Author of the publication

Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services.

, , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 437-443. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments., , , and . Secur. Commun. Networks, (2018)Security and privacy enhanced smartphone-based gait authentication with random representation learning and digital lockers., , , and . Pattern Recognit., (2022)Quantum Dwarf Mongoose Optimization With Ensemble Deep Learning Based Intrusion Detection in Cyber-Physical Systems., , , , , and . IEEE Access, (2023)Industrial HPC activities in Korea., , , , and . HPCS, page 814-818. IEEE, (2011)Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services., , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 437-443. Springer, (2015)Blockchain Assisted Data Edge Verification With Consensus Algorithm for Machine Learning Assisted IoT., , , , , and . IEEE Access, (2023)Gait Type Classification Using Smart Insole Sensors., , , and . TENCON, page 1903-1906. IEEE, (2018)Behavior Recognition of a Person in a Daily Video Using Joint Position Information., , , , and . AIKE, page 172-174. IEEE Computer Society, (2018)The MAP/PH/N/∞ Queueing-Inventory System With Demands From a Random Environment., , , , , , and . IEEE Access, (2022)