Author of the publication

An Efficient Scheme for User-controlled Attribute Sharing in Federated Identity.

, , and . Smart Comput. Rev., 2 (2): 149-162 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Enhanced Approach to using Virtual Directories for Protecting Sensitive Information., and . WOSIS, page 36-45. INSTICC Press, (2009)On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices., , , , , , , , and . IEEE Access, (2020)Permission Management System: Permission as a Service in Cloud Computing., , and . COMPSAC Workshops, page 371-375. IEEE Computer Society, (2010)Ensuring information assurance in federated identity management., , and . IPCCC, page 821-826. IEEE, (2004)Similarity analysis of shellcodes in drive-by download attack kits., , and . CollaborateCom, page 687-694. ICST / IEEE, (2012)Generalized framework for protecting privacy in the smart grid environment and measuring the efficacy of privacy attacks., and . SmartNets, page 1-8. IEEE, (2023)Detecting insider activity using enhanced directory virtualization., and . Insider Threats@CCS, page 29-36. ACM, (2010)Role-Based Privilege Management Using Attribute Certificates and Delegation., , and . TrustBus, volume 3184 of Lecture Notes in Computer Science, page 100-109. Springer, (2004)A Mapping Study on Privacy Attacks in Big Data and IoT., , and . ICTC, page 1158-1163. IEEE, (2022)Towards Secure Virtual Directories: A Risk Analysis Framework., and . COMPSAC, page 27-36. IEEE Computer Society, (2010)