Relationship-based access control policies and their policy languages PWL Fong, I Siahaan Proceedings of the 16th ACM symposium on Access control models and …, 2011 | 146 | 2011 |
Relationship-based access control: its expression and enforcement through hybrid logic G Bruns, PWL Fong, I Siahaan, M Huth Proceedings of the second ACM conference on Data and Application Security …, 2012 | 117 | 2012 |
Security-by-contract: Toward a semantics for digital signatures on mobile code N Dragoni, F Massacci, K Naliuka, I Siahaan Public Key Infrastructure: 4th European PKI Workshop: Theory and Practice …, 2007 | 96 | 2007 |
Security-by-contract on the. net platform L Desmet, W Joosen, F Massacci, P Philippaerts, F Piessens, I Siahaan, ... Information Security Technical Report 13 (1), 25-32, 2008 | 84 | 2008 |
Fast signature matching using extended finite automaton (XFA) R Smith, C Estan, S Jha, I Siahaan Information Systems Security: 4th International Conference, ICISS 2008 …, 2008 | 34 | 2008 |
Matching midlet’s security claims with a platform security policy using automata modulo theory F Massacci, I Siahaan Proc. of The 12th Nordic Workshop on Secure IT Systems (NordSec’07), 2007 | 32 | 2007 |
Matching in security-by-contract for mobile code N Bielova, N Dragoni, F Massacci, K Naliuka, I Siahaan The Journal of Logic and Algebraic Programming 78 (5), 340-358, 2009 | 31 | 2009 |
Real-time reasoning in OWL2 for GDPR compliance PA Bonatti, L Ioffredo, IM Petrova, L Sauro, IR Siahaan Artificial Intelligence 289, 103389, 2020 | 23 | 2020 |
Dynamic bandwidth management based on traffic prediction using Deep Long Short Term Memory TW Cenggoro, I Siahaan 2016 2nd International Conference on Science in Information Technology …, 2016 | 16 | 2016 |
Simulating midlet's security claims with automata modulo theory F Massacci, ISR Siahaan Proceedings of the third ACM SIGPLAN workshop on Programming languages and …, 2008 | 15 | 2008 |
Matching policies with security claims of mobile applications N Bielova, M Dalla Torre, N Dragoni, I Siahaan 2008 Third International Conference on Availability, Reliability and …, 2008 | 14 | 2008 |
Testing decision procedures for security-by-contract N Bielova, I Siahaan Joint Workshop on Foundations of Computer Security, Automated Reasoning for …, 2008 | 7 | 2008 |
Security-by-contract for the future internet F Massacci, F Piessens, I Siahaan Future Internet–FIS 2008: First Future Internet Symposium, FIS 2008 Vienna …, 2009 | 5 | 2009 |
Methodologies and tools for contract matching N Dragoni, F Massacci, K Naliuka, R Sebastiani, I Siahaan, T Quillian, ... Security of Software and Services for Mobile Systems, 2007 | 5 | 2007 |
Optimizing IRM with Automata Modulo Theory F Massacci, I Siahaan Proceedings of the 5th International Workshop on Security and Trust …, 2009 | 4 | 2009 |
Secure Routing in Wireless Sensor Networks I Siahaan, L Fernandes University of Trento. http://dit. unitn. it/~ fernand/downloads/IWSNSlides. pdf, 2008 | 4 | 2008 |
Steganography algorithm multi pixel value differencing (MPVD) to increase message capacity and data security R Rojali, ISR Siahaan, B Soewito AIP Conference Proceedings 1867 (1), 2017 | 3 | 2017 |
Privacy modelling of sensitive data in universal healthcare coverage in Indonesia I Santoso, ISR Siahaan 2016 11th International Conference on Knowledge, Information and Creativity …, 2016 | 3 | 2016 |
Secure routing in wireless sensor networks LL Fernandes, ISR Siahaan, R Passarone Report. University of Trento, 2007 | 3 | 2007 |
Sniffing serial-based substation devices: A complement to security-centric data collection K Boakye-Boateng, ISR Siahaan, AH Al Muktadir, D Xu, AA Ghorbani 2021 IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe), 1-6, 2021 | 2 | 2021 |