Suhair Alshehri
Title
Cited by
Cited by
Year
Secure access for healthcare data in the cloud using ciphertext-policy attribute-based encryption
S Alshehri, SP Radziszowski, RK Raj
2012 IEEE 28th international conference on data engineering workshops, 143-146, 2012
812012
Secure access control for health information sharing systems
S Alshehri, RK Raj
2013 IEEE international conference on healthcare informatics, 277-286, 2013
452013
Designing a secure cloud-based ehr system using ciphertext-policy attribute-based encryption
S Alshehri, S Radziszowski, RK Raj
Proceedings of the Data Management in the Cloud Workshop, Washington, DC, USA, 2012
212012
Toward effective access control using attributes and pseudoroles
S Alshehri
122014
A survey on authentication techniques for the internet of things
A Albalawi, A Almrshed, A Badhib, S Alshehri
2019 International Conference on Computer and Information Sciences (ICCIS), 1-5, 2019
82019
Insider threat mitigation and access control in healthcare systems
S Alshehri, S Mishra, R Raj
72013
DroidRista: a highly precise static data flow analysis framework for android applications
A Alzaidi, S Alshehri, SM Buhari
International Journal of Information Security 19 (5), 523-536, 2020
62020
Using access control to mitigate insider threats to healthcare systems
S Alshehri, S Mishra, RK Raj
2016 IEEE International Conference on Healthcare Informatics (ICHI), 55-60, 2016
62016
A privacy-preserving collaborative reputation system for mobile crowdsensing
BH Alamri, MM Monowar, S Alshehri
International Journal of Distributed Sensor Networks 14 (9), 1550147718802189, 2018
32018
Towards a Distributed Access Control Model for IoT in Healthcare
S Alnefaie, A Cherif, S Alshehri
2019 2nd International Conference on Computer Applications & Information …, 2019
22019
A survey on access control in IoT: models, architectures and research opportunities
S Alnefaie, S Alshehri, A Cherif
International Journal of Security and Networks 16 (1), 60-76, 2021
12021
Insider threats and access control in e-health systems
S Alshehri, S Mishra, R Raj
IEEE 16th International Conference on e-Health Networking, Applications and …, 0
1
An overview of continuous device-to-device authentication techniques for the internet of things
A Badhib, A Cherif, S Alshehri
International Journal of Ad Hoc and Ubiquitous Computing 36 (4), 189-206, 2021
2021
An Effective Privacy-Preserving Reputation Scheme for Mobile Crowdsensing
BH Alamri, MM Monowar, S Alshehri
Emerging Technologies in Data Mining and Information Security, 687-698, 2019
2019
Toward Efficient Access Control for Healthcare Environments Using Attributes and Pseudoroles
S Alshehri
The system can't perform the operation now. Try again later.
Articles 1–15