netw. Anal. Min., 6 (1): 61:1-61:12 (2016)Security and Privacy in Social Networks., , and . IEEE Internet Comput., 15 (3): 10-12 (2011)Adaptive Reordering and Clustering-Based Framework for Efficient XACML Policy Evaluation., , , and . IEEE Trans. Serv. Comput., 4 (4): 300-313 (2011)Recommendation Models for Open Authorization., and . IEEE Trans. Dependable Secur. Comput., 9 (4): 583-596 (2012)Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids., , , and . IEEE Trans. Dependable Secur. Comput., 14 (2): 221-234 (2017)Web services discovery in secure collaboration environments., , and . ACM Trans. Internet Techn., 8 (1): 5 (2007)Optimizing search for malware by hashing smaller amounts of data., and . WorldCIS, page 112-117. IEEE, (2013)The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians., , and . SOUPS @ USENIX Security Symposium, page 31-46. USENIX Association, (2018)Proactive Role Discovery in Mediator-Free Environments., , and . Peer-to-Peer Computing, page 150-159. IEEE Computer Society, (2008)Learning based access control in online social networks., , , , and . WWW, page 1179-1180. ACM, (2010)