Follow
Ida Siahaan
Ida Siahaan
Canadian Institute of Cyber Security
Verified email at unb.ca - Homepage
Title
Cited by
Cited by
Year
Relationship-based access control policies and their policy languages
PWL Fong, I Siahaan
Proceedings of the 16th ACM symposium on Access control models and …, 2011
1392011
Relationship-based access control: its expression and enforcement through hybrid logic
G Bruns, PWL Fong, I Siahaan, M Huth
Proceedings of the second ACM conference on Data and Application Security …, 2012
1032012
Security-by-contract: Toward a semantics for digital signatures on mobile code
N Dragoni, F Massacci, K Naliuka, I Siahaan
Public Key Infrastructure: 4th European PKI Workshop: Theory and Practice …, 2007
932007
Security-by-contract on the. net platform
L Desmet, W Joosen, F Massacci, P Philippaerts, F Piessens, I Siahaan, ...
Information Security Technical Report 13 (1), 25-32, 2008
802008
Fast signature matching using extended finite automaton (XFA)
R Smith, C Estan, S Jha, I Siahaan
Information Systems Security: 4th International Conference, ICISS 2008 …, 2008
322008
Matching midlet’s security claims with a platform security policy using automata modulo theory
F Massacci, I Siahaan
Proc. of The 12th Nordic Workshop on Secure IT Systems (NordSec’07), 2007
282007
Matching in security-by-contract for mobile code
N Bielova, N Dragoni, F Massacci, K Naliuka, I Siahaan
The Journal of Logic and Algebraic Programming 78 (5), 340-358, 2009
242009
Matching policies with security claims of mobile applications
N Bielova, M Dalla Torre, N Dragoni, I Siahaan
2008 Third International Conference on Availability, Reliability and …, 2008
122008
Real-time reasoning in OWL2 for GDPR compliance
PA Bonatti, L Ioffredo, IM Petrova, L Sauro, IR Siahaan
Artificial Intelligence 289, 103389, 2020
112020
Simulating midlet's security claims with automata modulo theory
F Massacci, ISR Siahaan
Proceedings of the third ACM SIGPLAN workshop on Programming languages and …, 2008
112008
Dynamic bandwidth management based on traffic prediction using deep long short term memory
TW Cenggoro, I Siahaan
2016 2nd International Conference on Science in Information Technology …, 2016
102016
Testing decision procedures for security-by-contract
N Bielova, I Siahaan
Joint Workshop on Foundations of Computer Security, Automated Reasoning for …, 2008
52008
Security-by-contract for the future internet
F Massacci, F Piessens, I Siahaan
Future Internet–FIS 2008: First Future Internet Symposium, FIS 2008 Vienna …, 2009
42009
Secure Routing in Wireless Sensor Networks
I Siahaan, L Fernandes
University of Trento. http://dit. unitn. it/~ fernand/downloads/IWSNSlides. pdf, 2008
42008
Privacy modelling of sensitive data in universal healthcare coverage in Indonesia
I Santoso, ISR Siahaan
2016 11th International Conference on Knowledge, Information and Creativity …, 2016
32016
Optimizing IRM with Automata Modulo Theory
F Massacci, I Siahaan
Proceedings of the 5th International Workshop on Security and Trust …, 2009
32009
Sniffing serial-based substation devices: A complement to security-centric data collection
K Boakye-Boateng, ISR Siahaan, AH Al Muktadir, D Xu, AA Ghorbani
2021 IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe), 1-6, 2021
22021
Steganography algorithm multi pixel value differencing (MPVD) to increase message capacity and data security
Rojali, ISR Siahaan, B Soewito
AIP Conference Proceedings 1867 (1), 020035, 2017
22017
A Security Architecture for Web 2.0 Applications.
L Desmet, W Joosen, F Massacci, K Naliuka, P Philippaerts, F Piessens, ...
Future Internet Assembly, 35-46, 2009
22009
Secure Routing in Wireless Sensor Networks
LL Fernandes, ISR Siahaan, R Passarone
Report. University of Trento, 2007
22007
The system can't perform the operation now. Try again later.
Articles 1–20