publications
cs research
Proposed implementation framework for automatically generating XACML policies from metadata. You can read it here: Programmable XACML policies
2025*
Survey of Human Trafficking in the aftermath of Covid
Shah, T. M., Jha, S., & Shah, J. M. (2025). Justice denied! COVID-19 and human trafficking in India and the USA. Contemporary Justice Review, 1–30. https://doi.org/10.1080/10282580.2025.2452541
Emotions in Politics
Shah, T. M. (2024). Emotions in Politics: A Review of Contemporary Perspectives and Trends
International Political Science Abstracts, 74(1), 1-14
direct download
book chapters
2024
AI Intersections: Amplifying Children and Youth Voices in Conflict Zones
Shah, J.M. and Shah, T.M. (2024), “Healing Through Empathy: Machine Learning for Adaptive Therapy for Children and Youth in Armed Conflict”, Shah, T.M. (Ed.) Children and Youth in Armed Conflict: Responses, Resistance, and Portrayal in Media (Sociological Studies of Children and Youth, Vol. 35), Emerald Publishing Limited, Leeds, pp. 227-252. https://doi.org/10.1108/S1537-466120240000035014
AI-Enhanced Resilience: Empowering Youth Voices in Conflict Zones
Shah, T.M. and Shah, J.M. (2024), “AI’s Role in Enhancing Humanitarian Efforts for Children in Armed Conflict”, Shah, T.M. (Ed.) Children and Youth as ‘Sites of Resistance’ in Armed Conflict (Sociological Studies of Children and Youth, Vol. 34), Emerald Publishing Limited, Leeds, pp. 145-155. https://doi.org/10.1108/S1537-466120240000034009
53 published articles on Security Boulevard, from 2021 to 2023
2023 (selected)
MGM, Ceasar’s Hacks: more of the same is coming, and how to stop it, Security Boulevard, 2023
Distributed Ledger: a comprehensive insight for organizations, Security Boulevard, 2023
User Provisioning: The key to unlocking seamless workflow, Security Boulevard, 2023
A comprehensive insight into Anti-Money Laundering Compliance, Security Boulevard, 2023
Continuous Authentication: a dynamic approach to user verification, Security Boulevard, 2023
What is Identity Orchestration, Security Boulevard, 2023
Unlocking security with Document Verification, Security Boulevard, 2023
What is Identity Threat Detection and Response, Security Boulevard, 2023
Liveness detection to prevent Biometric Spoofing, Security Boulevard, 2023
2022 (selected)
OpenID Connect vs Security Assertion Markup Language, Security Boulevard, 2022
Principle of Least Privilege, Security Boulevard, 2022
How to implement a Zero Trust Security Model, Security Boulevard, 2022
Behavioral Biometric Authentication, Security Boulevard, 2022
Permissioned vs Permissionless Blockchains, Security Boulevard, 2022
Digital Transformation of Personnel Onboarding, Security Boulevard, 2022
articles
older
Understanding and Mitigating Single Sign-on Risk, Dark Reading, June 14 2022
Delegated and Chained Authorization with OAuth2 and User Managed Access
sinconf-delegated-authz
Submitted to Security of Information Networks SIN18, rejected with review comments.
[I have not had the time to revise and resubmit since, but SIN24 is around the corner and I shall give it another try with revisions.]
The paper explores “decentralized permissions” as a way to avoid caching pre-baked permission sets at the Authorization Server (AS). Ideas proposed include caching nested permissions to promote faster authorization decision times.