Publications

Refereed Journals

  1. Elham Al Qahtani, Yousra Javed, and Mohamed Shehab. “User Perceptions of Gmail’s Confidential Mode”, Proceedings on Privacy Enhancing Technologies, vol.2022, no.1, 2022, pp.187-206. 
[doi]
  2. Usman Rauf, Mohamed Shehab, Nafees Qamar, Sheema Sameen, Formal approach to thwart against insider attacks: A bio-inspired auto-resilient policy regulation framework, Future Generation Computer Systems, Volume 117, 2021. 
[doi]
  3. Yousra Javed, Elham Al Qahtani, Mohamed Shehab, Privacy Policy Analysis of Banks and Mobile Money Services in the Middle East. Future Internet. 2021; 13(1):10.
[doi]
  4. Yousra Javed, Khondaker Musfakus Salehin, Mohamed Shehab, A Study of South Asian Websites on Privacy Compliance, IEEE Access, Volume 8, 2020.
 [doi]
  5. Donna M Kazemi, Brian Borsari, Maureen J Levine, Shaoyu Li, Mohamed Shehab, Fang Fang, Jerika C Norona, Effectiveness of a Theory-Based mHealth Intervention for High-Risk Drinking in College Student, Journal Substance Use & Misuse, Volume 55, Issue 10, May 2020. [doi]
  6. Donna Kazemi, Brian Borsari, Maureen J Levine, Mohamed Shehab, Monica Nelson, Beau Dooley, Betria Stinson, Fang Fang, Shaoyu Li, Real-time demonstration of a mHealth app designed to reduce college students hazardous drinking, Psychological Services, Volume 16, Issue 2, May 2019. [doi]
  7. Abeer AlJarrah, Michael Thomas, Mohamed Shehab, “Investigating temporal access in a flipped classroom: procrastination persists”, in International Journal of Educational Technology in Higher Education. Volume 15, Issue 1, 2018. 
[doi]
  8. Yousra Javed, Mohamed Shehab, “Look Before You Authorize: Using Eye-Tracking To Enforce User Attention Towards Application Permissions”, Proceedings on Privacy Enhancing Technologies. Volume 2017, Issue 2, Pages 23-37, 2017.[doi]
  9. Mohamed Shehab, Hakim Touati, Yousra Javed, “Semi-Supervised Policy Recommendation for Online Social Networks”, Social Network Analysis and Mining (SNAM), Volume 6, Issue 1, 2016. [doi]
  10. Emmanuel Bello-Ogunu, Mohamed Shehab, “Crowdsourcing for Context: Regarding Privacy in Beacon Encounters via Contextual Integrity”. Proceedings on Privacy Enhancing Technologies. Volume 2016, Issue 3, Pages 83–95, May 2016. [doi][PDF]
  11. Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Ehab S. Al-Shaer and Mohamed Shehab, “Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids,” in IEEE Transactions on Dependable and Secure Computing, vol.PP, no.99, 2015. [doi][PDF]
  12. Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Ehab S. Al-Shaer and Mohamed Shehab, “Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids,” in IEEE Transactions on Dependable and Secure Computing, vol.PP, no.99, 2015. [doi]
  13. Boyd H. Davis, Mohamed Shehab, Dena Shenk and Mary A. Nies, E-mobile pilot for community-based dementia caregivers identifies desire for security, Gerontechnology (International Journal on the Fundamental Aspects of Technology to Serve the Ageing Society), 13(3):332-336, 2015. [doi]
  14. Gorrell Cheek, Mohamed Shehab, Human Effects of Enhanced Privacy Management Models, IEEE Transactions on Dependable and Secure Computing, (vol. 11(2), March-April 2014.[doi][PDF]
  15. Boyd H. Davis, Mary A. Nies, Mohamed Shehab, and Dena Shenk, “Developing a pilot e-mobile app for dementia caregiver support:  Lessons learned”, Online Journal of Nursing Informatics (OJNI), vol. 18(1), 2014. [doi]
  16. Salmin Sultana, Gabriel Ghinita, Elisa Bertino, and Mohamed Shehab, A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks, IEEE Transactions on Dependable and Secure Computing, PP(99), October 2013.[doi][PDF]
  17. Salmin Sultana, Mohamed Shehab, Elisa Bertino, “Secure Provenance Transmission for Streaming Data”, IEEE Transactions on Knowledge and Data Engineering,  vol.25, no.8, pp.1890,1903, Aug. 2013. (Impact factor: 1.851, 5-Y Impact factor: 2.899) [doi][PDF]
  18. Mohamed Shehab, Anna Squicciarini, Gail-Joon Ahn, Irini Kokkinou, Access Control for Online Social Networks Third Party Applications, Computer & Security, 31(8), November 2012. (Impact factor: 0.889, 5-Y Impact factor: 1.311) [doi][PDF]
  19. Gail-Joon Ahn, Jing Jin, Mohamed Shehab, “Policy-driven Role-Based Access Management for Ad-hoc Collaboration”, Journal of Computer Security, 20(2-3), Pages:223-257, 2012. [doi]
  20. Mohamed Shehab, Said Marouf, “Recommendation Models for Open Authorization”, IEEE Transactions on Dependable and Secure Computing, 9(4), Pages:583-596, July-Aug. 2012. (Impact factor: 1.409, 5-Y Impact factor: 2.096) [doi][PDF]
  21. Mohamed Shehab, Moo Nam Ko, Hakim Touati, “Enabling Cross-Site Interactions in Social Networks”, Social Network Analysis and Mining (SNAM), Springer Wien, 2012. [doi][PDF]
  22. Said Marouf, Mohamed Shehab, Anna Cinzia Squicciarini, and Smitha Sundareswaran, “Adaptive Reordering and Clustering-Based Framework for Efficient XACML Policy Evaluation”, IEEE Transactions on Services Computing (TSC), 4(4), Pages:300-313, Oct.-Dec. 2011.  [doi][PDF]
  23. Moo Nam Ko, Gorrell Cheek, Mohamed Shehab, and Ravi Sandhu, “Social-Networks Connect Services”, IEEE Computer (Cover Feature), 43(8), August 2010. (Impact factor: 2.514, 5-Y Impact factor: 2.467) [doi][PDF]
  24. Anna C. Squicciarini, Mohamed Shehab, and Joshua Wede, “Privacy Policies for Shared Content in Social Network Sites”, The VLDB Journal, Springer Berlin, 19(6), 2010. (Impact factor: 2.198, 5-Y Impact factor: 4.479) [doi][PDF]
  25. Mohamed Shehab, Arif Ghafoor, and Elisa Bertino, “Secure Collaboration in a Mediator-Free Distributed Environment”, IEEE Transactions on Parallel and Distributed Systems (TPDS), 19(10), Page:1338-1351, Oct. 2008.  (Impact factor: 1.575, 5-Y Impact factor: 1.992) [doi][PDF]
  26. Mohamed Shehab, Elisa Bertino, Arif Ghafoor, “Watermarking Relational Databases using Optimization Based Techniques”, IEEE Transactions of Knowledge and Data Engineering (TKDE), 20(1), Pages:116-129, Jan. 2008.  (Impact factor: 1.851, 5-Y Impact factor: 2.899) [doi][PDF]
  27. Mohamed Shehab, Kamal Bhattacharya, and Arif Ghafoor, “Web Services Discovery in Secure Collaboration Environments”, ACM Transactions on Internet Technology (TOIT), 8(1), 2008. (Impact factor: 1.118) [doi][PDF]
  28. Mohamed Shehab, Elisa Bertino, and Arif Ghafoor, “Workflow Authorisation in Mediator-free Environments”, International Journal of Security and Networks, 1(1), 2006. [doi][PDF]
  29. Rafae Bhatti, Basit Shafiq, Mohamed Shehab, and Arif Ghafoor, “Distributed Access Management in Multimedia IDCs”, IEEE Computer, 38(9), September 2005.  (Impact factor: 2.514, 5-Y Impact factor: 2.467) [doi][PDF]

Book Chapters

  1. Arjmand Samuel, Basit Shafiq, Ammar Masood, Haseeb Amjad, Rafae Bhatti, Mohamed Shehab, and Arif Ghafoor, Secure Collaboration among Distributed Systems and Services, Breakthroughs in Enterprise Computing, IDEAS Group, 2005.

Refereed Conferences, Symposia and Workshops

  1. Elham Al Qahtani, Lipsarani Sahoo, Mohamed Shehab, The Effectiveness of Video Messaging Campaigns to Use 2FA. HCI (27) 2021: 369-390
  2. Md. Nazmus Sakib Miazi, Heather Lipford, Mohamed Shehab, Exploring Perceptions of a Localized Content-Sharing System Using Users-as-Beacons. INTERACT (2) 2021: 351-372
  3. Elham Al Qahtani, Yousra Javed, Heather Lipford, Mohamed Shehab, Do Women in Conservative Societies (Not) Follow Smartphone Security Advice? A Case Study of Saudi Arabia and Pakistan. EuroS&P Workshops 2020: 150-159.
  4. Yousra Javed, Elham Al Qahtani, Mohamed Shehab, The Impact of Advertisements on User Attention During Permission Authorization, In Proceedings of HCI International 2020, Copenhagen, Denmark, 19-24 July 2020
  5. Usman Rauf, Mohamed Shehab, Nafees Qamar, Sheema Sameen, Bio-inspired Approach to Thwart Against Insider Threats: An Access Control Policy Regulation Framework. In Proceedings of International Conference on Bio-inspired Information and Communication Technologies – 11th EAI International Conference (BICT 2019), Pittsburgh, PA, USA, March 13-14, 2019.
  6. Emmanuel Bello-Ogunu, Mohamed Shehab, Md. Nazmus Sakib Miazi, Privacy Is The Best Policy: A Framework for BLE Beacon Privacy Management, In Proceedings of 43rd IEEE Annual Computer Software and Applications Conference (COMPSAC 2019), Milwaukee, WI, USA, July 15-19, 2019.
  7. Abeer AlJarrah, Mohamed Shehab, Closer Look at Mobile Hybrid Apps Configurations: Statistics and Implications, In Proceedings of Advances in Information and Communication (FICC 2019), Lecture Notes in Networks and Systems, vol 70. Springer.
  8. Donna M Kazemi, Maureen Levine, Brian Borsari, Beau Dooley, Shaoyu Li, Mohamed Shehab, MHealth Intervention delivered in Real Time to Reduce Alcohol Use among College Students: A Mixed Methods Study, In Proceedings of the American Public Health Association (APHA) 2018 Annual Meeting & Expo, San Diego CA, November 10-14, 2018
  9. Abeer AlJarrah, Mohamed Shehab, CordovaConfig: A Tool for Mobile Hybrid Apps’ Configuration. In Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia (MUM 2018), Cairo, Egypt — November 25 – 28, 2018.
  10. Nazmus Sakib Miazi, Carlos Alberto Campos Castro, and Mohamed Shehab. Mobile Users as Advertisers: User Perceptions of Product Sensitivity, Exposure, and Public Influence. In Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia (MUM 2018), Cairo, Egypt — November 25 – 28, 2018
  11. Elham Al Qahtani and Mohamed Shehab and Abrar Aljohani, The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians, In the Proceedings of the 14th Symposium on Usable Privacy and Security (SOUPS 2018), Baltimore, MD, USA, August 12–14, 2018.
  12. Min-Ju Kim, Mohamed Shehab, Hyo-Cheol Lee, Seok-Won Lee, “Trust-Aware Goal Modeling from Use Case for Cooperative Self-Adaptive Systems,” In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics (SMC), Miyazaki, Japan, 2018.
  13. Fadi Mohsen, Mohamed Shehab, Proposing and Testing New Security Cue Designs for OAuth-WebView-Embedded Mobile Applications, In the Proceedings of IEEE 3rd International Conference on Collaboration and Internet Computing (CIC), San Jose, CA, 2017.
  14. Yousra Javed, Mohamed Shehab, Emmanuel Bello-Ogunu, “Investigating User Comprehension and Risk Perception of Apple’s Touch ID Technology”.  In Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 – September 01, 2017.
  15. Abeer AlJarrah, Mohamed Shehab. “The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration Model”. In Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 – September 01, 2017.
  16. Fadi Mohsen, Mohamed Shehab, “The Listening Patterns to System Events by Benign and Malicious Android Apps”, In Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing (CIC), Pittsburgh, PA, USA, November 1-3, 2016.
  17. Fadi Mohsen, Mohamed Shehab, “Hardening the OAuth-WebView Implementations in Android Applications by Re-Factoring the Chromium Library”, In Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing (CIC), Pittsburgh, PA, USA, November 1-3, 2016.
  18. Yousra Javed, Mohamed Shehab, Investigating the Animation of Application Permission Dialogs: A Case Study of Facebook. In Proceedings of the 11th International Workshop Data Privacy Management and Security Assurance (DPM), Heraklion, Crete, Greece, September 26-27, 2016.
  19. Emanuela Marasco, Mohamed Shehab, Bojan Cukic, A Methodology for Prevention of Biometric Presentation Attacks. In Proceedings of the 6th Latin-American Symposium on Dependable Computing (LADC), Cali, Colombia, October 19-21, 2016
  20. Abeer AlJarrah, Mohamed Shehab, “Maintaining User Interface Integrity on Android”, In Proceedings of the 40th IEEE Computer Society Int’l Conference on Computers Software & Applications (IEEE COMPSAC 2016), Atlanta, GA, June 2016. [PDF]
  21. Jafar Haadi Jafarian, Hassan Takabi, Hakim Touati, Ehsan Hesamifard, Mohamed Shehab, “Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach”, In Proceedings of ACM Symposium of Access Control, Models and Technologies (SACMAT15), Shanghai, China, June 2015.
  22. Boyd H. Davis, Dena Shenk, Mary A. Nies, and Mohamed Shehab, “Learning from a pre-pilot: e-mobile support for community-based dementia caregivers”, International Society for Gerontechnology, 2014, Taipei, 18-21.
  23. Mohamed Shehab, Abeer AlJarrah, Reducing Attack Surface on Cordova-Based Hybrid Mobile Apps, In Proceedings of MobileDeLi’14: 2nd International Workshop on Mobile Development Lifecycle, Portland, OR, USA, October 21 2014 [PDF]
  24. Emmanuel Bello-Ogunu, Mohamed Shehab, PermitMe: Integrating Android Permissioning Support in the IDE, In Proceedings of ETX’14: 2014 Workshop on Eclipse Technology eXchange, Portland, OR, USA, October 21 2014 [PDF]
  25. Mohamed Shehab, Fadi Mohsen, Towards Enhancing the Security of OAuth Implementations In Smart Phones, In Proceedings of the IEEE 3rd International Conference on Mobile Services (IEEE MS 2014), Alaska, USA, June 2014.[PDF][Slides]
  26. Fadi Mohsen, Mohamed Shehab, Android KeyLogging Threat, In Proceedings of the 8th International Workshop on Trusted Collaboration (TrustCol 2013), Austin, Texas, USA, October 2013.[PDF]
  27. Yousra Javed, Mohamed Shehab, “Access Control Policy Misconfiguration Detection on Social Networks”, ASE/IEEE International Conference on Social Computing (SocialCom’13), Washington D.C., September 2013.[PDF]
  28. Gorrell Cheek and Mohamed Shehab, Usable Object Management Approaches for Online Social Networks. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013). Niagara Falls, Canada, August 2013. [PDF]
  29. Hasan Mohammad, Mohamed Shehab and Ali Noorollahiravari, Game Theoretic Approach for User Migration in Distributed Social Networks. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013). Niagara Falls, Canada, August 2013. [PDF]
  30. Said Marouf, Mohamed Shehab, Towards Improving Browser Extension Permission Management and User Awareness, In Proceedings of the 7th IEEE International Workshop on Trusted Collaboration (TrustCol 2012), Pittsburg, Pennsylvania, USA, 14 October, 2012. (Best Paper Award). [PDF]
  31. Mohamed Shehab, Hakim Touati, Semi-Supervised Policy Recommendation for Online Social Networks, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM  2012), Istanbul, Turkey, August, 2012. [PDF]
  32. Yousra Javed, Mohamed Shehab, How do Facebookers use Friendlists, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM  2012), Istanbul, Turkey, August, 2012. [PDF]
  33. Mohamed Shehab, Saeed Al-Haj, Salil Bhagurkar, Ehab Al-Shaer, Anomaly Discovery and Resolution in MySQL Access Control Policies, in Proceedings of 23rd International Conference on Database and Expert Systems Applications (DEXA’2012), Vienna, Austria, Sept, 2012. [PDF]
  34. Mohammad Ashiqur Rahman, Libin Bai, Mohamed Shehab, Ehab Al-Shaer, Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid, In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), Liverpool, UK, 25-27 June, 2012. (acceptance rate 28%).[PDF]
  35. Gorrell Cheek, Mohamed Shehab, Policy-by-Example for Online Social Networks, in Proceedings of ACM Symposium of Access Control, Models and Technologies (SACMAT’12), Newark, NJ, USA, June 2012. [PDF]
  36. Mohamed Shehab, Moo Nam Ko, and Hakim Touati, Social Networks Profile Mapping Using Games, in Proceedings of USENIX Conference on Web Application Development (WebApps’12), Boston, MA, USA, June, 2012. [PDF]
  37. Gorrell Cheek, Mohamed Shehab, Privacy Management for Online Social Networks, International World Wide Web Conference (WWW’12), April, 2012. (Poster).
  38. Said Marouf, Mohamed Shehab, SEGrapher: Visualization-based SELinux Policy Analysis, 4th Symposium on Configuration Analytics and Automation (SafeConfig 2011), Arlington, VA, USA, Nov 2011. [PDF]
  39. Mohamed Shehab, Said Marouf, Christopher Hudel, ROAuth: Recommendation Based Open Authorization, Proceedings of the 7th Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, July, 2011. [PDF]
  40. Gorrell Cheek, Mohamed Shehab, Truong Ung, and Ebonie Williams, iLayer: Toward an Application Access Control Framework for Content Management Systems, Policy’11: IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, June 6-8, 2011. [Slides][PDF]
  41. Salmin Sultana, Elisa Bertino, Mohamed Shehab: A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks. ICDCS Workshops 2011: 332-338. [PDF]
  42. Mohamed Shehab, Gorrell Cheek, Hakim Touati, Anna C. Squicciarini and Pau-Chen Cheng, User Centric Policy Management in Online Social Networks, Policy’10: IEEE International Symposium on Policies for Distributed Systems and Networks, Fairfax, VA, USA, July 2010. [PDF]
  43. Said Marouf, Doan Minh Phuong, Mohamed Shehab, A Learning-Based Approach for SELinux Policy Optimization with Type Mining, Cyber Security and Information Intelligence Research Workshop (CSIIRW’10), Oak Ridge, TN, April 2010.[PDF]
  44. Said Marouf, Mohamed Shehab, Anna C. Squicciarini, Smitha Sundareswaran, Statistics & Clustering Based Framework for Efficient XACML Policy Evaluation, IEEE International Symposium on Policies for Distributed Systems and Networks (Policy’09), London, UK, July 2009. [PDF]
  45. Anna C. Squicciarini, Mohamed Shehab, and Federica Paci, Collective Privacy Management in Social Networks, WWW 2009: 18th International World Wide Web Conference, Madrid, Spain, April, 2009. Acceptance rate: 11.8% (104/879). [PDF]
  46. Andrew Besmer, Heather Lipford, Mohamed Shehab, and Gorrell Cheek, Social Applications: Towards A Secure Framework. Proceedings of the 5th Symposium on Usable Privacy and Security (SOUPS), Mountain View, CA, 2009. [PDF]
  47. Mohamed Shehab, Anna C. Squicciarini and Gail-Joon Ahn, Beyond User-to-User Access Control for Online Social Networks, ICICS 2008: 10th International Conference on Information and Communications Security, Birmingham, UK, October, 2008. [PDF]
  48. Mohamed Shehab, Elisa Bertino and Arif Ghafoor, Proactive Role Discovery in Mediator-Free Environments, IEEE P2P’08: Eighth International Conference on Peer-to-Peer Computing, RWTH Aachen, Germany, September 8-11, 2008. [PDF]
  49. Gail-J. Ahn, Moonam Ko and Mohamed Shehab, Portable User-Centric Identity Management, Proc. of 23rd IFIP International Information Security Conference (SEC 2008), Milan, Italy – September 8 – 10, 2008. [PDF]
  50. Wenjuan Xu, Mohamed Shehab, Gail-Joon Ahn, Visualization Based Policy Analysis: Case Study in SELinux, in Proceedings of ACM Symposium of Access Control, Models and Technologies (SACMAT’08), Estes Park, CO, USA, June 2008. [PDF]
  51. Jing, Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin Hu, Towards Trust-aware Access Management for Ad-hoc Collaborations, IEEE International Workshop on Trusted Collaboration (TrustCol’07), White Plains, New York, November, 2007. [PDF]
  52. Mohamed Shehab, Elisa Bertino, Arif Ghafoor, Secure Collaboration in Mediator-Free Environments, in Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS), Alexandria, Virginia, November 2005. Acceptance rate: 15% (38/249). [PDF]
  53. Mohamed Shehab, Elisa Bertino, Arif Ghafoor, Efficient Hierarchical Key Generation and Key Diffusion for Sensor Networks, in Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and AdHoc Communications and Networks (SECON), Santa Clara, California, USA, September 2005. [PDF]
  54. Mohamed Shehab, Elisa Bertino and Arif Ghafoor, SERAT : SEcure Role mApping Technique for Decentralized Secure Interoperability, in Proceedings of the ACM Symposium on Access Control, Models and Technologies (SACMAT’05), Stockholm, Sweden, June 2005, Acceptance rate: 21% (19/90). [PDF]

Technical Reports

  1. Yousra Javed, Mohamed Shehab, and Emmanuel Bello Ogunu, Investigating User Comprehension and Risk Perception of Apple’s Touch ID Technology, Technical Report SIS-TC-01-2016, November 6, 2016. [SIS-TC-01-2016 PDF]
  2. Mohamed Shehab, Moo Nam Ko. Survey of sharing practices in online social networks. Technical Report SIS-TC-01-06-2011., June 2011. [SIS-TC-01-06-2011 PDF]

Posters

  1. Fadi Mohsen, Mohamed Shehab, Emmanuel Bello-Ogunu, and Abeer Al Jarrah. 2014. POSTER: Android System Broadcast Actions Broadcasts Your Privacy. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS ’14). ACM, New York, NY, USA, 1484-1486. [doi]
  2. Mohamed Shehab, Fadi Mohsen, Securing OAuth Implementations In Smart Phones, Fourth ACM Conference on Data and Application Security and Privacy (CodaSpy 2014),  San Antonio, TX, USA, March 2014.
  3. Gorrell Cheek, Mohamed Shehab, Privacy Management for Online Social Networks, International World Wide Web Conference (WWW12), April, 2012. [doi]
  4. Said Marouf, Mohamed Shehab, SEGrapher: Visualization-based SELinux Policy Analysis, 4th Symposium on Configuration Analytics and Automation (SafeConfig 2011), Arlington, VA, USA, Nov 2011.
  5. Mohamed Shehab, Gorrell Cheek, Hakim Touati, Anna C. Squicciarini, Pau-Chen Cheng, Learning Based Access Control in Online Social Networks, WWW 2010: 19th International World Wide Web Conference, Raleigh, NC, April, 2010. (Poster)
  6. Mohamed Shehab, and Ebonie Williams, Web Application Diffusion in Online Social Networks. IEEE Symposium on Security & Privacy, Oakland, CA, May 2009. (Poster)
  7. Mohamed Shehab, Elisa Bertino and Arif Ghafoor, Secure Role Routing Protocol, 8th Annual Information Security Symposium, March 2007. (Poster)
  8. Mohamed Shehab, Ashish Kamra, Ozan Mindek, Secure Group Management in Peer-to-Peer, Work in Progress, 21st Annual Computer Security Applications Conference (ACSAC), Tuscan, Arizona, December 2005. (WIP)
  9. Mohamed Shehab, Elisa Bertino and Arif Ghafoor, SERAT : SEcure Role mApping Technique for Decentralized Secure Interoperability, five minutes poster at the 2005 IEEE Symposium on Security and Privacy, Oakland, California. (WIP)
  10. Mohamed Shehab, Elisa Bertino and Arif Ghafoor, Decentralized Secure Interoperability, Midwest DB Research Symposium, April 2005. (Poster)
  11. Mohamed Shehab, Elisa Bertino and Arif Ghafoor, SERAT : SEcure Role mApping Technique for Decentralized Secure Interoperability, 6th Annual Information Security Symposium, March 2005. (Poster)