Hassan Takabi
According to our database1,
Hassan Takabi
authored at least 56 papers
between 2007 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
0
5
10
1
4
1
1
4
2
1
1
1
4
2
6
7
4
3
1
3
4
2
1
3
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
IEEE Trans. Dependable Secur. Comput., 2020
2019
MOWS: Multi-objective workflow scheduling in cloud computing based on heuristic algorithm.
Simul. Model. Pract. Theory, 2019
Internet Technol. Lett., 2019
Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies.
Cybersecur., 2019
Communication-efficient private distance calculation based on oblivious transfer extensions.
Comput. Secur., 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies.
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
Proc. Priv. Enhancing Technol., 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Prediction of human error using eye movements patterns for unintentional insider threat detection.
Proceedings of the IEEE 4th International Conference on Identity, 2018
2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Identification of Access Control Policy Sentences from Natural Language Policy Documents.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017
Proceedings of the 9th Cloud Computing Security Workshop, 2017
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017
2016
Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals.
J. Internet Serv. Inf. Secur., 2016
Comput. Secur., 2016
Proceedings of the Workshop on Privacy Indicators, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
If You Can't Measure It, You Can't Manage It: Towards Quantification of Privacy Policies.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Top Manager's Perspectives on Cyberinsurance Risk Management for Reducing Cybersecurity Risks.
Proceedings of the 22nd Americas Conference on Information Systems, 2016
2015
J. Internet Serv. Inf. Secur., 2015
Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques.
Proceedings of the Information Security Theory and Practice, 2015
Towards an Automatic Top-down Role Engineering Approach Using Natural Language Processing Techniques.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
2014
Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis, 2014
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014
2012
Int. J. Cloud Comput., 2012
Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
2011
Int. J. Inf. Priv. Secur. Integr., 2011
DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
2010
IEEE Secur. Priv., 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010
2009
An architecture for specification and enforcement of temporal access control constraints using OWL.
Proceedings of the 6th ACM Workshop On Secure Web Services, 2009
A collaborative k-anonymity approach for location privacy in location-based services.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007