Author of the publication

Consumer Oriented Privacy Preserving Access Control for Electronic Health Records in the Cloud.

, , , , and . CLOUD, page 608-615. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards extended safety in connected vehicles., , , and . ITSC, page 652-657. IEEE, (2013)EPICS: A Framework for Enforcing Security Policies in Composite Web Services., , , and . IEEE Trans. Serv. Comput., 12 (3): 415-428 (2019)Detection of Message Injection Attacks onto the CAN Bus using Similarity of Successive Messages-Sequence Graphs., , , and . CoRR, (2021)Making Secure Software Insecure without Changing Its Code: The Possibilities and Impacts of Attacks on the DevOps Pipeline., , and . CoRR, (2022)Using Garbled Circuit for Secure Brokering., and . CRiSIS, volume 13204 of Lecture Notes in Computer Science, page 108-117. Springer, (2021)The pervasive trust foundation for security in next generation networks., , and . NSPW, page 129-142. ACM, (2010)The current practices of changing secure software: an empirical study., , , , and . SAC, page 1566-1575. ACM, (2020)A time-evolution model for the privacy degree of information disseminated in online social networks., , , and . Int. J. Commun. Networks Distributed Syst., 11 (4): 412-430 (2013)Incorporating attacker capabilities in risk estimation and mitigation., , , , and . Comput. Secur., (2015)Detection of Message Injection Attacks Onto the CAN Bus Using Similarities of Successive Messages-Sequence Graphs., , , and . IEEE Trans. Inf. Forensics Secur., (2021)