Search For:

Displaying 1-20 out of 20 total
Differentially Private Naive Bayes Classification
Found in: 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)
By Jaideep Vaidya,Basit Shafiq,Anirban Basu,Yuan Hong
Issue Date:November 2013
pp. 571-576
Privacy and security concerns often prevent the sharing of users' data or even of the knowledge gained from it, thus deterring valuable information from being utilized. Privacy-preserving knowledge discovery, if done correctly, can alleviate this problem. ...
Spatial Computing and Social Media in the Context of Disaster Management
Found in: IEEE Intelligent Systems
By Nabil R. Adam,Basit Shafiq,Robin Staffin
Issue Date:November 2012
pp. 90-96
The growing trend of using smartphones and other GPS-enabled devices has provided new opportunities for developing spatial computing applications and technologies in unanticipated and unprecedented ways. Some capabilities of today's smartphones highlight t...
Reachability Analysis in Privacy-Preserving Perturbed Graphs
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil Adam, Xiaodong Lin
Issue Date:September 2010
pp. 691-694
Many real world phenomena can be naturally modeled as graph structures whose nodes representing entities and whose edges representing interactions or relationships between entities. The analysis of the graph data have many practical implications. However, ...
Preserving Privacy in Social Networks: A Structure-Aware Approach
Found in: Web Intelligence and Intelligent Agent Technology, IEEE/WIC/ACM International Conference on
By Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil Adam, Vijay Atluri
Issue Date:September 2009
pp. 647-654
Graph structured data can be ubiquitously found in the real world. For example, social networks can easily be represented as graphs where the graph connotes the complex sets of relationships between members of social systems. While their analysis could be ...
Policy based Web Service Orchestration and Goal Reachability Analysis using MSC and CP Nets
Found in: E-Commerce Technology, IEEE International Conference on, and Enterprise Computing, E-Commerce, and E-Services, IEEE International Conference on
By Aabhas V. Paliwal, Nabil Adam, Basit Shafiq, Christof Bornhoevd
Issue Date:July 2007
pp. 131-140
Specification of a web services-based process (WSP) for a complex environment such as homeland security domain is a complex task. The specification task requires achieving a balance between intuitive and easy to understand process representation for the in...
Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints
Found in: Data Engineering, International Conference on
By Basit Shafiq, Arjmand Samuel, Elisa Bertino, Arif Ghafoor
Issue Date:April 2006
pp. 119
Distributed workflow based systems are widely used in various application domains including e-commerce, digital government, healthcare, manufacturing and many others. Workflows in these application domains are not restricted to the administrative boundarie...
Secure Interoperation in a Multidomain Environment Employing RBAC Policies
Found in: IEEE Transactions on Knowledge and Data Engineering
By Basit Shafiq, James B.D. Joshi, Elisa Bertino, Arif Ghafoor
Issue Date:November 2005
pp. 1557-1577
Multidomain application environments where distributed multiple organizations interoperate with each other are becoming a reality as witnessed by emerging Internet-based enterprise applications. Composition of a global coherent security policy that governs...
Distributed Access Management in Multimedia IDCs
Found in: Computer
By Rafae Bhatti, Basit Shafiq, Mohamed Shehab, Arif Ghafoor
Issue Date:September 2005
pp. 60-69
Future Internet data centers that provide multimedia content will face security challenges requiring appropriately designed policies to manage resource access. An example from the healthcare domain shows how an access-management framework can address these...
A GTRBAC Based System for Dynamic Workflow Composition and Management
Found in: Object-Oriented Real-Time Distributed Computing, IEEE International Symposium on
By Basit Shafiq, Arjmand Samuel, Halima Ghafoor
Issue Date:May 2005
pp. 284-290
In this paper, we propose an architecture for adaptive real-time workflow-based collaborative system. Such a system is needed to support real-time communication and sharing of information among predefined or ad hoc team of users collaborating with each oth...
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
Found in: Object-Oriented Real-Time Dependable Systems, IEEE International Workshop on
By Basit Shafiq, Ammar Masood, James Joshi, Arif Ghafoor
Issue Date:February 2005
pp. 13-20
<p>This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The temporal and event-based semantics of these applications can be expressed ...
Provision of Multimedia Services in a Mobile Ad Hoc Network
Found in: Object-Oriented Real-Time Dependable Systems, IEEE International Workshop on
By Waseem Sheikh, Basit Shafiq, Raymond A. Paul, Arif Ghafoor
Issue Date:October 2003
pp. 87
Recent advances in wireless technology and availability of mobile computing devices with networking capabilities have generated a lot of interest in wireless ad hoc networks for quality of service (QoS) based multimedia applications. In this paper, we addr...
Real-Time Resource Reservation for Synchronized Multimedia Object over Wireless LAN
Found in: Object-Oriented Real-Time Distributed Computing, IEEE International Symposium on
By Husni Fahmi, Mudassir Latif, Basit Shafiq, Arif Ghafoor, Ray Paul
Issue Date:May 2002
pp. 0386
The increasing use of wireless networks has necessitated the development of a wireless networking infrastructure that supports quality of service (QoS) for multimedia communications. Proxy servers are gaining prominence in facilitating QoS assurance and in...
A Random Decision Tree Framework for Privacy-preserving Data Mining
Found in: IEEE Transactions on Dependable and Secure Computing
By Jaideep Vaidya,Basit Shafiq,Wei Fan,Danish Mehmood,David Lorenzi
Issue Date:October 2013
pp. 1
Distributed data is ubiquitous in modern information driven applications. With multiple sources of data, the natural challenge is to determine how to collaborate effectively across proprietary organizational boundaries while maximizing the utility of colle...
Incorporating Privacy into the Undergraduate Curriculum
Found in: Proceedings of the 2013 on InfoSecCD '13: Information Security Curriculum Development Conference (InfoSecCD '13)
By David Lorenzi, Jaideep Vaidya, Basit Shafiq, Nazia Badar
Issue Date:October 2013
pp. 1-7
Today, our social, economic and political systems all make increasing use of the underlying computing infrastructure, and are heavily reliant on its safety and robustness. The ubiquitous collection and analysis of data through this infrastructure creates a...
Community based emergency response
Found in: Proceedings of the 14th Annual International Conference on Digital Government Research (dg.o '13)
By Basit Shafiq, David Lorenzi, Jaideep Vaidya, Nabil Adam, Soon Chun, Varuna Naik, Vijayalakshmi Atluri
Issue Date:June 2013
pp. 82-91
This paper explores the idea of government emergency response and disaster management through the lens of popular social media services. One of the traditional challenges to effective emergency response and disaster management is communication between the ...
Using QR codes for enhancing the scope of digital government services
Found in: Proceedings of the 13th Annual International Conference on Digital Government Research (dg.o '12)
By Basit Shafiq, David Lorenzi, Ghulam Nabi, Jaideep Vaidya, Soon Chun, Vijayalakshmi Atluri
Issue Date:June 2012
pp. 21-29
Digital government is universally gaining acceptance as the public becomes more technologically advanced. The government must embrace new technology to minimize costs and maximize utility of services to the taxpayer. While administrative services have been...
Privacy-preserving link discovery
Found in: Proceedings of the 2008 ACM symposium on Applied computing (SAC '08)
By Basit Shafiq, Jaideep Vaidya, Nabil Adam, Xiaoyun He
Issue Date:March 2008
pp. 28-34
Link discovery is a process of identifying association(s) among different entities included in a complex network structure. These association(s) may represent any interaction among entities, for example between people or even bank accounts. The need for li...
X-gtrbac admin: A decentralized administration model for enterprise-wide access control
Found in: ACM Transactions on Information and System Security (TISSEC)
By Arif Ghafoor, Basit Shafiq, Elisa Bertino, James B. D. Joshi, Rafae Bhatti
Issue Date:November 2005
pp. 388-423
The modern enterprise spans several functional units or administrative domains with diverse authorization requirements. Access control policies in an enterprise environment typically express these requirements as authorization constraints. While desirable ...
Access control management in a distributed environment supporting dynamic collaboration
Found in: Proceedings of the 2005 workshop on Digital identity management (DIM '05)
By Arif Ghafoor, Basit Shafiq, Elisa Bertino
Issue Date:November 2005
pp. 104-112
Ensuring secure and authorized access to remote services and information resources in a dynamic collaborative environment is a challenging task. Two major issues that need to be addressed in this regard are: specification of access control requirements and...
Dependencies and separation of duty constraints in GTRBAC
Found in: Proceedings of the eighth ACM symposium on Access control models and technologies (SACMAT '03)
By Arif Ghafoor, Basit Shafiq, Elisa Bertino, James B. D. Joshi
Issue Date:June 2003
pp. 51-64
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBAC's language constructs allow one to specify various temporal constraints on ro...