Author of the publication

Intrusion Detection and Prevention System using Secure Mobile Agents.

, and . SECRYPT, page 107-113. INSTICC Press, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Attribute-Centric Access Control: an ABAC versus RBAC argument., , , and . Secur. Commun. Networks, 9 (16): 3152-3166 (2016)Cloud Based Secure and Privacy Enhanced Authentication & Authorization Protocol., , , and . KES, volume 22 of Procedia Computer Science, page 680-688. Elsevier, (2013)Secure Protocol for Financial Transactions Using Smartphones - SPFT - Formally Proved by AVISPA., , , and . SECRYPT, page 387-392. SciTePress, (2014)DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases., , , , and . EURASIP J. Inf. Secur., (2016)EACF: extensible access control framework for cloud environments., , , and . Ann. des Télécommunications, 72 (5-6): 307-323 (2017)Comparative Analysis of Access Control Systems on Cloud., , and . SNPD, page 41-46. IEEE Computer Society, (2012)Evaluation and establishment of trust in cloud federation., , and . ICUIMC, page 12:1-12:8. ACM, (2014)CRESCENT+: a self-protecting framework for reliable composite web service delivery., , , and . Iran J. Comput. Sci., 1 (2): 65-87 (2018)Secure Virtual Machine Migration (SV2M) in Cloud Federation., , , and . SECRYPT, page 344-349. SciTePress, (2014)Assessment Criteria for Trust Models in Cloud Computing., , , , and . GreenCom/iThings/CPScom, page 254-261. IEEE, (2013)