default search action
Mohamed Shehab
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c67]Elham Al Qahtani, Peter Story, Mohamed Shehab:
The Impact of Risk Appeal Approaches on Users' Sharing Confidential Information. CHI 2024: 579:1-579:21 - [c66]Elham Al Qahtani, Yousra Javed, Sarah Tabassum, Mohamed Shehab:
Replication: What Would Motivate Users to Use Gmail's Confidential Mode? HICSS 2024: 7645-7654 - 2023
- [j26]Elham Al Qahtani, Yousra Javed, Sarah Tabassum, Lipsarani Sahoo, Mohamed Shehab:
Managing Access to Confidential Documents: A Case Study of an Email Security Tool. Future Internet 15(11): 356 (2023) - [c65]Lipsarani Sahoo, Mohamed Shehab:
I Have No Idea What Are These Terms! Exploring Users' Understanding and Interpretation of Genealogy Results. HCI (45) 2023: 141-148 - [c64]Hussein Hazazi, Mohamed Shehab:
Exploring the Usability, Security, and Privacy of Smart Locks from the Perspective of the End User. SOUPS 2023: 559-577 - [e1]Mohamed Shehab, Maribel Fernández, Ninghui Li:
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023. ACM 2023 [contents] - 2022
- [j25]Elham Al Qahtani, Yousra Javed, Mohamed Shehab:
User Perceptions of Gmail's Confidential Mode. Proc. Priv. Enhancing Technol. 2022(1): 187-206 (2022) - [c63]Elham Al Qahtani, Lipsarani Sahoo, Yousra Javed, Mohamed Shehab:
"Why would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA. SACMAT 2022: 139-150 - 2021
- [j24]Usman Rauf, Mohamed Shehab, Nafees Qamar, Sheema Sameen:
Formal approach to thwart against insider attacks: A bio-inspired auto-resilient policy regulation framework. Future Gener. Comput. Syst. 117: 412-425 (2021) - [j23]Yousra Javed, Elham Al Qahtani, Mohamed Shehab:
Privacy Policy Analysis of Banks and Mobile Money Services in the Middle East. Future Internet 13(1): 10 (2021) - [c62]Elham Al Qahtani, Lipsarani Sahoo, Mohamed Shehab:
The Effectiveness of Video Messaging Campaigns to Use 2FA. HCI (27) 2021: 369-390 - [c61]Md. Nazmus Sakib Miazi, Heather Lipford, Mohamed Shehab:
Exploring Perceptions of a Localized Content-Sharing System Using Users-as-Beacons. INTERACT (2) 2021: 351-372 - 2020
- [j22]Yousra Javed, Khondaker Musfakus Salehin, Mohamed Shehab:
A Study of South Asian Websites on Privacy Compliance. IEEE Access 8: 156067-156083 (2020) - [c60]Elham Al Qahtani, Yousra Javed, Heather Lipford, Mohamed Shehab:
Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan. EuroS&P Workshops 2020: 150-159 - [c59]Yousra Javed, Elham Al Qahtani, Mohamed Shehab:
The Impact of Advertisements on User Attention During Permission Authorization. HCI (41) 2020: 722-739
2010 – 2019
- 2019
- [c58]Usman Rauf, Mohamed Shehab, Nafees Qamar, Sheema Sameen:
Bio-inspired Approach to Thwart Against Insider Threats: An Access Control Policy Regulation Framework. BICT 2019: 39-57 - [c57]Emmanuel Bello-Ogunu, Mohamed Shehab, Md. Nazmus Sakib Miazi:
Privacy Is The Best Policy: A Framework for BLE Beacon Privacy Management. COMPSAC (1) 2019: 823-832 - [i2]Yousra Javed, Mohamed Shehab:
Visual Analysis of Photo Policy Misconfigurations Using Treemaps. CoRR abs/1903.02612 (2019) - [i1]Yousra Javed, Boyd Davis, Mohamed Shehab:
Seniors' Media Preference for Receiving Internet Security Information: A Pilot Study. CoRR abs/1903.02618 (2019) - 2018
- [c56]Abeer Al Jarrah, Mohamed Shehab:
CordovaConfig: A Tool for Mobile Hybrid Apps' Configuration. MUM 2018: 161-170 - [c55]Md. Nazmus Sakib Miazi, Carlos Alberto Campos Castro, Mohamed Shehab:
Mobile Users as Advertisers: User Perceptions of Product Sensitivity, Exposure, and Public Influence. MUM 2018: 253-264 - [c54]Min-Ju Kim, Mohamed Shehab, Hyo-Cheol Lee, Seok-Won Lee:
Trust-Aware Goal Modeling from Use Case for Cooperative Self-Adaptive Systems. SMC 2018: 4405-4410 - [c53]Elham Al Qahtani, Mohamed Shehab, Abrar Aljohani:
The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians. SOUPS @ USENIX Security Symposium 2018: 31-46 - 2017
- [j21]Yousra Javed, Mohamed Shehab:
Look before you Authorize: Using Eye-Tracking to Enforce User Attention towards Application Permissions. Proc. Priv. Enhancing Technol. 2017(2): 23-37 (2017) - [j20]Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Ehab Al-Shaer, Mohamed Shehab:
Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids. IEEE Trans. Dependable Secur. Comput. 14(2): 221-234 (2017) - [c52]Yousra Javed, Mohamed Shehab, Emmanuel Bello-Ogunu:
Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology. ARES 2017: 35:1-35:6 - [c51]Abeer Al Jarrah, Mohamed Shehab:
The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration Model. ARES 2017: 57:1-57:10 - [c50]Fadi Mohsen, Mohamed Shehab:
Proposing and Testing New Security Cue Designs for OAuth-WebView-Embedded Mobile Applications. CIC 2017: 443-448 - [c49]Md. Nazmus Sakib Miazi, Mir Mehedi A. Pritom, Mohamed Shehab, Bill Chu, Jinpeng Wei:
The Design of Cyber Threat Hunting Games: A Case Study. ICCCN 2017: 1-6 - [c48]Yousra Javed, Mohamed Shehab:
Towards Improving Comprehension of Touch ID Authentication with Smartphone Applications. PAC 2017: 206-207 - 2016
- [j19]Emmanuel Bello-Ogunu, Mohamed Shehab:
Crowdsourcing for Context: Regarding Privacy in Beacon Encounters via Contextual Integrity. Proc. Priv. Enhancing Technol. 2016(3): 83-95 (2016) - [j18]Mohamed Shehab, Hakim Touati, Yousra Javed:
Semi-supervised policy recommendation for online social networks. Soc. Netw. Anal. Min. 6(1): 61:1-61:12 (2016) - [c47]Fadi Mohsen, Mohamed Shehab:
Hardening the OAuth-WebView Implementations in Android Applications by Re-Factoring the Chromium Library. CIC 2016: 196-205 - [c46]Fadi Mohsen, Mohamed Shehab:
The Listening Patterns to System Events by Benign and Malicious Android Apps. CIC 2016: 546-553 - [c45]Abeer Al Jarrah, Mohamed Shehab:
Maintaining User Interface Integrity on Android. COMPSAC 2016: 449-458 - [c44]Yousra Javed, Mohamed Shehab:
Investigating the Animation of Application Permission Dialogs: A Case Study of Facebook. DPM/QASA@ESORICS 2016: 146-162 - [c43]Emanuela Marasco, Mohamed Shehab, Bojan Cukic:
A Methodology for Prevention of Biometric Presentation Attacks. LADC 2016: 9-14 - 2015
- [j17]Salmin Sultana, Gabriel Ghinita, Elisa Bertino, Mohamed Shehab:
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 12(3): 256-269 (2015) - [c42]Jafar Haadi Jafarian, Hassan Takabi, Hakim Touati, Ehsan Hesamifard, Mohamed Shehab:
Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach. SACMAT 2015: 211-220 - 2014
- [j16]Gorrell P. Cheek, Mohamed Shehab:
Human Effects of Enhanced Privacy Management Models. IEEE Trans. Dependable Secur. Comput. 11(2): 142-154 (2014) - [c41]Fadi Mohsen, Mohamed Shehab, Emmanuel Bello-Ogunu, Abeer Al Jarrah:
POSTER: Android System Broadcast Actions Broadcasts Your Privacy. CCS 2014: 1484-1486 - [c40]Mohamed Shehab, Fadi Mohsen:
Securing OAuth implementations in smart phones. CODASPY 2014: 167-170 - [c39]Emmanuel Bello-Ogunu, Mohamed Shehab:
PERMITME: integrating android permissioning support in the IDE. ETX 2014: 15-20 - [c38]Mohamed Shehab, Fadi Mohsen:
Towards Enhancing the Security of OAuth Implementations in Smart Phones. IEEE MS 2014: 39-46 - [c37]Mohamed Shehab, Abeer Al Jarrah:
Reducing Attack Surface on Cordova-based Hybrid Mobile Apps. MobileDeLi 2014: 1-8 - 2013
- [j15]Wenjuan Xu, Mohamed Shehab, Gail-Joon Ahn:
Visualization-based policy analysis for SELinux: framework and user study. Int. J. Inf. Sec. 12(3): 155-171 (2013) - [j14]Mohamed Shehab, Moonam Ko, Hakim Touati:
Enabling cross-site interactions in social networks. Soc. Netw. Anal. Min. 3(1): 93-106 (2013) - [j13]Salmin Sultana, Mohamed Shehab, Elisa Bertino:
Secure Provenance Transmission for Streaming Data. IEEE Trans. Knowl. Data Eng. 25(8): 1890-1903 (2013) - [c36]Mohammad Rashedul Hasan, Mohamed Shehab, Ali Noorollahiravari:
Game-theoretic approach for user migration in Diaspora. ASONAM 2013: 28-32 - [c35]Gorrell P. Cheek, Mohamed Shehab:
Usable object management approaches for online social networks. ASONAM 2013: 541-547 - [c34]Fadi Mohsen, Mohamed Shehab:
Android keylogging threat. CollaborateCom 2013: 545-552 - [c33]Yousra Javed, Mohamed Shehab:
Access Control Policy Misconfiguration Detection in Online Social Networks. SocialCom 2013: 544-549 - [c32]Christopher Hudel, Mohamed Shehab:
Optimizing search for malware by hashing smaller amounts of data. WorldCIS 2013: 112-117 - 2012
- [j12]Mohamed Shehab, Anna Cinzia Squicciarini, Gail-Joon Ahn, Irini Kokkinou:
Access control for online social networks third party applications. Comput. Secur. 31(8): 897-911 (2012) - [j11]Gail-Joon Ahn, Jing Jin, Mohamed Shehab:
Policy-driven role-based access management for ad-hoc collaboration. J. Comput. Secur. 20(2-3): 223-257 (2012) - [j10]Mohamed Shehab, Said Marouf:
Recommendation Models for Open Authorization. IEEE Trans. Dependable Secur. Comput. 9(4): 583-596 (2012) - [c31]Yousra Javed, Mohamed Shehab:
How do Facebookers Use Friendlists. ASONAM 2012: 343-347 - [c30]Mohamed Shehab, Hakim Touati:
Semi-Supervised Policy Recommendation for Online Social Networks. ASONAM 2012: 360-367 - [c29]Said Marouf, Mohamed Shehab:
Towards improving browser extension permission management and user awareness. CollaborateCom 2012: 695-702 - [c28]Mohamed Shehab, Saeed Al-Haj, Salil Bhagurkar, Ehab Al-Shaer:
Anomaly Discovery and Resolution in MySQL Access Control Policies. DEXA (2) 2012: 514-522 - [c27]Salmin Sultana, Gabriel Ghinita, Elisa Bertino, Mohamed Shehab:
A Lightweight Secure Provenance Scheme for Wireless Sensor Networks. ICPADS 2012: 101-108 - [c26]Said Marouf, Mohamed Shehab, Adharsh Desikan:
REM: A runtime browser extension manager with fine-grained access control. PST 2012: 231-232 - [c25]Gorrell P. Cheek, Mohamed Shehab:
Policy-by-example for online social networks. SACMAT 2012: 23-32 - [c24]Mohammad Ashiqur Rahman, Libin Bai, Mohamed Shehab, Ehab Al-Shaer:
Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid. TrustCom 2012: 279-286 - [c23]Mohamed Shehab, Moonam Ko, Hakim Touati:
Social Networks Profile Mapping Using Games. WebApps 2012: 27-38 - [c22]Gorrell P. Cheek, Mohamed Shehab:
Privacy management for online social networks. WWW (Companion Volume) 2012: 475-476 - 2011
- [j9]Gail-Joon Ahn, Mohamed Shehab, Anna Cinzia Squicciarini:
Security and Privacy in Social Networks. IEEE Internet Comput. 15(3): 10-12 (2011) - [j8]Said Marouf, Mohamed Shehab, Anna Cinzia Squicciarini, Smitha Sundareswaran:
Adaptive Reordering and Clustering-Based Framework for Efficient XACML Policy Evaluation. IEEE Trans. Serv. Comput. 4(4): 300-313 (2011) - [c21]Napoleon Paxton, Gail-Joon Ahn, Mohamed Shehab:
MasterBlaster: Identifying Influential Players in Botnet Transactions. COMPSAC 2011: 413-419 - [c20]Salmin Sultana, Elisa Bertino, Mohamed Shehab:
A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks. ICDCS Workshops 2011: 332-338 - [c19]Gorrell P. Cheek, Mohamed Shehab, Truong Ung, Ebonie Williams:
iLayer: Toward an Application Access Control Framework for Content Management Systems. POLICY 2011: 65-72 - [c18]Said Marouf, Mohamed Shehab:
SEGrapher: Visualization-based SELinux Policy Analysis. SafeConfig 2011 - [c17]Moonam Ko, Hakim Touati, Mohamed Shehab:
Enabling Cross-Site Content Sharing between Social Networks. SocialCom/PASSAT 2011: 493-496 - [c16]Mohamed Shehab, Said Marouf, Christopher Hudel:
ROAuth: recommendation based open authorization. SOUPS 2011: 11 - 2010
- [j7]Moonam Ko, Gorrell P. Cheek, Mohamed Shehab, Ravi S. Sandhu:
Social-Networks Connect Services. Computer 43(8): 37-43 (2010) - [j6]Anna Cinzia Squicciarini, Mohamed Shehab, Joshua Wede:
Privacy policies for shared content in social network sites. VLDB J. 19(6): 777-796 (2010) - [c15]Said Marouf, Doan Minh Phuong, Mohamed Shehab:
A learning-based approach for SELinux policy optimization with type mining. CSIIRW 2010: 70 - [c14]Mohamed Shehab, Gorrell P. Cheek, Hakim Touati, Anna Cinzia Squicciarini, Pau-Chen Cheng:
User Centric Policy Management in Online Social Networks. POLICY 2010: 9-13 - [c13]Mohamed Shehab, Gorrell P. Cheek, Hakim Touati, Anna Cinzia Squicciarini, Pau-Chen Cheng:
Learning based access control in online social networks. WWW 2010: 1179-1180
2000 – 2009
- 2009
- [c12]Gail-Joon Ahn, Moonam Ko, Mohamed Shehab:
Privacy-Enhanced User-Centric Identity Management. ICC 2009: 1-5 - [c11]Said Marouf, Mohamed Shehab, Anna Cinzia Squicciarini, Smitha Sundareswaran:
Statistics & Clustering Based Framework for Efficient XACML Policy Evaluation. POLICY 2009: 118-125 - [c10]Andrew Besmer, Heather Richter Lipford, Mohamed Shehab, Gorrell P. Cheek:
Social applications: exploring a more secure framework. SOUPS 2009 - [c9]Anna Cinzia Squicciarini, Mohamed Shehab, Federica Paci:
Collective privacy management in social networks. WWW 2009: 521-530 - 2008
- [j5]Mohamed Shehab, Elisa Bertino, Arif Ghafoor:
Watermarking Relational Databases Using Optimization-Based Techniques. IEEE Trans. Knowl. Data Eng. 20(1): 116-129 (2008) - [j4]Mohamed Shehab, Arif Ghafoor, Elisa Bertino:
Secure Collaboration in a Mediator-Free Distributed Environment. IEEE Trans. Parallel Distributed Syst. 19(10): 1338-1351 (2008) - [c8]Mohamed Shehab, Anna Cinzia Squicciarini, Gail-Joon Ahn:
Beyond User-to-User Access Control for Online Social Networks. ICICS 2008: 174-189 - [c7]Mohamed Shehab, Elisa Bertino, Arif Ghafoor:
Proactive Role Discovery in Mediator-Free Environments. Peer-to-Peer Computing 2008: 150-159 - [c6]Wenjuan Xu, Mohamed Shehab, Gail-Joon Ahn:
Visualization based policy analysis: case study in SELinux. SACMAT 2008: 165-174 - [c5]Gail-Joon Ahn, Moonam Ko, Mohamed Shehab:
Portable User-Centric Identity Management. SEC 2008: 573-587 - 2007
- [j3]Mohamed Shehab, Kamal Bhattacharya, Arif Ghafoor:
Web services discovery in secure collaboration environments. ACM Trans. Internet Techn. 8(1): 5 (2007) - [c4]Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin Hu:
Towards trust-aware access management for ad-hoc collaborations. CollaborateCom 2007: 41-48 - 2006
- [j2]Mohamed Shehab, Elisa Bertino, Arif Ghafoor:
Workflow authorisation in mediator-free environments. Int. J. Secur. Networks 1(1/2): 2-12 (2006) - 2005
- [j1]Rafae Bhatti, Basit Shafiq, Mohamed Shehab, Arif Ghafoor:
Distributed Access Management in Multimedia IDCs. Computer 38(9): 60-69 (2005) - [c3]Mohamed Shehab, Elisa Bertino, Arif Ghafoor:
Secure collaboration in mediator-free environments. CCS 2005: 58-67 - [c2]Mohamed Shehab, Elisa Bertino, Arif Ghafoor:
SERAT: SEcure role mApping technique for decentralized secure interoperability. SACMAT 2005: 159-167 - [c1]Mohamed Shehab, Elisa Bertino, Arif Ghafoor:
Efficient hierarchical key generation and key diffusion for sensor networks. SECON 2005: 76-84
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint