Author of the publication

CloudAC: a cloud-oriented multilayer access control system for logic virtual domain.

, , , , , and . IET Inf. Secur., 7 (1): 51-59 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CloudTB: A quick and reliable testbed for virtual machine based cloud computing systems., , , , and . CONIELECOMP, page 40-47. IEEE, (2015)Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas., , , , , and . Secur. Commun. Networks, 5 (10): 1169-1180 (2012)Reliability Analysis for Grid Computing., , , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 787-790. Springer, (2004)A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing., , , , and . IPDPS Workshops, page 1210-1217. IEEE Computer Society, (2012)An Authentication and Access Control Framework for Group Communication Systems in Grid Environment., , , , and . AINA, page 547-554. IEEE Computer Society, (2007)CloudAC: a cloud-oriented multilayer access control system for logic virtual domain., , , , , and . IET Inf. Secur., 7 (1): 51-59 (2013)CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection., , , , and . IEEE Access, (2017)A Novel Authorization Mechanism for Service-Oriented Virtual Organization., , , and . ISCIS, volume 3733 of Lecture Notes in Computer Science, page 382-391. Springer, (2005)VO-Sec: An Access Control Framework for Dynamic Virtual Organization., , , and . ACISP, volume 3574 of Lecture Notes in Computer Science, page 370-381. Springer, (2005)CloudTaint: an elastic taint tracking framework for malware detection in the cloud., , , and . J. Supercomput., 70 (3): 1433-1450 (2014)