Follow
Ida Siahaan
Ida Siahaan
Canadian Institute of Cyber Security
Verified email at unb.ca - Homepage
Title
Cited by
Cited by
Year
Relationship-based access control policies and their policy languages
PWL Fong, I Siahaan
Proceedings of the 16th ACM symposium on Access control models and …, 2011
1322011
Relationship-based access control: its expression and enforcement through hybrid logic
G Bruns, PWL Fong, I Siahaan, M Huth
Proceedings of the second ACM conference on Data and Application Security …, 2012
992012
Security-by-contract: Toward a semantics for digital signatures on mobile code
N Dragoni, F Massacci, K Naliuka, I Siahaan
European Public Key Infrastructure Workshop, 297-312, 2007
942007
Security-by-contract on the. net platform
L Desmet, W Joosen, F Massacci, P Philippaerts, F Piessens, I Siahaan, ...
Information Security Technical Report 13 (1), 25-32, 2008
802008
Matching midlet’s security claims with a platform security policy using automata modulo theory
F Massacci, I Siahaan
Proc. of The 12th Nordic Workshop on Secure IT Systems (NordSec’07), 2007
292007
Fast signature matching using extended finite automaton (XFA)
R Smith, C Estan, S Jha, I Siahaan
International Conference on Information Systems Security, 158-172, 2008
282008
Matching in security-by-contract for mobile code
N Bielova, N Dragoni, F Massacci, K Naliuka, I Siahaan
The Journal of Logic and Algebraic Programming 78 (5), 340-358, 2009
242009
Simulating midlet's security claims with automata modulo theory
F Massacci, ISR Siahaan
Proceedings of the third ACM SIGPLAN workshop on Programming languages and …, 2008
122008
Matching policies with security claims of mobile applications
N Bielova, M Dalla Torre, N Dragoni, I Siahaan
2008 Third International Conference on Availability, Reliability and …, 2008
122008
Dynamic bandwidth management based on traffic prediction using deep long short term memory
TW Cenggoro, I Siahaan
2016 2nd International Conference on Science in Information Technology …, 2016
92016
Real-time reasoning in OWL2 for GDPR compliance
PA Bonatti, L Ioffredo, IM Petrova, L Sauro, IR Siahaan
Artificial Intelligence 289, 103389, 2020
82020
Testing decision procedures for security-by-contract
N Bielova, I Siahaan
Joint Workshop on Foundations of Computer Security, Automated Reasoning for …, 2008
52008
Security-by-contract for the future internet
F Massacci, F Piessens, I Siahaan
Future Internet Symposium, 29-43, 2008
42008
Secure Routing in Wireless Sensor Networks
I Siahaan, L Fernandes
University of Trento. http://dit. unitn. it/~ fernand/downloads/IWSNSlides. pdf, 2008
42008
Optimizing IRM with Automata Modulo Theory
F Massacci, I Siahaan
Proceedings of the 5th International Workshop on Security and Trust …, 2009
32009
Steganography algorithm multi pixel value differencing (MPVD) to increase message capacity and data security
Rojali, ISR Siahaan, B Soewito
AIP Conference Proceedings 1867 (1), 020035, 2017
22017
A Security Architecture for Web 2.0 Applications.
L Desmet, W Joosen, F Massacci, K Naliuka, P Philippaerts, F Piessens, ...
Future Internet Assembly, 35-46, 2009
22009
Secure Routing in Wireless Sensor Networks
LL Fernandes, ISR Siahaan, R Passarone
Report. University of Trento, 2007
22007
Recommending Location for Placing Data Collector in the OPC Classic
AA Al Muktadir, Abu Hena and Siahaan, Ida SR and Boakye-Boateng, Kwasi and ...
2021 4th IEEE International Conference on Industrial Cyber-Physical Systems …, 2021
12021
Privacy modelling of sensitive data in universal healthcare coverage in Indonesia
I Santoso, ISR Siahaan
2016 11th International Conference on Knowledge, Information and Creativity …, 2016
12016
The system can't perform the operation now. Try again later.
Articles 1–20