Author of the publication

Security and Privacy in Cloud Computing: Vision, Trends, and Challenges.

, , , , and . IEEE Cloud Comput., 2 (2): 30-38 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Premarathne, Uthpala Subodhani
add a person with the name Premarathne, Uthpala Subodhani
 

Other publications of authors with the same name

Preference Biased Edge Weight Assignment for Connectivity-Based Resilience Computation in Telecommunication Networks.. IT Prof., 22 (6): 26-32 (2020)Secure and reliable surveillance over cognitive radio sensor networks in smart grid., , and . Pervasive Mob. Comput., (2015)Residual Energy Aware Trust Computation Method for Social Internet of Things.. ICIIS, page 470-475. IEEE, (2019)Process Management for Admission Control to Access Available Resources for Delay Sensitive Service in Fog-to-Cloud Architecture.. TENCON, page 219-224. IEEE, (2021)Multiplicative Attributes Graph Approach for Persistent Authentication in Single-Sign-On Mobile Systems., and . TrustCom, page 221-228. IEEE Computer Society, (2014)Trust based multi-agent cooperative load balancing system (TCLBS)., and . Future Gener. Comput. Syst., (2020)MAG-SIoT: A multiplicative attributes graph model based trust computation method for social Internet of Things.. ICIIS, page 1-6. IEEE, (2017)Hybrid Cryptographic Access Control for Cloud-Based EHR Systems., , , , , , and . IEEE Cloud Comput., 3 (4): 58-64 (2016)Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications., , and . Comput. Networks, (2015)Reliable delay-sensitive spectrum handoff management for re-entrant secondary users., , and . Ad Hoc Networks, (2017)