Author of the publication

Resource-centric Dynamic Access Control in Cloud.

, , , and . Trustcom/BigDataSE/ISPA, page 1957-1962. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design and Implementation of the Components of the Symmetric Cryptographic Algorithm., , , , , and . DSC, page 483-487. IEEE Computer Society, (2017)Hierarchical Key Management Scheme with Multilevel Secure Access., , , and . CyberC, page 97-102. IEEE, (2019)Enhanced blockchain based key management scheme against key exposure attack., , , and . AIIPCC, page 68:1-68:6. ACM, (2019)A User-Based Document Management Mechanism in Cloud., , , , and . CIS, page 377-381. IEEE Computer Society, (2014)Research on Credible Regulation Mechanism for the Trading of Digital Works., , , , and . SecureComm (1), volume 152 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 519-523. Springer, (2014)Provenance-based data flow control mechanism for Internet of things., , , , , and . Trans. Emerg. Telecommun. Technol., (2021)Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures., , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 2585-2602 (July 2024)SRAM: A State-Aware Risk Assessment Model for Intrusion Response., , , , , and . DSC, page 232-237. IEEE Computer Society, (2017)Redundant design of A CAN BUS Testing and Communication System for space robot arm., , , , , and . ICARCV, page 1894-1898. IEEE, (2008)Incentive mechanism for cooperative authentication: An evolutionary game approach., , , , , and . Inf. Sci., (2020)