-
1
-
-
84897808665
-
Authorization control for a semantic data repository through an inference policy engine
-
2013
-
A. Alamri, P. Bertok, and J. Thom. 2013. Authorization control for a semantic data repository through an inference policy engine. IEEE Transactions on Dependable and Secure Computing 10, 6 (2013), 328-340.
-
(2013)
IEEE Transactions on Dependable and Secure Computing
, vol.10
, Issue.6
, pp. 328-340
-
-
Alamri, A.1
Bertok, P.2
Thom, J.3
-
2
-
-
81455143669
-
The integration of corporate security strategies in collaborative business processes
-
2011
-
Y. Badr, F. Biennier, and S. Tata. 2011. The integration of corporate security strategies in collaborative business processes. IEEE Transactions on Services Computing 4, 3 (2011), 243-254.
-
(2011)
IEEE Transactions on Services Computing
, vol.4
, Issue.3
, pp. 243-254
-
-
Badr, Y.1
Biennier, F.2
Tata, S.3
-
4
-
-
61449159887
-
Dynamic trust management
-
2009
-
M. Blaze, S. Kannan, I. Lee, O. Sokolsky, J. Smith, A. Keromytis, and W. Lee. 2009. Dynamic trust management. Computer 42, 2 (2009), 44-52.
-
(2009)
Computer
, vol.42
, Issue.2
, pp. 44-52
-
-
Blaze, M.1
Kannan, S.2
Lee, I.3
Sokolsky, O.4
Smith, J.5
Keromytis, A.6
Lee, W.7
-
5
-
-
84921505568
-
Hiresome-II: Towards privacy-Aware cross-cloud service composition for big data applications
-
2015
-
W. Dou, X. Zhang, J. Liu, and J. Chen. 2015. HireSome-II: Towards privacy-Aware cross-cloud service composition for big data applications. IEEE Transactions on Parallel and Distributed Systems 26, 2 (2015), 455-466.
-
(2015)
IEEE Transactions on Parallel and Distributed Systems
, vol.26
, Issue.2
, pp. 455-466
-
-
Dou, W.1
Zhang, X.2
Liu, J.3
Chen, J.4
-
6
-
-
78650919710
-
Vulnerabilities of fingerprint reader to fake fingerprints attacks
-
2011
-
M. Espinoza, C. Champod, and P. Margot. 2011. Vulnerabilities of fingerprint reader to fake fingerprints attacks. Forensic Science International 204, 1 (2011), 41-49.
-
(2011)
Forensic Science International
, vol.204
, Issue.1
, pp. 41-49
-
-
Espinoza, M.1
Champod, C.2
Margot, P.3
-
8
-
-
84992705739
-
Intrusion detection techniques for mobile cloud computing in heterogeneous 5g
-
2015
-
K. Gai, M. Qiu, L. Tao, and Y. Zhu. 2015a. Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks (2015), 1-10.
-
(2015)
Security and Communication Networks
, pp. 1-10
-
-
Gai, K.1
Qiu, M.2
Tao, L.3
Zhu, Y.4
-
9
-
-
84961743187
-
Proactive attribute-based secure data schema formobile cloud in financial industry
-
IEEE, New York
-
K. Gai, M. Qiu, B. Thuraisingham, and L. Tao. 2015b. Proactive attribute-based secure data schema formobile cloud in financial industry. In Proceedings of the IEEE International Symposium on Big Data Security on Cloud; 17th IEEE International Conference on High Performance Computing and Communications. IEEE, New York, 1332-1337.
-
(2015)
Proceedings of the IEEE International Symposium on Big Data Security on Cloud; 17th IEEE International Conference on High Performance Computing and Communications
, pp. 1332-1337
-
-
Gai, K.1
Qiu, M.2
Thuraisingham, B.3
Tao, L.4
-
10
-
-
84949627105
-
Dynamic energy-Aware cloudlet-based mobile cloud computing model for green computing
-
2015
-
K. Gai, M. Qiu, H. Zhao, L. Tao, and Z. Zong. 2015c. Dynamic energy-Aware cloudlet-based mobile cloud computing model for green computing. Journal of Network and Computer Applications 59 (2015), 46-54.
-
(2015)
Journal of Network and Computer Applications
, vol.59
, pp. 46-54
-
-
Gai, K.1
Qiu, M.2
Zhao, H.3
Tao, L.4
Zong, Z.5
-
11
-
-
84934756449
-
Abductive analysis of administrative policies in rule-based access control
-
2014
-
P. Gupta, S. Stoller, and Z. Xu. 2014. Abductive analysis of administrative policies in rule-based access control. IEEE Transactions on Dependable and Secure Computing 11, 5 (2014), 412-424.
-
(2014)
IEEE Transactions on Dependable and Secure Computing
, vol.11
, Issue.5
, pp. 412-424
-
-
Gupta, P.1
Stoller, S.2
Xu, Z.3
-
12
-
-
84878326313
-
Multiparty access control for online social networks: Model and mechanisms
-
2013
-
H. Hu, G. Ahn, and J. Jorgensen. 2013. Multiparty access control for online social networks: Model and mechanisms. IEEE Transactions on Knowledge and Data Engineering 25, 7 (2013), 1614-1627.
-
(2013)
IEEE Transactions on Knowledge and Data Engineering
, vol.25
, Issue.7
, pp. 1614-1627
-
-
Hu, H.1
Ahn, G.2
Jorgensen, J.3
-
13
-
-
84856020580
-
An exploratory study of the relationships between selected contextual factors and information security concerns in global financial services institutions
-
2011
-
P. Ifinedo. 2011. An exploratory study of the relationships between selected contextual factors and information security concerns in global financial services institutions. Journal of Information Privacy and Security 7, 1 (2011), 25-49.
-
(2011)
Journal of Information Privacy and Security
, vol.7
, Issue.1
, pp. 25-49
-
-
Ifinedo, P.1
-
14
-
-
84940106029
-
The effects of national culture on the assessment of information security threats and controls in financial services industry
-
2014
-
P. Ifinedo. 2014. The effects of national culture on the assessment of information security threats and controls in financial services industry. International Journal of Electronic Business Management 12, 2 (2014), 75.
-
(2014)
International Journal of Electronic Business Management
, vol.12
, Issue.2
, pp. 75
-
-
Ifinedo, P.1
-
15
-
-
84962857221
-
Privacy protection for preventing data over-collection in smart city
-
Y. Li, W. Dai, Z. Ming, and M. Qiu. 2015. Privacy protection for preventing data over-collection in smart city. IEEE Transactions on Computers PP (2015), 1. Issue 99.
-
(2015)
IEEE Transactions on Computers PP
, vol.2015
, Issue.1
, pp. 99
-
-
Li, Y.1
Dai, W.2
Ming, Z.3
Qiu, M.4
-
16
-
-
80055048663
-
Compressing network access control lists
-
2011
-
A. Liu, E. Torng, and C. Meiners. 2011. Compressing network access control lists. IEEE Transactions on Parallel and Distributed Systems 22, 12 (2011), 1969-1977.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.12
, pp. 1969-1977
-
-
Liu, A.1
Torng, E.2
Meiners, C.3
-
17
-
-
84890372403
-
Comprehensive security integrated model and ontology within cloud computing
-
2013
-
F. Liu, H. Lo, L. Chen, and W. Lee. 2013. Comprehensive security integrated model and ontology within cloud computing. J. of Internet Technology 14, 6 (2013), 935-946.
-
(2013)
J. of Internet Technology
, vol.14
, Issue.6
, pp. 935-946
-
-
Liu, F.1
Lo, H.2
Chen, L.3
Lee, W.4
-
18
-
-
84948658189
-
Mitigating on-off attacks in the internet of things using a distributed trust management scheme
-
2015
-
C. Mendoza and J. Kleinschmidt. 2015. Mitigating on-off attacks in the Internet of Things using a distributed trust management scheme. International Journal of Distributed Sensor Networks 2015 (2015), 1-8.
-
(2015)
International Journal of Distributed Sensor Networks
, vol.2015
, pp. 1-8
-
-
Mendoza, C.1
Kleinschmidt, J.2
-
19
-
-
84911901976
-
Kasr: A keyword-Aware service recommendation method on mapreduce for big data application
-
2014
-
S. Meng, W. Dou, X. Zhang, and J. Chen. 2014. KASR: A keyword-Aware service recommendation method on MapReduce for big data application. IEEE Transactions on Parallel & Distributed Systems 25, 12 (2014), 3221-3231.
-
(2014)
IEEE Transactions on Parallel & Distributed Systems
, vol.25
, Issue.12
, pp. 3221-3231
-
-
Meng, S.1
Dou, W.2
Zhang, X.3
Chen, J.4
-
20
-
-
84861527324
-
Sub-trees modification ofhuffman coding for stuffing bits reduction and efficient nrzi data transmission
-
2012
-
Y. Pai, F. Cheng, S. Lu, and S. Ruan. 2012. Sub-trees modification ofHuffman coding for stuffing bits reduction and efficient NRZI data transmission. IEEE Transactions on Broadcasting 58, 2 (2012), 221-227.
-
(2012)
IEEE Transactions on Broadcasting
, vol.58
, Issue.2
, pp. 221-227
-
-
Pai, Y.1
Cheng, F.2
Lu, S.3
Ruan, S.4
-
21
-
-
84897430255
-
Accuracy-constrained privacy-preserving access control mechanism for relational data
-
2014
-
Z. Pervaiz,W. Aref, A. Ghafoor, and N. Prabhu. 2014. Accuracy-constrained privacy-preserving access control mechanism for relational data. IEEE Transactions on Knowledge and Data Engineering 26, 4 (2014), 795-807.
-
(2014)
IEEE Transactions on Knowledge and Data Engineering
, vol.26
, Issue.4
, pp. 795-807
-
-
Pervaiz, Z.1
Aref, W.2
Ghafoor, A.3
Prabhu, N.4
-
22
-
-
84987611000
-
Proactive user-centric secure data scheme using attribute-based semantic access controls formobile clouds in financial industry
-
M. Qiu, K. Gai, B. Thuraisingham, L. Tao, and H. Zhao. 2016. Proactive user-centric secure data scheme using attribute-based semantic access controls formobile clouds in financial industry. Future Generation Computer Systems PP (2016), 1.
-
(2016)
Future Generation Computer Systems PP
, pp. 1
-
-
Qiu, M.1
Gai, K.2
Thuraisingham, B.3
Tao, L.4
Zhao, H.5
-
23
-
-
82155167643
-
Energy efficient security algorithm for power grid wide area monitoring system
-
2011
-
M. Qiu,W. Gao, M. Chen, J. Niu, and L. Zhang. 2011. Energy efficient security algorithm for power grid wide area monitoring system. IEEE Transactions on Smart Grid 2, 4 (2011), 715-723.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.4
, pp. 715-723
-
-
Qiu, M.1
Gao, W.2
Chen, M.3
Niu, J.4
Zhang, L.5
-
24
-
-
65849231067
-
Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems
-
2009
-
M. Qiu and E. Sha. 2009. Cost minimization while satisfying hard/soft timing constraints for heterogeneous embedded systems. ACM Transactions on Design Automation of Electronic Systems 14, 2 (2009), 25.
-
(2009)
ACM Transactions on Design Automation of Electronic Systems
, vol.14
, Issue.2
, pp. 25
-
-
Qiu, M.1
Sha, E.2
-
25
-
-
84946905548
-
Phase-change memory optimization for green cloud with genetic algorithm
-
2015
-
M. Qiu, M. Zhong, J. Li, K. Gai, and Z. Zong. 2015. Phase-change memory optimization for green cloud with genetic algorithm. IEEE Transactions on Computers 64, 12 (2015), 3528-3540.
-
(2015)
IEEE Transactions on Computers
, vol.64
, Issue.12
, pp. 3528-3540
-
-
Qiu, M.1
Zhong, M.2
Li, J.3
Gai, K.4
Zong, Z.5
-
26
-
-
84914113157
-
Bank locker security system based on RFID and gsm technology
-
2012
-
R. Ramani, S. Selvaraju, S. Valarmathy, and P. Niranjan. 2012. Bank locker security system based on RFID and GSM technology. International Journal of Computer Applications 57, 18 (2012), 15-20.
-
(2012)
International Journal of Computer Applications
, vol.57
, Issue.18
, pp. 15-20
-
-
Ramani, R.1
Selvaraju, S.2
Valarmathy, S.3
Niranjan, P.4
-
27
-
-
20844442173
-
Applying semantic knowledge to real-time update of access control policies
-
2005
-
I. Ray. 2005. Applying semantic knowledge to real-time update of access control policies. IEEE Transactions on Knowledge and Data Engineering 17, 6 (2005), 844-858.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.6
, pp. 844-858
-
-
Ray, I.1
-
28
-
-
80555127389
-
A semantically enhanced upnp control point for sharing multimedia content
-
2011
-
M. Rico, O. Corcho, V. Méndez, and J. Gómez-Pérez. 2011. A semantically enhanced UPnP control point for sharing multimedia content. IEEE Internet Computing 15, 6 (2011), 58-64.
-
(2011)
IEEE Internet Computing
, vol.15
, Issue.6
, pp. 58-64
-
-
Rico, M.1
Corcho, O.2
Méndez, V.3
Gómez-Pérez, J.4
-
29
-
-
81255188083
-
Software support for building automation requirements engineering-An application of semantic web technologies in automation
-
2011
-
S. Runde and A. Fay. 2011. Software support for building automation requirements engineering-An application of semantic web technologies in automation. IEEE Transactions on Industrial Informatics 7, 4 (2011), 723-730.
-
(2011)
IEEE Transactions on Industrial Informatics
, vol.7
, Issue.4
, pp. 723-730
-
-
Runde, S.1
Fay, A.2
-
30
-
-
84859045783
-
Enhancing privacy and dynamic federation in idm for consumer cloud computing
-
2012
-
R. Sánchez, F. Almenares, P. Arias, D. Díaz-Sánchez, and A. Marín. 2012. Enhancing privacy and dynamic federation in IdM for consumer cloud computing. IEEE Transactions on Consumer Electronics 58, 1 (2012), 95-103.
-
(2012)
IEEE Transactions on Consumer Electronics
, vol.58
, Issue.1
, pp. 95-103
-
-
Sánchez, R.1
Almenares, F.2
Arias, P.3
Díaz-Sánchez, D.4
Marín, A.5
-
31
-
-
44649149548
-
Analyzing and managing role-based access control policies
-
2008
-
K. Sohr, M. Drouineaud, G. Ahn, and M. Gogolla. 2008. Analyzing and managing role-based access control policies. IEEE Transactions on Knowledge and Data Engineering 20, 7 (2008), 924-939.
-
(2008)
IEEE Transactions on Knowledge and Data Engineering
, vol.20
, Issue.7
, pp. 924-939
-
-
Sohr, K.1
Drouineaud, M.2
Ahn, G.3
Gogolla, M.4
-
32
-
-
84863343959
-
Opass: A user authentication protocol resistant to password stealing and password reuse attacks
-
2012
-
H. Sun, Y. Chen, and Y. Lin. 2012a. oPass: A user authentication protocol resistant to password stealing and password reuse attacks. IEEE Transactions on Information Forensics and Security 7, 2 (2012), 651-663.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.2
, pp. 651-663
-
-
Sun, H.1
Chen, Y.2
Lin, Y.3
-
34
-
-
84861176850
-
Ensuring distributed accountability for data sharing in the cloud
-
2012
-
S. Sundareswaran, A. Squicciarini, and D. Lin. 2012. Ensuring distributed accountability for data sharing in the cloud. IEEE Transactions on Dependable and Secure Computing 9, 4 (2012), 556-568.
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.4
, pp. 556-568
-
-
Sundareswaran, S.1
Squicciarini, A.2
Lin, D.3
-
36
-
-
67651165303
-
Enabling secure service discovery in mobile healthcare enterprise networks
-
2009
-
A. Toninelli, R. Montanari, and A. Corradi. 2009. Enabling secure service discovery in mobile healthcare enterprise networks. IEEE Wireless Communications 16, 3 (2009), 24-32.
-
(2009)
IEEE Wireless Communications
, vol.16
, Issue.3
, pp. 24-32
-
-
Toninelli, A.1
Montanari, R.2
Corradi, A.3
-
37
-
-
84899893060
-
Captcha as graphical passwords-A new security primitive based on hard ai problems
-
2014
-
B. Zhu, J. Yan, G. Bao, M. Yang, and N. Xu. 2014. Captcha as graphical passwords-A new security primitive based on hard AI problems. IEEE Transactions on Information Forensics and Security 9, 6 (2014), 891-904.
-
(2014)
IEEE Transactions on Information Forensics and Security
, vol.9
, Issue.6
, pp. 891-904
-
-
Zhu, B.1
Yan, J.2
Bao, G.3
Yang, M.4
Xu, N.5
-
38
-
-
79959557055
-
Addressing cloud computing security issues
-
2012
-
D. Zissis and D. Lekkas. 2012. Addressing cloud computing security issues. Future Generation computer systems 28, 3 (2012), 583-592.
-
(2012)
Future Generation Computer Systems
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
|