Journal Papers

  1. A. Masoumzadeh and J. Joshi, “Top Location Anonymization for Geosocial Network Datasets,” Transactions on Data Privacy, vol. 6, no. 1, pp. 107–126, 2013.
  2. A. Masoumzadeh and J. Joshi, “Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 877–889, Nov. 2012.
  3. Y. Jung, M. Kim, A. Masoumzadeh, and J. B. D. Joshi, “A Survey of Security Issue in Multi-Agent Systems,” Artificial Intelligence Review, vol. 37, no. 3, pp. 239–260, Jun. 2012.
  4. A. Masoumzadeh and J. Joshi, “Ontology-Based Access Control for Social Network Systems,” International Journal of Information Privacy, Security and Integrity (Special Issue: Selected Papers from PASSAT 2010), vol. 1, no. 1, pp. 59–78, Jan. 2011.

Conference and Workshop Papers

  1. P. Iyer and A. Masoumzadeh, “Generalized Mining of Relationship-Based Access Control Policies in Evolving Systems,” in Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019, pp. 135–140.
  2. A. Masoumzadeh, “Security Analysis of Relationship-Based Access Control Policies,” in Proc. 8th ACM Conference on Data and Application Security and Privacy (CODASPY ’18), 2018, pp. 186–195.
  3. P. Iyer and A. Masoumzadeh, “Mining Positive and Negative Attribute-Based Access Control Policy Rules,” in Proceedings of the 23nd ACM Symposium on Access Control Models and Technologies, 2018, pp. 161–172.
  4. A. Cortese and A. Masoumzadeh, “Modeling Exposure in Online Social Networks,” in Proc. Privacy, Security and Trust 2017 (PST 2017), 2017.
  5. A. Masoumzadeh and A. Cortese, “Towards Measuring Knowledge Exposure in Online Social Networks,” in Proc. Workshop on Privacy in Collaborative & Social Computing (PiCSoC 2016), IEEE 2nd International Conference on Collaboration and Internet Computing (CIC 2016), 2016, pp. 522–529.
  6. A. Masoumzadeh, “Inferring Unknown Privacy Control Policies in a Social Networking System,” in Proc. 14th ACM Workshop on Privacy in the Electronic Society (WPES ’15), 2015, pp. 21–25.
  7. A. Masoumzadeh and J. Joshi, “Privacy Settings in Social Networking Systems: What You Cannot Control,” in Proc. 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 2013, pp. 149–154.
  8. A. Masoumzadeh, L. Jin, J. Joshi, and R. Constantino, “HELPP Zone: Towards Protecting College Students from Dating Violence,” in iConference 2013 Proceedings, 2013, pp. 925–928.
  9. A. Masoumzadeh and J. Joshi, “An Alternative Approach to K-Anonymity for Location-Based Services,” in Proc. 8th Int’l Conference on Mobile Web Information Systems (MobiWIS 2011), 2011, vol. 5, pp. 522–530.
  10. A. Masoumzadeh and J. Joshi, “Anonymizing Geo-Social Network Datasets,” in Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS - SPRINGL ’11, 2011, pp. 25–32 (Best Student Paper).
  11. N. Baracaldo, A. Masoumzadeh, and J. Joshi, “A Secure, Constraint-Aware Role-Based Access Control Interoperation Framework,” in Proc. 5th Int’l Conference on Network and System Security (NSS), 2011, pp. 200–207.
  12. A. Masoumzadeh and J. Joshi, “Preserving Structural Properties in Anonymization of Social Networks,” in Proc. 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2010, pp. 1–10.
  13. A. Masoumzadeh and J. Joshi, “OSNAC: An Ontology-Based Access Control Model for Social Networking Systems,” in Proc. 2nd IEEE Int’l Conference on Information Privacy, Security, Risk and Trust (PASSAT 2010), 2010, pp. 751–759.
  14. Y. Jung, A. Masoumzadeh, J. Joshi, and M. Kim, “RiBAC: Role Interaction Based Access Control Model for Community Computing,” in Proc. CollaborateCom ’08, 2009, vol. 10, pp. 304–321.
  15. A. Masoumzadeh, J. Joshi, and H. A. Karimi, “LBS (k, T)-Anonymity: A Spatio-Temporal Approach to Anonymity for Location-Based Service Users,” in Proc. 17th ACM SIGSPATIAL Int’l Conference on Advances in Geographic Information Systems (GIS’09), 2009, pp. 464–467.
  16. A. Masoumzadeh and J. Joshi, “PuRBAC: Purpose-Aware Role-Based Access Control,” in Proc. On The Move To Meaningful Internet Systems (OTM’08), 2008, vol. 5332, pp. 1104–1121.
  17. A. Masoumzadeh, M. Amini, and R. Jalili, “Conflict Detection and Resolution in Context-Aware Authorization,” in Proc. 21st Int’l Conference on Advanced Information Networking and Applications Workshops (AINAW ’07), 2007, pp. 505–511.
  18. A. Masoumzadeh, M. Amini, and R. Jalili, “Context-Aware Provisional Access Control,” in Proc. Int’l Conference on Information Systems Security, 2006, vol. 4332, pp. 132–146.



  1. A. Masoumzadeh, “Preserving Privacy in Social Networking Systems: Policy-Based Control and Anonymity,” PhD thesis, University of Pittsburgh, 2014.
  2. A. Masoumzadeh, “Context-Aware Provisional Access Control,” PhD thesis, Sharif University of Technology, 2007.
  3. A. Masoumzadeh and S. H. Shahri, “Using Reinforcement Learning in Control Applications,” PhD thesis, Ferdowsi University, 2004.