Author of the publication

An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing.

, , , , , , and . SRDS, page 177-183. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distributed Monitoring and Reconfiguration Approach for Adaptive Network Computing., , , and . SRDS Workshop, page 31-35. IEEE Computer Society, (2015)Diagnosing Failures of Cloud Management Actions., and . DSN Workshops, page 26-29. IEEE Computer Society, (2018)Hierarchical Aggregation of Consumer Ratings for Service Ecosystem., , , , and . ICWS, page 575-582. IEEE Computer Society, (2015)Secure Dissemination of Video Data in Vehicle-to-Vehicle Systems., , , , and . SRDS Workshop, page 47-51. IEEE Computer Society, (2015)An End-to-End Security Auditing Approach for Service Oriented Architectures., , , , , , , and . SRDS, page 279-284. IEEE Computer Society, (2012)An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing., , , , , , and . SRDS, page 177-183. IEEE Computer Society, (2010)Big Data Analytics for Cyber Security., , and . Secur. Commun. Networks, (2019)Privacy-Preserving Data Sharing and Adaptable Service Compositions in Mission-Critical Clouds., , and . ISIC, volume 2786 of CEUR Workshop Proceedings, page 60-66. CEUR-WS.org, (2021)Tamper-resistant autonomous agents-based mobile-cloud computing., , and . NOMS, page 843-847. IEEE, (2016)RADical Strategies for Engineering Web-Scale Cloud Solutions., , , and . IEEE Cloud Comput., 2 (5): 20-29 (2015)