Author of the publication

Securing Loosely-Coupled Collaboration in Cloud Environment through Dynamic Detection and Removal of Access Conflicts.

, , , and . IEEE Trans. Cloud Comput., 4 (3): 349-362 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

R2Q: A Risk Quantification Framework to Authorize Requests in Web-based Collaborations., , and . AsiaCCS, page 247-254. ACM, (2019)W2Q: A dual weighted QoI scoring mechanism in social sensing using community confidence., , , and . PerCom Workshops, page 375-380. IEEE, (2017)ADRIN: An Adaptive and Distributed Routing Mechanism for Challenged IoT Networks., , , and . COMSNETS, page 769-772. IEEE, (2024)PS-Sim: A Framework for Scalable Simulation of Participatory Sensing Data., , , and . SMARTCOMP, page 195-202. IEEE Computer Society, (2018)A probabilistic approach for filtering out spam reports in a vehicular participatory sensing system., , , and . COMSNETS, page 1-2. IEEE, (2016)bioSmartSense: A Bio-inspired Data Collection Framework for Energy-efficient, QoI-aware Smart City Applications., , and . PerCom, page 1-10. IEEE, (2019)A Statistical Approach to Detect Anomalous User Requests in SaaS Cloud-Centric Collaborations., , and . ICISS, volume 9478 of Lecture Notes in Computer Science, page 243-262. Springer, (2015)An Approach for Security Assessment of Network Configurations Using Attack Graph., and . NetCoM, page 283-288. IEEE Computer Society, (2009)QnQ: A reputation model to secure mobile crowdsourcing applications from incentive losses., , , and . CNS, page 1-9. IEEE, (2017)An ACO Based Approach for Detection of an Optimal Attack Path in a Dynamic Environment., , and . ICDCN, volume 5935 of Lecture Notes in Computer Science, page 509-520. Springer, (2010)