BibTeX records: Hassan Takabi

download as .bib file

@article{DBLP:journals/tdsc/NaroueiTN20,
  author       = {Masoud Narouei and
                  Hassan Takabi and
                  Rodney Nielsen},
  title        = {Automatic Extraction of Access Control Policies from Natural Language
                  Documents},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {506--517},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2818708},
  doi          = {10.1109/TDSC.2018.2818708},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/NaroueiTN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KaghazgaranTCS19,
  author       = {Parisa Kaghazgaran and
                  Hassan Takabi and
                  Flannery Hope Currin and
                  Armando Soriano},
  title        = {Communication-efficient private distance calculation based on oblivious
                  transfer extensions},
  journal      = {Comput. Secur.},
  volume       = {83},
  pages        = {93--105},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.01.010},
  doi          = {10.1016/J.COSE.2019.01.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KaghazgaranTCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/AlohalyT019,
  author       = {Manar Alohaly and
                  Hassan Takabi and
                  Eduardo Blanco},
  title        = {Automated extraction of attributes from natural language attribute-based
                  access control {(ABAC)} Policies},
  journal      = {Cybersecur.},
  volume       = {2},
  number       = {1},
  pages        = {2},
  year         = {2019},
  url          = {https://doi.org/10.1186/s42400-018-0019-2},
  doi          = {10.1186/S42400-018-0019-2},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersec/AlohalyT019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itl/AbazariETHP19,
  author       = {Farzaneh Abazari and
                  Flavio Esposito and
                  Hassan Takabi and
                  Hamid Hosseinvand and
                  Tommaso Pecorella},
  title        = {Teaching software-defined network security through malicious tenant
                  detection},
  journal      = {Internet Technol. Lett.},
  volume       = {2},
  number       = {6},
  year         = {2019},
  url          = {https://doi.org/10.1002/itl2.131},
  doi          = {10.1002/ITL2.131},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itl/AbazariETHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simpra/AbazariATF19,
  author       = {Farzaneh Abazari and
                  Morteza Analoui and
                  Hassan Takabi and
                  Song Fu},
  title        = {{MOWS:} Multi-objective workflow scheduling in cloud computing based
                  on heuristic algorithm},
  journal      = {Simul. Model. Pract. Theory},
  volume       = {93},
  pages        = {119--132},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.simpat.2018.10.004},
  doi          = {10.1016/J.SIMPAT.2018.10.004},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/simpra/AbazariATF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/HesamifardTG19,
  author       = {Ehsan Hesamifard and
                  Hassan Takabi and
                  Mehdi Ghasemi},
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {Deep Neural Networks Classification over Encrypted Data},
  booktitle    = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  pages        = {97--108},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006.3300044},
  doi          = {10.1145/3292006.3300044},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/HesamifardTG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/AlohalyT019,
  author       = {Manar Alohaly and
                  Hassan Takabi and
                  Eduardo Blanco},
  editor       = {Gurpreet Dhillon and
                  Fredrik Karlsson and
                  Karin Hedstr{\"{o}}m and
                  Andr{\'{e}} Z{\'{u}}quete},
  title        = {Towards an Automated Extraction of {ABAC} Constraints from Natural
                  Language Policies},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 34th {IFIP} {TC} 11
                  International Conference, {SEC} 2019, Lisbon, Portugal, June 25-27,
                  2019, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {562},
  pages        = {105--119},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22312-0\_8},
  doi          = {10.1007/978-3-030-22312-0\_8},
  timestamp    = {Thu, 23 Apr 2020 08:52:39 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/AlohalyT019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/PodschwadtT19,
  author       = {Robert Podschwadt and
                  Hassan Takabi},
  editor       = {Songqing Chen and
                  Kim{-}Kwang Raymond Choo and
                  Xinwen Fu and
                  Wenjing Lou and
                  Aziz Mohaisen},
  title        = {On Effectiveness of Adversarial Examples and Defenses for Malware
                  Classification},
  booktitle    = {Security and Privacy in Communication Networks - 15th {EAI} International
                  Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {305},
  pages        = {380--393},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37231-6\_22},
  doi          = {10.1007/978-3-030-37231-6\_22},
  timestamp    = {Sat, 07 Mar 2020 15:42:08 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/PodschwadtT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/NaroueiT19,
  author       = {Masoud Narouei and
                  Hassan Takabi},
  editor       = {Songqing Chen and
                  Kim{-}Kwang Raymond Choo and
                  Xinwen Fu and
                  Wenjing Lou and
                  Aziz Mohaisen},
  title        = {A Nature-Inspired Framework for Optimal Mining of Attribute-Based
                  Access Control Policies},
  booktitle    = {Security and Privacy in Communication Networks - 15th {EAI} International
                  Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {305},
  pages        = {489--506},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37231-6\_29},
  doi          = {10.1007/978-3-030-37231-6\_29},
  timestamp    = {Sat, 07 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/NaroueiT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-04778,
  author       = {Robert Podschwadt and
                  Hassan Takabi},
  title        = {Effectiveness of Adversarial Examples and Defenses for Malware Classification},
  journal      = {CoRR},
  volume       = {abs/1909.04778},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.04778},
  eprinttype    = {arXiv},
  eprint       = {1909.04778},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-04778.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/HesamifardTGW18,
  author       = {Ehsan Hesamifard and
                  Hassan Takabi and
                  Mehdi Ghasemi and
                  Rebecca N. Wright},
  title        = {Privacy-preserving Machine Learning as a Service},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2018},
  number       = {3},
  pages        = {123--142},
  year         = {2018},
  url          = {https://doi.org/10.1515/popets-2018-0024},
  doi          = {10.1515/POPETS-2018-0024},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/HesamifardTGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isba/TakabiHD18,
  author       = {Hassan Takabi and
                  Yessir Hashem and
                  Ram Dantu},
  title        = {Prediction of human error using eye movements patterns for unintentional
                  insider threat detection},
  booktitle    = {{IEEE} 4th International Conference on Identity, Security, and Behavior
                  Analysis, {ISBA} 2018, Singapore, January 11-12, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISBA.2018.8311479},
  doi          = {10.1109/ISBA.2018.8311479},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isba/TakabiHD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/AlohalyTB18,
  author       = {Manar Alohaly and
                  Hassan Takabi and
                  Eduardo Blanco},
  editor       = {Elisa Bertino and
                  Dan Lin and
                  Jorge Lobo},
  title        = {A Deep Learning Approach for Extracting Attributes of {ABAC} Policies},
  booktitle    = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15,
                  2018},
  pages        = {137--148},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3205977.3205984},
  doi          = {10.1145/3205977.3205984},
  timestamp    = {Wed, 21 Nov 2018 12:44:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/AlohalyTB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HashemTDN17,
  author       = {Yassir Hashem and
                  Hassan Takabi and
                  Ram Dantu and
                  Rodney D. Nielsen},
  title        = {A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats},
  booktitle    = {Proceedings of the 2017 International Workshop on Managing Insider
                  Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  pages        = {33--44},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139923.3139930},
  doi          = {10.1145/3139923.3139930},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HashemTDN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HesamifardTGJ17,
  author       = {Ehsan Hesamifard and
                  Hassan Takabi and
                  Mehdi Ghasemi and
                  Catherine Jones},
  editor       = {Bhavani Thuraisingham and
                  Ghassan Karame and
                  Angelos Stavrou},
  title        = {Privacy-preserving Machine Learning in Cloud},
  booktitle    = {Proceedings of the 9th Cloud Computing Security Workshop, CCSW@CCS
                  2017, Dallas, TX, USA, November 3, 2017},
  pages        = {39--43},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3140649.3140655},
  doi          = {10.1145/3140649.3140655},
  timestamp    = {Thu, 12 Oct 2023 12:32:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HesamifardTGJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TakabiJ17,
  author       = {Hassan Takabi and
                  Jafar Haadi Jafarian},
  title        = {Insider Threat Mitigation Using Moving Target Defense and Deception},
  booktitle    = {Proceedings of the 2017 International Workshop on Managing Insider
                  Security Threats, Dallas, TX, USA, October 30 - November 03, 2017},
  pages        = {93--96},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139923.3139935},
  doi          = {10.1145/3139923.3139935},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TakabiJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/AlohalyT17,
  author       = {Manar Alohaly and
                  Hassan Takabi},
  title        = {When Do Changes Induce Software Vulnerabilities?},
  booktitle    = {3rd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017},
  pages        = {59--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CIC.2017.00020},
  doi          = {10.1109/CIC.2017.00020},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/AlohalyT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/NaroueiKT17,
  author       = {Masoud Narouei and
                  Hamed Khanpour and
                  Hassan Takabi},
  editor       = {Giovanni Livraga and
                  Sencun Zhu},
  title        = {Identification of Access Control Policy Sentences from Natural Language
                  Policy Documents},
  booktitle    = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10359},
  pages        = {82--100},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61176-1\_5},
  doi          = {10.1007/978-3-319-61176-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/NaroueiKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/NaroueiKTPN17,
  author       = {Masoud Narouei and
                  Hamed Khanpour and
                  Hassan Takabi and
                  Natalie Parde and
                  Rodney D. Nielsen},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Edgar R. Weippl},
  title        = {Towards a Top-down Policy Engineering Framework for Attribute-based
                  Access Control},
  booktitle    = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23,
                  2017},
  pages        = {103--114},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3078861.3078874},
  doi          = {10.1145/3078861.3078874},
  timestamp    = {Tue, 09 Feb 2021 08:50:30 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/NaroueiKTPN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-05189,
  author       = {Ehsan Hesamifard and
                  Hassan Takabi and
                  Mehdi Ghasemi},
  title        = {CryptoDL: Deep Neural Networks over Encrypted Data},
  journal      = {CoRR},
  volume       = {abs/1711.05189},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.05189},
  eprinttype    = {arXiv},
  eprint       = {1711.05189},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-05189.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GhasemiGolBT16,
  author       = {Mohammad GhasemiGol and
                  Abbas Ghaemi Bafghi and
                  Hassan Takabi},
  title        = {A comprehensive approach for network attack forecasting},
  journal      = {Comput. Secur.},
  volume       = {58},
  pages        = {83--105},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2015.11.005},
  doi          = {10.1016/J.COSE.2015.11.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GhasemiGolBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AbazariAT16,
  author       = {Farzaneh Abazari and
                  Morteza Analoui and
                  Hassan Takabi},
  title        = {Effect of anti-malware software on infectious nodes in cloud environment},
  journal      = {Comput. Secur.},
  volume       = {58},
  pages        = {139--148},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2015.12.002},
  doi          = {10.1016/J.COSE.2015.12.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AbazariAT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GhasemiGolTB16,
  author       = {Mohammad GhasemiGol and
                  Hassan Takabi and
                  Abbas Ghaemi Bafghi},
  title        = {A foresight model for intrusion response management},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {73--94},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.06.005},
  doi          = {10.1016/J.COSE.2016.06.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GhasemiGolTB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/HashemTGD16,
  author       = {Yessir Hashem and
                  Hassan Takabi and
                  Mohammad GhasemiGol and
                  Ram Dantu},
  title        = {Inside the Mind of the Insider: Towards Insider Threat Detection Using
                  Psychophysiological Signals},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {20--36},
  year         = {2016},
  url          = {https://doi.org/10.22667/JISIS.2016.02.31.020},
  doi          = {10.22667/JISIS.2016.02.31.020},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/HashemTGD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/OgbanufeKT16,
  author       = {Obi Ogbanufe and
                  Dan Kim and
                  Hassan Takabi},
  title        = {Top Manager's Perspectives on Cyberinsurance Risk Management for Reducing
                  Cybersecurity Risks},
  booktitle    = {22nd Americas Conference on Information Systems, {AMCIS} 2016, San
                  Diego, CA, USA, August 11-14, 2016},
  publisher    = {Association for Information Systems},
  year         = {2016},
  url          = {http://aisel.aisnet.org/amcis2016/ISSec/Presentations/10},
  timestamp    = {Tue, 23 May 2017 14:11:43 +0200},
  biburl       = {https://dblp.org/rec/conf/amcis/OgbanufeKT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/Takabi16,
  author       = {Hassan Takabi},
  title        = {Firewall for brain: Towards a privacy preserving ecosystem for {BCI}
                  applications},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {370--371},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860516},
  doi          = {10.1109/CNS.2016.7860516},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/Takabi16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/TakabiBA16,
  author       = {Hassan Takabi and
                  Anuj Bhalotiya and
                  Manar Alohaly},
  title        = {Brain Computer Interface {(BCI)} Applications: Privacy Threats and
                  Countermeasures},
  booktitle    = {2nd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016},
  pages        = {102--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIC.2016.026},
  doi          = {10.1109/CIC.2016.026},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/TakabiBA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/TakabiKZ16,
  author       = {Hassan Takabi and
                  Samir Koppikar and
                  Saman Taghavi Zargar},
  title        = {Differentially Private Distributed Data Analysis},
  booktitle    = {2nd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016},
  pages        = {212--218},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIC.2016.038},
  doi          = {10.1109/CIC.2016.038},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/TakabiKZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/AlohalyT16,
  author       = {Manar Alohaly and
                  Hassan Takabi},
  title        = {If You Can't Measure It, You Can't Manage It: Towards Quantification
                  of Privacy Policies},
  booktitle    = {2nd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016},
  pages        = {539--545},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIC.2016.082},
  doi          = {10.1109/CIC.2016.082},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/AlohalyT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TakabiARZ16,
  author       = {Hassan Takabi and
                  Sheikh Iqbal Ahamed and
                  Mohammad Ashiqur Rahman and
                  Mohammad Zulkernine},
  title        = {Message from {STPSA} 2016 Workshop Organizers},
  booktitle    = {40th {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} Workshops 2016, Atlanta, GA, USA, June 10-14, 2016},
  pages        = {381},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMPSAC.2016.271},
  doi          = {10.1109/COMPSAC.2016.271},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/TakabiARZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/AlohalyT16,
  author       = {Manar Alohaly and
                  Hassan Takabi},
  title        = {Better Privacy Indicators: {A} New Approach to Quantification of Privacy
                  Policies},
  booktitle    = {Workshop on Privacy Indicators, WPI@SOUPS 2016, Denver, CO, USA, June
                  22, 2016},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/soups2016/workshop-program/wpi/presentation/alohaly},
  timestamp    = {Thu, 04 Aug 2016 15:59:38 +0200},
  biburl       = {https://dblp.org/rec/conf/soups/AlohalyT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/KaghazgaranT15,
  author       = {Parisa Kaghazgaran and
                  Hassan Takabi},
  title        = {Toward an Insider Threat Detection Framework Using Honey Permissions},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {19--36},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.08.31.019},
  doi          = {10.22667/JISIS.2015.08.31.019},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/KaghazgaranT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/NaroueiAGTS15,
  author       = {Masoud Narouei and
                  Mansour Ahmadi and
                  Giorgio Giacinto and
                  Hassan Takabi and
                  Ashkan Sami},
  title        = {DLLMiner: structural mining for malware detection},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3311--3322},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1255},
  doi          = {10.1002/SEC.1255},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/NaroueiAGTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HashemTGD15,
  author       = {Yessir Hashem and
                  Hassan Takabi and
                  Mohammad GhasemiGol and
                  Ram Dantu},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {Towards Insider Threat Detection Using Psychophysiological Signals},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {71--74},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808792},
  doi          = {10.1145/2808783.2808792},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HashemTGD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/NaroueiT15,
  author       = {Masoud Narouei and
                  Hassan Takabi},
  editor       = {Edgar R. Weippl and
                  Florian Kerschbaum and
                  Adam J. Lee},
  title        = {Towards an Automatic Top-down Role Engineering Approach Using Natural
                  Language Processing Techniques},
  booktitle    = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
                  Technologies, Vienna, Austria, June 1-3, 2015},
  pages        = {157--160},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2752952.2752958},
  doi          = {10.1145/2752952.2752958},
  timestamp    = {Mon, 26 Jun 2023 20:45:28 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/NaroueiT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/JafarianTTHS15,
  author       = {Jafar Haadi Jafarian and
                  Hassan Takabi and
                  Hakim Touati and
                  Ehsan Hesamifard and
                  Mohamed Shehab},
  editor       = {Edgar R. Weippl and
                  Florian Kerschbaum and
                  Adam J. Lee},
  title        = {Towards a General Framework for Optimal Role Mining: {A} Constraint
                  Satisfaction Approach},
  booktitle    = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
                  Technologies, Vienna, Austria, June 1-3, 2015},
  pages        = {211--220},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2752952.2752975},
  doi          = {10.1145/2752952.2752975},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/JafarianTTHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/NaroueiT15,
  author       = {Masoud Narouei and
                  Hassan Takabi},
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Automatic Top-Down Role Engineering Framework Using Natural Language
                  Processing Techniques},
  booktitle    = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  pages        = {137--152},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3\_9},
  doi          = {10.1007/978-3-319-24018-3\_9},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/NaroueiT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Takabi14,
  author       = {Hassan Takabi},
  editor       = {Robert H. Deng and
                  Elaine Shi and
                  Kui Ren},
  title        = {Privacy aware access control for data sharing in cloud computing environments},
  booktitle    = {Proceedings of the Second International Workshop on Security in Cloud
                  Computing, SCC@ASIACCS '14, Kyoto, Japan, June 3, 2014},
  pages        = {27--34},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600075.2600076},
  doi          = {10.1145/2600075.2600076},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Takabi14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gis/JinT14,
  author       = {Lei Jin and
                  Hassan Takabi},
  editor       = {Carsten Ke{\ss}ler and
                  Grant D. McKenzie and
                  Lars Kulik},
  title        = {Venue attacks in location-based social networks},
  booktitle    = {Proceedings of the 1st {ACM} {SIGSPATIAL} International Workshop on
                  Privacy in Geographic Information Collection and Analysis, GeoPrivacy
                  '14, Dallas/Fort Worth, Texas, USA, November 4-7, 2014},
  pages        = {1:1--1:8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2675682.2676395},
  doi          = {10.1145/2675682.2676395},
  timestamp    = {Tue, 06 Nov 2018 11:07:35 +0100},
  biburl       = {https://dblp.org/rec/conf/gis/JinT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/JinTLJ14,
  author       = {Lei Jin and
                  Hassan Takabi and
                  Xuelian Long and
                  James B. D. Joshi},
  editor       = {Gail{-}Joon Ahn and
                  Anupam Datta},
  title        = {Exploiting Users' Inconsistent Preferences in Online Social Networks
                  to Discover Private Friendship Links},
  booktitle    = {Proceedings of the 13th Workshop on Privacy in the Electronic Society,
                  {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014},
  pages        = {59--68},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665943.2665956},
  doi          = {10.1145/2665943.2665956},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/JinTLJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcc/TakabiJ12,
  author       = {Hassan Takabi and
                  James B. D. Joshi},
  title        = {Semantic-based policy management for cloud computing environments},
  journal      = {Int. J. Cloud Comput.},
  volume       = {1},
  number       = {2/3},
  pages        = {119--144},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJCC.2012.046717},
  doi          = {10.1504/IJCC.2012.046717},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcc/TakabiJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/TakabiJ12,
  author       = {Hassan Takabi and
                  James B. D. Joshi},
  title        = {Policy Management as a Service: An Approach to Manage Policy Heterogeneity
                  in Cloud Computing Environment},
  booktitle    = {45th Hawaii International International Conference on Systems Science
                  {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui,
                  HI, {USA}},
  pages        = {5500--5508},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/HICSS.2012.475},
  doi          = {10.1109/HICSS.2012.475},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/TakabiJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/JinTJ11,
  author       = {Lei Jin and
                  Hassan Takabi and
                  James B. D. Joshi},
  title        = {Analysing security and privacy issues of using e-mail address as identity},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {1},
  pages        = {34--58},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJIPSI.2011.043730},
  doi          = {10.1504/IJIPSI.2011.043730},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/JinTJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/MazurekKSTBC11,
  author       = {Michelle L. Mazurek and
                  Peter F. Klemperer and
                  Richard Shay and
                  Hassan Takabi and
                  Lujo Bauer and
                  Lorrie Faith Cranor},
  editor       = {Desney S. Tan and
                  Saleema Amershi and
                  Bo Begole and
                  Wendy A. Kellogg and
                  Manas Tungare},
  title        = {Exploring reactive access control},
  booktitle    = {Proceedings of the International Conference on Human Factors in Computing
                  Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011},
  pages        = {2085--2094},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1978942.1979245},
  doi          = {10.1145/1978942.1979245},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/MazurekKSTBC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/JinTJ11,
  author       = {Lei Jin and
                  Hassan Takabi and
                  James B. D. Joshi},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Towards active detection of identity clone attacks on online social
                  networks},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {27--38},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943520},
  doi          = {10.1145/1943513.1943520},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/JinTJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/ZargarTJ11,
  author       = {Saman Taghavi Zargar and
                  Hassan Takabi and
                  James B. D. Joshi},
  editor       = {Dimitrios Georgakopoulos and
                  James B. D. Joshi},
  title        = {{DCDIDP:} {A} distributed, collaborative, and data-driven intrusion
                  detection and prevention framework for cloud computing environments},
  booktitle    = {7th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA,
                  15-18 October, 2011},
  pages        = {332--341},
  publisher    = {{ICST} / {IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2011.247158},
  doi          = {10.4108/ICST.COLLABORATECOM.2011.247158},
  timestamp    = {Fri, 15 Mar 2024 12:30:44 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/ZargarTJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TakabiJA10,
  author       = {Hassan Takabi and
                  James B. D. Joshi and
                  Gail{-}Joon Ahn},
  title        = {Security and Privacy Challenges in Cloud Computing Environments},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {8},
  number       = {6},
  pages        = {24--31},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSP.2010.186},
  doi          = {10.1109/MSP.2010.186},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TakabiJA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/ShayMKT10,
  author       = {Richard Shay and
                  Michelle L. Mazurek and
                  Peter F. Klemperer and
                  Hassan Takabi},
  editor       = {Elizabeth D. Mynatt and
                  Don Schoner and
                  Geraldine Fitzpatrick and
                  Scott E. Hudson and
                  W. Keith Edwards and
                  Tom Rodden},
  title        = {Exploring reactive access control},
  booktitle    = {Proceedings of the 28th International Conference on Human Factors
                  in Computing Systems, {CHI} 2010, Extended Abstracts Volume, Atlanta,
                  Georgia, USA, April 10-15, 2010},
  pages        = {4417--4422},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1753846.1754163},
  doi          = {10.1145/1753846.1754163},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/ShayMKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TakabiJA10,
  author       = {Hassan Takabi and
                  James B. D. Joshi and
                  Gail{-}Joon Ahn},
  title        = {SecureCloud: Towards a Comprehensive Security Framework for Cloud
                  Computing Environments},
  booktitle    = {Workshop Proceedings of the 34th Annual {IEEE} International Computer
                  Software and Applications Conference, {COMPSAC} Workshops 2010, Seoul,
                  Korea, 19-23 July 2010},
  pages        = {393--398},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/COMPSACW.2010.74},
  doi          = {10.1109/COMPSACW.2010.74},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/TakabiJA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/TakabiJ10,
  author       = {Hassan Takabi and
                  James B. D. Joshi},
  editor       = {James B. D. Joshi and
                  Barbara Carminati},
  title        = {StateMiner: an efficient similarity-based approach for optimal mining
                  of role hierarchy},
  booktitle    = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings},
  pages        = {55--64},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1809842.1809853},
  doi          = {10.1145/1809842.1809853},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/TakabiJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/JinTJ10,
  author       = {Lei Jin and
                  Hassan Takabi and
                  James B. D. Joshi},
  editor       = {Ahmed K. Elmagarmid and
                  Divyakant Agrawal},
  title        = {Security and Privacy Risks of Using E-mail Address as an Identity},
  booktitle    = {Proceedings of the 2010 {IEEE} Second International Conference on
                  Social Computing, SocialCom / {IEEE} International Conference on Privacy,
                  Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
                  August 20-22, 2010},
  pages        = {906--913},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SocialCom.2010.134},
  doi          = {10.1109/SOCIALCOM.2010.134},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/JinTJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/TakabiJK09,
  author       = {Hassan Takabi and
                  James B. D. Joshi and
                  Hassan A. Karimi},
  editor       = {James B. D. Joshi and
                  Tao Zhang},
  title        = {A collaborative k-anonymity approach for location privacy in location-based
                  services},
  booktitle    = {The 5th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2009, Washington DC,
                  USA, November 11-14, 2009},
  pages        = {1--9},
  publisher    = {{ICST} / {IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.4108/ICST.COLLABORATECOM2009.8374},
  doi          = {10.4108/ICST.COLLABORATECOM2009.8374},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/TakabiJK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/TakabiKJS09,
  author       = {Hassan Takabi and
                  Minsoo Kim and
                  James B. D. Joshi and
                  Michael B. Spring},
  editor       = {Ernesto Damiani and
                  Seth Proctor and
                  Anoop Singhal},
  title        = {An architecture for specification and enforcement of temporal access
                  control constraints using {OWL}},
  booktitle    = {Proceedings of the 6th {ACM} Workshop On Secure Web Services, {SWS}
                  2009, Chicago, Illinois, USA, November 13, 2009},
  pages        = {21--28},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655121.1655127},
  doi          = {10.1145/1655121.1655127},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/TakabiKJS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AbdallahT08,
  author       = {Ali E. Abdallah and
                  Hassan Takabi},
  editor       = {Massimiliano Rak and
                  Ajith Abraham and
                  Valentina Casola},
  title        = {Integrating Delegation with the Formal Core {RBAC} Model},
  booktitle    = {Proccedings of the Fourth International Conference on Information
                  Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli,
                  Italy},
  pages        = {33--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IAS.2008.66},
  doi          = {10.1109/IAS.2008.66},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AbdallahT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/TakabiAJ07,
  author       = {Hassan Takabi and
                  Morteza Amini and
                  Rasool Jalili},
  editor       = {Ning Zhang and
                  Ajith Abraham},
  title        = {Separation of Duty in Role-Based Access Control Model through Fuzzy
                  Relations},
  booktitle    = {Proceedings of the Third International Symposium on Information Assurance
                  and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom},
  pages        = {125--130},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAS.2007.68},
  doi          = {10.1109/IAS.2007.68},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/TakabiAJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/TakabiAJ07a,
  author       = {Hassan Takabi and
                  Morteza Amini and
                  Rasool Jalili},
  editor       = {Ning Zhang and
                  Ajith Abraham},
  title        = {Enhancing Role-Based Access Control Model through Fuzzy Relations},
  booktitle    = {Proceedings of the Third International Symposium on Information Assurance
                  and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom},
  pages        = {131--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAS.2007.69},
  doi          = {10.1109/IAS.2007.69},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/TakabiAJ07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/TakabiAJ07,
  author       = {Hassan Takabi and
                  Morteza Amini and
                  Rasool Jalili},
  title        = {Trust-Based User-Role Assignment in Role-Based Access Control},
  booktitle    = {2007 {IEEE/ACS} International Conference on Computer Systems and Applications
                  {(AICCSA} 2007), 13-16 May 2007, Amman, Jordan},
  pages        = {807--814},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AICCSA.2007.370725},
  doi          = {10.1109/AICCSA.2007.370725},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/TakabiAJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics