• Publications
  • Influence
A Brokerage-Based Approach for Cloud Service Selection
TLDR
A novel brokerage-based architecture in the Cloud is proposed, where the Cloud brokers is responsible for the service selection and a unique indexing technique for managing the information of a large number of Cloud service providers is designed. Expand
Adaptive Reordering and Clustering-Based Framework for Efficient XACML Policy Evaluation
TLDR
An adaptive approach for XACML policy optimization by applying a clustering technique to policy sets based on the K-means algorithm and reordering policies and rules in a policy set and policies respectively, which formulated and solved the optimal policy execution problem. Expand
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
TLDR
An Adaptive Privacy Policy Prediction (A3P) system to help users compose privacy settings for their images, which relies on an image classification framework for image categories which may be associated with similar policies, and a policy prediction algorithm to automatically generate a policy for each newly uploaded image according to users' social features. Expand
A3P: adaptive policy prediction for shared images over popular content sharing sites
TLDR
This work proposes an Adaptive Privacy Policy Prediction (A3P) system to help users compose privacy settings for their images and develops a policy prediction algorithm to automatically generate a policy for each newly uploaded image. Expand
Preventing Information Leakage from Indexing in the Cloud
TLDR
A three-tier data protection architecture is designed to accommodate various levels of privacy concerns by users and a novel portable data binding technique is developed to ensure strong enforcement of users' privacy requirements at server side. Expand
PriMa: an effective privacy protection mechanism for social networks
TLDR
PriMa is a privacy protection mechanism which supports semi-automated generation of access rules for users' profile information, and is dynamically adapted to the ever changing setting of the users' preferences and SN configuration. Expand
Promoting Distributed Accountability in the Cloud
TLDR
This paper proposes a novel highly decentralized information accountability framework to keep track of the actual usage of the users' data in the cloud, and leverages the programmable capability of Java JAR files to enclose the logging mechanism together with Users' data and policies. Expand
Image Repurposing for Gifar-Based Attacks
In this paper we present a light-weight and effective tool to pr tect against a type of repurposing attack vector, which exploits weaknesses in Web applications, referred to as the Gifar. A GifarExpand
Ensuring Distributed Accountability for Data Sharing in the Cloud
TLDR
This paper proposes an object-centered approach that enables enclosing the authors' logging mechanism together with users' data and policies, and leverages the JAR programmable capabilities to both create a dynamic and traveling object, and to ensure that any access to Users' data will trigger authentication and automated logging local to theJARs. Expand
PriMa: a comprehensive approach to privacy protection in social network sites
TLDR
PriMa (Privacy Manager), a privacy protection mechanism that supports semiautomated generation of access rules for users’ profile information, filling the gap between the privacy management needs of SN users and the existing SNs’ privacy protection mechanisms is proposed. Expand
...
1
2
3
...