Year |
Citation |
Score |
2019 |
Lin D, Squicciarini AC, Dondapati VN, Sundareswaran S. A Cloud Brokerage Architecture for Efficient Cloud Service Selection Ieee Transactions On Services Computing. 12: 144-157. DOI: 10.1109/Tsc.2016.2592903 |
0.613 |
|
2017 |
Li J, Squicciarini AC, Lin D, Sundareswaran S, Jia C. MMB$^{cloud}$ -Tree: Authenticated Index for Verifiable Cloud Service Selection Ieee Transactions On Dependable and Secure Computing. 14: 185-198. DOI: 10.1109/Tdsc.2015.2445752 |
0.614 |
|
2015 |
Squicciarini AC, Lin D, Sundareswaran S, Wede J. Privacy policy inference of user-uploaded images on content sharing sites Ieee Transactions On Knowledge and Data Engineering. 27: 193-206. DOI: 10.1109/Tkde.2014.2320729 |
0.718 |
|
2015 |
Squicciarini AC, Lin D, Sundareswaran S, Li J. Policy driven node selection in mapreduce Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering, Lnicst. 152: 55-72. DOI: 10.1007/978-3-319-23829-6_5 |
0.655 |
|
2014 |
Squicciarini AC, Paci F, Sundareswaran S. PriMa: A comprehensive approach to privacy protection in social network sites Annales Des Telecommunications/Annals of Telecommunications. 69: 21-36. DOI: 10.1007/S12243-013-0371-X |
0.73 |
|
2013 |
Sundareswaran S, Squcciarini AC. Detecting malicious co-resident virtual machines indulging in load-based attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8233: 113-124. DOI: 10.1007/978-3-319-02726-5_9 |
0.36 |
|
2012 |
Sundareswaran S, Squicciarini A, Lin D. Ensuring distributed accountability for data sharing in the cloud Ieee Transactions On Dependable and Secure Computing. 9: 556-568. DOI: 10.1109/Tdsc.2012.26 |
0.718 |
|
2012 |
Sundareswaran S, Squicciarini A, Lin D. A brokerage-based approach for cloud service selection Proceedings - 2012 Ieee 5th International Conference On Cloud Computing, Cloud 2012. 558-565. DOI: 10.1109/CLOUD.2012.119 |
0.325 |
|
2012 |
Sundareswaran S, Squicciarini AC. XSS-Dec: A hybrid solution to mitigate cross-site scripting attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7371: 223-238. DOI: 10.1007/978-3-642-31540-4_17 |
0.631 |
|
2011 |
Sundareswaran S, Squicciarini AC. Privacy through web-traveler policies in social network environments Coliaboratecom 2011 - Proceedings of the 7th International Conference On Collaborative Computing: Networking, Applications and Worksharing. 466-472. DOI: 10.4108/icst.collaboratecom.2011.247169 |
0.724 |
|
2011 |
Squicciarini A, Sundareswaran S, Lin D, Wede J. A3P: Adaptive policy prediction for shared images over popular content sharing sites Ht 2011 - Proceedings of the 22nd Acm Conference On Hypertext and Hypermedia. 261-270. DOI: 10.1145/1995966.1996000 |
0.492 |
|
2011 |
Marouf S, Shehab M, Squicciarini A, Sundareswaran S. Adaptive reordering and clustering-based framework for efficient XACML policy evaluation Ieee Transactions On Services Computing. 4: 300-313. DOI: 10.1109/Tsc.2010.28 |
0.604 |
|
2011 |
Squicciarini AC, Griffin C, Sundareswaran S. Towards a game theoretical model for identity validation in social network sites Proceedings - 2011 Ieee International Conference On Privacy, Security, Risk and Trust and Ieee International Conference On Social Computing, Passat/Socialcom 2011. 1081-1088. DOI: 10.1109/PASSAT/SocialCom.2011.208 |
0.683 |
|
2011 |
Sundareswaran S, Squicciarini A, Sundareswaran R. Distributed java-based content protection Proceedings - International Computer Software and Applications Conference. 420-425. DOI: 10.1109/COMPSAC.2011.62 |
0.428 |
|
2011 |
Sundareswaran S, Squicciarini A, Lin D, Huang S. Promoting distributed accountability in the cloud Proceedings - 2011 Ieee 4th International Conference On Cloud Computing, Cloud 2011. 113-120. DOI: 10.1109/CLOUD.2011.57 |
0.551 |
|
2010 |
Squicciarini A, Paci F, Sundareswaran S. PriMa: An effective privacy protection mechanism for social networks Proceedings of the 5th International Symposium On Information, Computer and Communications Security, Asiaccs 2010. 320-323. DOI: 10.1145/1755688.1755729 |
0.509 |
|
2010 |
Sundareswaran S. Web-traveler policies for content on social networks 2010 International Symposium On Collaborative Technologies and Systems, Cts 2010. 653-656. DOI: 10.1109/CTS.2010.5478445 |
0.44 |
|
2010 |
Squicciarini A, Sundareswaran S, Lin D. Preventing information leakage from indexing in the cloud Proceedings - 2010 Ieee 3rd International Conference On Cloud Computing, Cloud 2010. 188-195. DOI: 10.1109/CLOUD.2010.82 |
0.46 |
|
2010 |
Squicciarini AC, Sundareswaran S. Erratum to: Web-Traveler Policies for Images on Social Networks World Wide Web. 13: 389-389. DOI: 10.1007/S11280-010-0085-1 |
0.725 |
|
2010 |
Sundareswaran S, Squicciarini AC. DeCore: Detecting content repurposing attacks on clients' systems Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 50: 199-216. DOI: 10.1007/978-3-642-16161-2_12 |
0.69 |
|
2010 |
Sundareswaran S, Squicciarini AC. Image repurposing for Gifar-based attacks 7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, Ceas 2010. |
0.688 |
|
2009 |
Marouf S, Shehab M, Squicciarini A, Sundareswaran S. Statistics & clustering based framework for efficient XACML policy evaluation Proceedings - 2009 Ieee International Symposium On Policies For Distributed Systems and Networks, Policy 2009. 118-125. DOI: 10.1109/POLICY.2009.36 |
0.319 |
|
2009 |
Squicciarini AC, Sundareswaran S. Web-traveler policies for images on social networks World Wide Web. 12: 461-484. DOI: 10.1007/S11280-009-0070-8 |
0.73 |
|
Show low-probability matches. |