@inproceedings{MashimaA09, title = {Using identity credential usage logs to detect anomalous service accesses}, author = {Daisuke Mashima and Mustaque Ahamad}, year = {2009}, doi = {10.1145/1655028.1655044}, url = {http://doi.acm.org/10.1145/1655028.1655044}, researchr = {https://researchr.org/publication/MashimaA09}, cites = {0}, citedby = {0}, pages = {73-80}, booktitle = {Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009l}, editor = {Elisa Bertino and Thomas Groß and Kenji Takahashi}, publisher = {ACM}, isbn = {978-1-60558-786-8}, } @inproceedings{MashimaAK09, title = {User-Centric Handling of Identity Agent Compromise}, author = {Daisuke Mashima and Mustaque Ahamad and Swagath Kannan}, year = {2009}, doi = {10.1007/978-3-642-04444-1_2}, url = {http://dx.doi.org/10.1007/978-3-642-04444-1_2}, researchr = {https://researchr.org/publication/MashimaAK09}, cites = {0}, citedby = {0}, pages = {19-36}, booktitle = {Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, editor = {Michael Backes and Peng Ning}, volume = {5789}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-04443-4}, }