default search action
Smitha Sundareswaran
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j8]Dan Lin, Anna Cinzia Squicciarini, Venkata Nagarjuna Dondapati, Smitha Sundareswaran:
A Cloud Brokerage Architecture for Efficient Cloud Service Selection. IEEE Trans. Serv. Comput. 12(1): 144-157 (2019) - 2017
- [j7]Jingwei Li, Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia:
MMBcloud-Tree: Authenticated Index for Verifiable Cloud Service Selection. IEEE Trans. Dependable Secur. Comput. 14(2): 185-198 (2017) - 2015
- [j6]Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Joshua Wede:
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites. IEEE Trans. Knowl. Data Eng. 27(1): 193-206 (2015) - [i1]Jingwei Li, Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia:
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection. IACR Cryptol. ePrint Arch. 2015: 379 (2015) - 2014
- [j5]Anna Cinzia Squicciarini, Federica Paci, Smitha Sundareswaran:
PriMa: a comprehensive approach to privacy protection in social network sites. Ann. des Télécommunications 69(1-2): 21-36 (2014) - [c14]Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Jingwei Li:
Policy Driven Node Selection in MapReduce. SecureComm (1) 2014: 55-72 - 2013
- [c13]Smitha Sundareswaran, Anna Cinzia Squicciarini:
Detecting Malicious Co-resident Virtual Machines Indulging in Load-Based Attacks. ICICS 2013: 113-124 - 2012
- [j4]Smitha Sundareswaran, Anna Cinzia Squicciarini, Dan Lin:
Ensuring Distributed Accountability for Data Sharing in the Cloud. IEEE Trans. Dependable Secur. Comput. 9(4): 556-568 (2012) - [c12]Smitha Sundareswaran, Anna Cinzia Squicciarini, Dan Lin:
A Brokerage-Based Approach for Cloud Service Selection. IEEE CLOUD 2012: 558-565 - [c11]Smitha Sundareswaran, Anna Cinzia Squicciarini:
XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks. DBSec 2012: 223-238 - 2011
- [j3]Said Marouf, Mohamed Shehab, Anna Cinzia Squicciarini, Smitha Sundareswaran:
Adaptive Reordering and Clustering-Based Framework for Efficient XACML Policy Evaluation. IEEE Trans. Serv. Comput. 4(4): 300-313 (2011) - [c10]Smitha Sundareswaran, Anna Cinzia Squicciarini, Dan Lin, Shuo Huang:
Promoting Distributed Accountability in the Cloud. IEEE CLOUD 2011: 113-120 - [c9]Smitha Sundareswaran, Anna Cinzia Squicciarini:
Privacy through web-traveler policies in social network environments. CollaborateCom 2011: 466-472 - [c8]Smitha Sundareswaran, Anna Cinzia Squicciarini, Ranjani Sundareswaran:
Distributed Java-Based Content Protection. COMPSAC 2011: 420-425 - [c7]Anna Cinzia Squicciarini, Smitha Sundareswaran, Dan Lin, Joshua Wede:
A3P: adaptive policy prediction for shared images over popular content sharing sites. HT 2011: 261-270 - [c6]Anna Cinzia Squicciarini, Christopher Griffin, Smitha Sundareswaran:
Towards a Game Theoretical Model for Identity Validation in Social Network Sites. SocialCom/PASSAT 2011: 1081-1088 - 2010
- [j2]Anna Cinzia Squicciarini, Smitha Sundareswaran:
Erratum to: Web-Traveler Policies for Images on Social Networks. World Wide Web 13(3): 389 (2010) - [c5]Anna Cinzia Squicciarini, Smitha Sundareswaran, Dan Lin:
Preventing Information Leakage from Indexing in the Cloud. IEEE CLOUD 2010: 188-195 - [c4]Anna Cinzia Squicciarini, Federica Paci, Smitha Sundareswaran:
PriMa: an effective privacy protection mechanism for social networks. AsiaCCS 2010: 320-323 - [c3]Smitha Sundareswaran:
Web-traveler policies for content on social networks. CTS 2010: 653-656 - [c2]Smitha Sundareswaran, Anna Cinzia Squicciarini:
DeCore: Detecting Content Repurposing Attacks on Clients' Systems. SecureComm 2010: 199-216
2000 – 2009
- 2009
- [j1]Anna Cinzia Squicciarini, Smitha Sundareswaran:
Web-Traveler Policies for Images on Social Networks. World Wide Web 12(4): 461-484 (2009) - [c1]Said Marouf, Mohamed Shehab, Anna Cinzia Squicciarini, Smitha Sundareswaran:
Statistics & Clustering Based Framework for Efficient XACML Policy Evaluation. POLICY 2009: 118-125
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint