Ida Siahaan
Ida Siahaan
Canadian Institute of Cyber Security
Verified email at unb.ca - Homepage
Title
Cited by
Cited by
Year
Relationship-based access control policies and their policy languages
PWL Fong, I Siahaan
Proceedings of the 16th ACM symposium on Access control models and …, 2011
1272011
Relationship-based access control: its expression and enforcement through hybrid logic
G Bruns, PWL Fong, I Siahaan, M Huth
Proceedings of the second ACM conference on Data and Application Security …, 2012
962012
Security-by-contract: Toward a semantics for digital signatures on mobile code
N Dragoni, F Massacci, K Naliuka, I Siahaan
European Public Key Infrastructure Workshop, 297-312, 2007
942007
Security-by-contract on the. net platform
L Desmet, W Joosen, F Massacci, P Philippaerts, F Piessens, I Siahaan, ...
Information Security Technical Report 13 (1), 25-32, 2008
812008
Matching midlet’s security claims with a platform security policy using automata modulo theory
F Massacci, I Siahaan
Proc. of The 12th Nordic Workshop on Secure IT Systems (NordSec’07), 2007
292007
Fast signature matching using extended finite automaton (XFA)
R Smith, C Estan, S Jha, I Siahaan
International Conference on Information Systems Security, 158-172, 2008
272008
Matching in security-by-contract for mobile code
N Bielova, N Dragoni, F Massacci, K Naliuka, I Siahaan
The Journal of Logic and Algebraic Programming 78 (5), 340-358, 2009
232009
Simulating midlet's security claims with automata modulo theory
F Massacci, ISR Siahaan
Proceedings of the third ACM SIGPLAN workshop on Programming languages and …, 2008
122008
Matching policies with security claims of mobile applications
N Bielova, M Dalla Torre, N Dragoni, I Siahaan
2008 Third International Conference on Availability, Reliability and …, 2008
122008
Dynamic bandwidth management based on traffic prediction using Deep Long Short Term Memory
TW Cenggoro, I Siahaan
2016 2nd International Conference on Science in Information Technology …, 2016
92016
Testing decision procedures for security-by-contract
N Bielova, I Siahaan
Joint Workshop on Foundations of Computer Security, Automated Reasoning for …, 2008
52008
Security-by-contract for the future internet
F Massacci, F Piessens, I Siahaan
Future Internet Symposium, 29-43, 2008
42008
Secure Routing in Wireless Sensor Networks
I Siahaan, L Fernandes
University of Trento. http://dit. unitn. it/~ fernand/downloads/IWSNSlides. pdf, 2008
42008
Real-time reasoning in OWL2 for GDPR compliance
PA Bonatti, L Ioffredo, IM Petrova, L Sauro, IR Siahaan
Artificial Intelligence 289, 103389, 2020
32020
Steganography algorithm multi pixel value differencing (MPVD) to increase message capacity and data security
Rojali, ISR Siahaan, B Soewito
AIP Conference Proceedings 1867 (1), 020035, 2017
22017
A Security Architecture for Web 2.0 Applications.
L Desmet, W Joosen, F Massacci, K Naliuka, P Philippaerts, F Piessens, ...
Future Internet Assembly, 35-46, 2009
22009
Optimizing IRM with Automata Modulo Theory⋆
F Massacci, I Siahaan
Proceedings of the 5th International Workshop on Security and Trust …, 2009
22009
Secure Routing in Wireless Sensor Networks
LL Fernandes, ISR Siahaan, R Passarone
Report. University of Trento, 2007
22007
Recommending Location for Placing Data Collector in the OPC Classic
AA Al Muktadir, Abu Hena and Siahaan, Ida SR and Boakye-Boateng, Kwasi and ...
2021 4th IEEE International Conference on Industrial Cyber-Physical Systems …, 2021
2021
Privacy modelling of sensitive data in universal healthcare coverage in Indonesia
I Santoso, ISR Siahaan
2016 11th International Conference on Knowledge, Information and Creativity …, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20