Follow
Amir Masoumzadeh
Amir Masoumzadeh
Other namesAmirreza Masoumzadeh
Verified email at albany.edu - Homepage
Title
Cited by
Cited by
Year
Osnac: An ontology-based access control model for social networking systems
A Masoumzadeh, J Joshi
2010 IEEE Second International Conference on Social Computing, 751-759, 2010
912010
A survey of security issue in multi-agent systems
Y Jung, M Kim, A Masoumzadeh, JBD Joshi
Artificial Intelligence Review 37, 239-260, 2012
772012
PuRBAC: Purpose-aware role-based access control
A Masoumzadeh, JBD Joshi
OTM Confederated International Conferences" On the Move to Meaningful …, 2008
622008
Mining positive and negative attribute-based access control policy rules
P Iyer, A Masoumzadeh
Proceedings of the 23nd ACM on Symposium on Access Control Models and …, 2018
602018
Ontology-based access control for social network systems
A Masoumzadeh, J Joshi
International Journal of Information Privacy, Security and Integrity 1 (1 …, 2011
382011
Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks
A Masoumzadeh, J Joshi
IEEE Transactions on Dependable and Secure Computing 9 (6), 877-889, 2012
352012
Conflict detection and resolution in context-aware authorization
A Masoumzadeh, M Amini, R Jalili
21st International Conference on Advanced Information Networking and …, 2007
332007
Generalized mining of relationship-based access control policies in evolving systems
P Iyer, A Masoumzadeh
Proceedings of the 24th ACM Symposium on Access Control Models and …, 2019
222019
An alternative approach to k-anonymity for location-based services
A Masoumzadeh, J Joshi
Procedia Computer Science 5, 522-530, 2011
202011
Active learning of relationship-based access control policies
P Iyer, A Masoumzadeh
Proceedings of the 25th ACM Symposium on Access Control Models and …, 2020
192020
Privacy settings in social networking systems: What you cannot control
A Masoumzadeh, J Joshi
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
192013
A secure, constraint-aware role-based access control interoperation framework
N Baracaldo, A Masoumzadeh, J Joshi
2011 5th International Conference on Network and System Security, 200-207, 2011
182011
Context-aware provisional access control
A Masoumzadeh, M Amini, R Jalili
Information Systems Security, 132-146, 2006
162006
Top Location Anonymization for Geosocial Network Datasets.
A Masoumzadeh, J Joshi
Trans. Data Priv. 6 (1), 107-126, 2013
152013
Anonymizing geo-social network datasets
A Masoumzadeh, J Joshi
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and …, 2011
142011
Active defense against social engineering: The case for human language technology
A Dalton, E Aghaei, E Al-Shaer, A Bhatia, E Castillo, Z Cheng, ...
Proceedings for the First International Workshop on Social Threats in Online …, 2020
122020
LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users
A Masoumzadeh, J Joshi, HA Karimi
Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances …, 2009
92009
Security analysis of relationship-based access control policies
A Masoumzadeh
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
82018
Preserving structural properties in anonymization of social networks
A Masoumzadeh, J Joshi
6th International Conference on Collaborative Computing: Networking …, 2010
82010
Towards a theory for semantics and expressiveness analysis of rule-based access control models
A Masoumzadeh, P Narendran, P Iyer
Proceedings of the 26th ACM Symposium on Access Control Models and …, 2021
72021
The system can't perform the operation now. Try again later.
Articles 1–20