publications: - title: "Using identity credential usage logs to detect anomalous service accesses" author: - name: "Daisuke Mashima" link: "http://www.cc.gatech.edu/~mashima" - name: "Mustaque Ahamad" link: "https://researchr.org/alias/mustaque-ahamad" year: "2009" doi: "http://doi.acm.org/10.1145/1655028.1655044" links: doi: "http://doi.acm.org/10.1145/1655028.1655044" researchr: "https://researchr.org/publication/MashimaA09" cites: 0 citedby: 0 pages: "73-80" booktitle: "Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009l" editor: - name: "Elisa Bertino" link: "https://researchr.org/alias/elisa-bertino" - name: "Thomas Groß" link: "https://researchr.org/alias/thomas-gro%C3%A3%C3%BF" - name: "Kenji Takahashi" link: "https://researchr.org/alias/kenji-takahashi" publisher: "ACM" isbn: "978-1-60558-786-8" kind: "inproceedings" key: "MashimaA09" - title: "User-Centric Handling of Identity Agent Compromise" author: - name: "Daisuke Mashima" link: "http://www.cc.gatech.edu/~mashima" - name: "Mustaque Ahamad" link: "https://researchr.org/alias/mustaque-ahamad" - name: "Swagath Kannan" link: "https://researchr.org/alias/swagath-kannan" year: "2009" doi: "http://dx.doi.org/10.1007/978-3-642-04444-1_2" links: doi: "http://dx.doi.org/10.1007/978-3-642-04444-1_2" researchr: "https://researchr.org/publication/MashimaAK09" cites: 0 citedby: 0 pages: "19-36" booktitle: "Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings" editor: - name: "Michael Backes" link: "https://researchr.org/alias/michael-backes" - name: "Peng Ning" link: "https://researchr.org/alias/peng-ning" volume: "5789" series: "Lecture Notes in Computer Science" publisher: "Springer" isbn: "978-3-642-04443-4" kind: "inproceedings" key: "MashimaAK09"