Shehab, Mohamed

UNCC

There are 3 item/s.

TitleDateViewsBrief Description
Clustering and recommendation techniques for access control policy management 2012 458 Managing access control policies can be a daunting process, given the frequent policy decisions that need to be made, and the potentially large number of policy rules involved. Policy management includes, but is not limited to: policy optimization,...
USER CENTRIC POLICY MANAGEMENT 2013 799 Internet use, in general, and online social networking sites, in particular, are ex- periencing tremendous growth with hundreds of millions of active users. As a result, there is a tremendous amount of privacy information and content online. Protec...
User-centric secure cross-site interaction framework for online social networking services 2011 523 Social networking service is one of major technological phenomena on Web 2.0. Hun- dreds of millions of users are posting message, photos, and videos on their profiles and interacting with other users, but the sharing and interaction are limited wi...