  {"id":325,"date":"2025-07-04T13:23:10","date_gmt":"2025-07-04T17:23:10","guid":{"rendered":"https:\/\/carleton.ca\/ravensoft\/?page_id=325"},"modified":"2026-01-14T13:18:55","modified_gmt":"2026-01-14T18:18:55","slug":"data-privacy-access-control-and-security-testing","status":"publish","type":"page","link":"https:\/\/carleton.ca\/ravensoft\/research\/data-privacy-access-control-and-security-testing\/","title":{"rendered":"Data Privacy, Access Control, and Security Testing"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        Data Privacy, Access Control, and Security Testing\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Nafiseh Kahani, Masoud Barati, Diana Addae, Chen Zhou, Diana Rogachova, Raymond Xiao. <a href=\"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3773274.3774926\">Formal Design-Time Privacy &amp; Consent Assurance for LLM-Based Applications for Children<\/a>. IEEE\/ACM 18th International Conference on Utility and Cloud Computing (UCC) 2025.<\/li>\n\n\n\n<li>&nbsp;Masoud Barati, Chen Zhou, Nafiseh Kahani, Diana Rogachova, Diana Addae and Raymond Xiao. Transparent Consent Tracking in Child-Oriented LLM Applications via Smart Contracts. 20th International Conference on Risks and Security of Internet and Systems (CRiSIS), 2025. <\/li>\n\n\n\n<li><div class=\"\">Maede Ashouri-Talouki, Nafiseh Kahani, Masoud Barati and Zomorod Abedini. <a href=\"https:\/\/link.springer.com\/article\/10.1007\/s12243-024-01052-2?utm_source=rct_congratemailt&amp;utm_medium=email&amp;utm_campaign=nonoa_20240710&amp;utm_content=10.1007\/s12243-024-01052-2\">A Revocable Attribute-based Access Control with Non-monotonic Access Structure<\/a>. Annals of Telecommunications. 2024.<\/div><\/li>\n\n\n\n<li><div class=\"\">Maedeh Ashouri, Nafiseh Kahani, and Masoud Barati. <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10339750\">Privacy-Preserving Attribute-Based Access Control with Non-Monotonic Access Structure<\/a>. <em>Cyber Security in Networking Conference&nbsp;(CSNet&#8217;23)<\/em>. 2023.<\/div><\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":330,"parent":53,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_cu_dining_location_slug":"","footnotes":"","_links_to":"","_links_to_target":""},"cu_page_type":[34],"class_list":["post-325","page","type-page","status-publish","has-post-thumbnail","hentry","cu_page_type-research-area"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/ravensoft\/wp-json\/wp\/v2\/pages\/325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/ravensoft\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/ravensoft\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/ravensoft\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/ravensoft\/wp-json\/wp\/v2\/comments?post=325"}],"version-history":[{"count":5,"href":"https:\/\/carleton.ca\/ravensoft\/wp-json\/wp\/v2\/pages\/325\/revisions"}],"predecessor-version":[{"id":516,"href":"https:\/\/carleton.ca\/ravensoft\/wp-json\/wp\/v2\/pages\/325\/revisions\/516"}],"up":[{"embeddable":true,"href":"https:\/\/carleton.ca\/ravensoft\/wp-json\/wp\/v2\/pages\/53"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/carleton.ca\/ravensoft\/wp-json\/wp\/v2\/media\/330"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/ravensoft\/wp-json\/wp\/v2\/media?parent=325"}],"wp:term":[{"taxonomy":"cu_page_type","embeddable":true,"href":"https:\/\/carleton.ca\/ravensoft\/wp-json\/wp\/v2\/cu_page_type?post=325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}