Author of the publication

Survey of access control models and technologies for cloud computing.

, , , , , and . Clust. Comput., 22 (Supplement): 6111-6122 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MBECN: Enabling ECN with Micro-burst Traffic in Multi-queue Data Center., , , , , , and . CLUSTER, page 1-12. IEEE, (2019)Survey of access control models and technologies for cloud computing., , , , , and . Clust. Comput., 22 (Supplement): 6111-6122 (2019)Communication-aware virtual machine migration in cloud data centres., , , , , and . Int. J. High Perform. Comput. Netw., 10 (4/5): 372-380 (2017)Teaching AI Algorithms with Games Including Mahjong and FightTheLandlord on the Botzone Online Platform., , , , , , and . CompEd, page 129-135. ACM, (2019)On efficient virtual cluster scaling across geo-distributed data centers., , , and . Concurr. Comput. Pract. Exp., (2018)Profit-aware scheduling in task-level for datacenter networks., , , , and . Comput. Electr. Eng., (2017)A Model for Medical Diagnosis Based on Plantar Pressure., , , , , and . ICAPR, page 1-6. IEEE, (2017)BMDT: An optimized method for Biometric Menagerie Detection., , , , and . BTAS, page 1-8. IEEE, (2015)Second-Level Partition for Estimating FAR Confidence Intervals in Biometric Systems., , , and . CAIP, volume 5702 of Lecture Notes in Computer Science, page 58-65. Springer, (2009)Towards Practical Constrained Monotone Submodular Maximization., and . CoRR, (2018)