• Publications
  • Influence
Identifying hidden social circles for advanced privacy configuration
TLDR
This work proposes an approach to facilitate online social network users to group their contacts into social circles with common interests and leverages the social group practice to automate the privacy setting process for users who add new contacts or upload new data items. Expand
Automatic social group organization and privacy management
TLDR
This work proposes an approach to facilitate online social network users to group their contacts into social circles with common interests and uses the social group practice to automate the privacy setting process for users who add new contacts or upload new data items. Expand
A Privacy-Preserving Approach for Web Service Selection and Provisioning
TLDR
This paper proposes a comprehensive framework to uniformly protect users' and service providers' privacy needs, at the time of service selection, and defines a solution that allows matching of the search criteria against the Web services attributes in a private fashion such that both criteria and service attributes are kept private during the matching. Expand
Constrained Social-Energy Minimization for Multi-Party Sharing in Online Social Networks
TLDR
This work develops a game-theoretic framework for modeling multi-party privacy decisions for shared content and proves the convergence of users' access control policies assuming a multi-round consensus-building game in which all players are fully rational. Expand
Privacy aware service selection of composite web services invited paper
TLDR
This paper proposes a comprehensive framework to uniformly protect users and service providers at the time of service selection, and includes an approach to protect service provisioning rules from unwanted disclosure, both from the user and the service provider's perspective. Expand
In the wild: a large scale study of web services vulnerabilities
TLDR
In this paper, a comprehensive study on Web Service vulnerabilities is proposed, which considers not only well known Web-based vulnerabilities such as SQL injection, session replay etc, but also Web-Service specific vulnerabilities and their potential of attacks due to poor service construction and service maintenance. Expand
Policy-Compliant Search Query Routing for Web Service Discovery in Peer to Peer Networks
TLDR
This paper introduces an efficient and fully decentralized policy-compliant search query routing method for service discovery that allows distributed searches through service queries taking into account any security, routing or other functional criteria a peer may have with respect to routing a query. Expand
Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks
TLDR
This paper proposes a cryptographic-based access control framework for vehicles to securely exchange messages in a controlled fashion by integrating moving object modeling techniques with cryptographic policies. Expand
Privacy-aware access control for message exchange in vehicular ad hoc networks
TLDR
This paper proposes a cryptographic-based access control framework for vehicles to securely exchange messages in a controlled fashion by integrating moving object modeling techniques with cryptographic policies in VANETs. Expand
A Large Scale Study of Web Service Vulnerabilities
TLDR
This paper considers not only well known Web-based vulnerabilities such as SQL injection, session replay etc, but also Web-Service specific vulnerabilities and their potential of attacks due to poor service construction and lack of service maintenance and proposes methods of detection based on real-time analysis. Expand
...
1
2
...