Ida Siahaan
Ida Siahaan
Canadian Institute of Cyber Security
Verified email at - Homepage
Cited by
Cited by
Relationship-based access control policies and their policy languages
PWL Fong, I Siahaan
Proceedings of the 16th ACM symposium on Access control models and …, 2011
Relationship-based access control: its expression and enforcement through hybrid logic
G Bruns, PWL Fong, I Siahaan, M Huth
Proceedings of the second ACM conference on Data and Application Security …, 2012
Security-by-contract: Toward a semantics for digital signatures on mobile code
N Dragoni, F Massacci, K Naliuka, I Siahaan
Public Key Infrastructure: 4th European PKI Workshop: Theory and Practice …, 2007
Security-by-contract on the. net platform
L Desmet, W Joosen, F Massacci, P Philippaerts, F Piessens, I Siahaan, ...
Information Security Technical Report 13 (1), 25-32, 2008
Fast signature matching using extended finite automaton (XFA)
R Smith, C Estan, S Jha, I Siahaan
Information Systems Security: 4th International Conference, ICISS 2008 …, 2008
Matching midlet’s security claims with a platform security policy using automata modulo theory
F Massacci, I Siahaan
Proc. of The 12th Nordic Workshop on Secure IT Systems (NordSec’07), 2007
Matching in security-by-contract for mobile code
N Bielova, N Dragoni, F Massacci, K Naliuka, I Siahaan
The Journal of Logic and Algebraic Programming 78 (5), 340-358, 2009
Matching policies with security claims of mobile applications
N Bielova, M Dalla Torre, N Dragoni, I Siahaan
2008 Third International Conference on Availability, Reliability and …, 2008
Real-time reasoning in OWL2 for GDPR compliance
PA Bonatti, L Ioffredo, IM Petrova, L Sauro, IR Siahaan
Artificial Intelligence 289, 103389, 2020
Simulating midlet's security claims with automata modulo theory
F Massacci, ISR Siahaan
Proceedings of the third ACM SIGPLAN workshop on Programming languages and …, 2008
Dynamic bandwidth management based on traffic prediction using deep long short term memory
TW Cenggoro, I Siahaan
2016 2nd International Conference on Science in Information Technology …, 2016
Testing decision procedures for security-by-contract
N Bielova, I Siahaan
Joint Workshop on Foundations of Computer Security, Automated Reasoning for …, 2008
Security-by-contract for the future internet
F Massacci, F Piessens, I Siahaan
Future Internet–FIS 2008: First Future Internet Symposium, FIS 2008 Vienna …, 2009
Secure Routing in Wireless Sensor Networks
I Siahaan, L Fernandes
University of Trento. http://dit. unitn. it/~ fernand/downloads/IWSNSlides. pdf, 2008
Privacy modelling of sensitive data in universal healthcare coverage in Indonesia
I Santoso, ISR Siahaan
2016 11th International Conference on Knowledge, Information and Creativity …, 2016
Optimizing IRM with Automata Modulo Theory
F Massacci, I Siahaan
Proceedings of the 5th International Workshop on Security and Trust …, 2009
Sniffing serial-based substation devices: A complement to security-centric data collection
K Boakye-Boateng, ISR Siahaan, AH Al Muktadir, D Xu, AA Ghorbani
2021 IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe), 1-6, 2021
Steganography algorithm multi pixel value differencing (MPVD) to increase message capacity and data security
Rojali, ISR Siahaan, B Soewito
AIP Conference Proceedings 1867 (1), 020035, 2017
A Security Architecture for Web 2.0 Applications.
L Desmet, W Joosen, F Massacci, K Naliuka, P Philippaerts, F Piessens, ...
Future Internet Assembly, 35-46, 2009
Secure Routing in Wireless Sensor Networks
LL Fernandes, ISR Siahaan, R Passarone
Report. University of Trento, 2007
The system can't perform the operation now. Try again later.
Articles 1–20