Conference and Workshop Papers

  1. P. Iyer and A. Masoumzadeh, “Towards Automated Learning of Access Control Policies Enforced by Web Applications,” in Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023, pp. 163–168.
  2. P. Iyer and A. Masoumzadeh, “Effective Evaluation of Relationship-Based Access Control Policy Mining,” in Proceedings of the 27th ACM Symposium on Access Control Models and Technologies, 2022, pp. 127–138.
  3. “BlueSky: Physical Access Control: Characteristics, Challenges, and Research Opportunities,” in Proceedings of the 27th ACM Symposium on Access Control Models and Technologies, 2022, pp. 163–172.
  4. A. Masoumzadeh, P. Narendran, and P. Iyer, “Towards a Theory for Semantics and Expressiveness Analysis of Rule-Based Access Control Models,” in Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, 2021, pp. 33–43.
  5. P. Iyer and A. Masoumzadeh, “Active Learning of Relationship-Based Access Control Policies,” in Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020, pp. 155–166.
  6. A. Dalton et al., “Active Defense against Social Engineering: The Case for Human Language Technology,” in Proceedings for the First International Workshop on Social Threats in Online Conversations: Understanding and Management, 2020, pp. 1–8.
  7. P. Iyer and A. Masoumzadeh, “Generalized Mining of Relationship-Based Access Control Policies in Evolving Systems,” in Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019, pp. 135–140.
  8. P. Iyer and A. Masoumzadeh, “Mining Positive and Negative Attribute-Based Access Control Policy Rules,” in Proceedings of the 23nd ACM Symposium on Access Control Models and Technologies, 2018, pp. 161–172.
  9. A. Masoumzadeh, “Security Analysis of Relationship-Based Access Control Policies,” in Proc. 8th ACM Conference on Data and Application Security and Privacy (CODASPY ’18), 2018, pp. 186–195.
  10. A. Cortese and A. Masoumzadeh, “Modeling Exposure in Online Social Networks,” in Proc. 15th Annual Conference on Privacy, Security and Trust (PST ’17), 2017, pp. 327–336.
  11. A. Masoumzadeh and A. Cortese, “Towards Measuring Knowledge Exposure in Online Social Networks,” in Proc. Workshop on Privacy in Collaborative & Social Computing (PiCSoC 2016), IEEE 2nd International Conference on Collaboration and Internet Computing (CIC 2016), 2016, pp. 522–529.
  12. A. Masoumzadeh, “Inferring Unknown Privacy Control Policies in a Social Networking System,” in Proc. 14th ACM Workshop on Privacy in the Electronic Society (WPES ’15), 2015, pp. 21–25.
  13. A. Masoumzadeh and J. Joshi, “Privacy Settings in Social Networking Systems: What You Cannot Control,” in Proc. 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), 2013, pp. 149–154.
  14. A. Masoumzadeh, L. Jin, J. Joshi, and R. Constantino, “HELPP Zone: Towards Protecting College Students from Dating Violence,” in iConference 2013 Proceedings, 2013, pp. 925–928.
  15. A. Masoumzadeh and J. Joshi, “An Alternative Approach to K-Anonymity for Location-Based Services,” in Proc. 8th Int’l Conference on Mobile Web Information Systems (MobiWIS 2011), 2011, vol. 5, pp. 522–530.
  16. N. Baracaldo, A. Masoumzadeh, and J. Joshi, “A Secure, Constraint-Aware Role-Based Access Control Interoperation Framework,” in Proc. 5th Int’l Conference on Network and System Security (NSS), 2011, pp. 200–207.
  17. A. Masoumzadeh and J. Joshi, “Anonymizing Geo-Social Network Datasets,” in Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS - SPRINGL ’11, 2011, pp. 25–32.
  18. A. Masoumzadeh and J. Joshi, “Preserving Structural Properties in Anonymization of Social Networks,” in Proc. 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2010, pp. 1–10.
  19. A. Masoumzadeh and J. Joshi, “OSNAC: An Ontology-based Access Control Model for Social Networking Systems,” in Proc. 2nd IEEE Int’l Conference on Information Privacy, Security, Risk and Trust (PASSAT 2010), 2010, pp. 751–759.
  20. Y. Jung, A. Masoumzadeh, J. Joshi, and M. Kim, “RiBAC: Role Interaction Based Access Control Model for Community Computing,” in Proc. CollaborateCom ’08, 2009, vol. 10, pp. 304–321.
  21. A. Masoumzadeh, J. Joshi, and H. A. Karimi, “LBS (k, T)-Anonymity: A Spatio-Temporal Approach to Anonymity for Location-Based Service Users,” in Proc. 17th ACM SIGSPATIAL Int’l Conference on Advances in Geographic Information Systems (GIS’09), 2009, pp. 464–467.
  22. A. Masoumzadeh and J. Joshi, “PuRBAC: Purpose-aware Role-Based Access Control,” in Proc. On The Move To Meaningful Internet Systems (OTM’08), 2008, vol. 5332, pp. 1104–1121.
  23. A. Masoumzadeh, M. Amini, and R. Jalili, “Conflict Detection and Resolution in Context-Aware Authorization,” in Proc. 21st Int’l Conference on Advanced Information Networking and Applications Workshops (AINAW ’07), 2007, pp. 505–511.
  24. A. Masoumzadeh, M. Amini, and R. Jalili, “Context-Aware Provisional Access Control,” in Proc. Int’l Conference on Information Systems Security, 2006, vol. 4332, pp. 132–146.

Journal Papers

  1. P. Iyer and A. Masoumzadeh, “Learning Relationship-Based Access Control Policies from Black-Box Systems,” ACM Transactions on Privacy and Security, vol. 25, no. 3, pp. 22:1–22:36, Aug. 2022.
  2. P. Iyer, A. Masoumzadeh, and P. Narendran, “On the Expressive Power of Negated Conditions and Negative Authorizations in Access Control Models,” Computers & Security, vol. 116, p. 102586, May 2022.
  3. A. Masoumzadeh and J. Joshi, “Top Location Anonymization for Geosocial Network Datasets,” Transactions on Data Privacy, vol. 6, no. 1, pp. 107–126, 2013.
  4. A. Masoumzadeh and J. Joshi, “Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 877–889, Nov. 2012.
  5. Y. Jung, M. Kim, A. Masoumzadeh, and J. B. D. Joshi, “A Survey of Security Issue in Multi-Agent Systems,” Artificial Intelligence Review, vol. 37, no. 3, pp. 239–260, Jun. 2012.
  6. A. Masoumzadeh and J. Joshi, “Ontology-Based Access Control for Social Network Systems,” International Journal of Information Privacy, Security and Integrity (Special Issue: Selected Papers from PASSAT 2010), vol. 1, no. 1, pp. 59–78, Jan. 2011.

Theses

  1. A. Masoumzadeh, “Preserving Privacy in Social Networking Systems: Policy-Based Control and Anonymity,” University of Pittsburgh, 2014.
  2. A. Masoumzadeh, “Context-Aware Provisional Access Control,” Sharif University of Technology, 2007.
  3. A. Masoumzadeh and S. H. Shahri, “Using Reinforcement Learning in Control Applications,” Ferdowsi University, 2004.