Author of the publication

Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing.

, , , , , and . SACMAT, page 143-154. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining coherent anomaly collections on web data., , , and . CIKM, page 1557-1561. ACM, (2012)Efficient processing of exact top-k queries over disk-resident sorted lists., , and . VLDB J., 19 (3): 437-456 (2010)L-opacity: Linkage-Aware Graph Anonymization., , , and . EDBT, page 583-594. OpenProceedings.org, (2014)TUBE (Text-cUBE) for discovering documentary evidence of associations among entities., , and . SAC, page 824-828. ACM, (2007)StegFS: A Steganographic File System., , and . ICDE, page 657-667. IEEE Computer Society, (2003)Verifiable Computation on Outsourced Encrypted Data., , , and . ESORICS (1), volume 8712 of Lecture Notes in Computer Science, page 273-291. Springer, (2014)Transaction Scheduling in Multiclass Real-Time Database Systems., , and . RTSS, page 23-34. IEEE Computer Society, (1992)Global immutable region computation., , and . SIGMOD Conference, page 1151-1162. ACM, (2014)Detecting Extreme Rank Anomalous Collections., , , and . SDM, page 883-894. SIAM / Omnipress, (2012)Explaining inferences in Bayesian networks., , and . Appl. Intell., 29 (3): 263-278 (2008)