Ali Sajjad

According to our database1, Ali Sajjad authored at least 23 papers between 2005 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
A secure cloud framework for ICMetric based IoT health devices.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

A ranked searchable encryption scheme for encrypted data hosted on the Public Cloud.
Proceedings of the 2017 International Conference on Information Networking, 2017

An architecture for privacy-preserving sharing of CTI with 3rd party analysis services.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

EncSwift and key management: An integrated approach in an industrial setting.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Deploying Visual Analytics Through a Multi-cloud Service Store with Encrypted Big Data (Short Paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016

Managed security service distribution model.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2015
A secure and scalable communication framework for inter-cloud services.
PhD thesis, 2015

A scalable and dynamic application-level secure communication framework for inter-cloud services.
Future Generation Comp. Syst., 2015

Security-as-a-Service in Multi-cloud and Federated Cloud Environments.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Integrating Security Services in Cloud Service Stores.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
A Low-Overhead Secure Communication Framework for an Inter-cloud Environment.
Proceedings of the Intelligent Cloud Computing - First International Conference, 2014

Seamless Enablement of Intelligent Protection for Enterprise Cloud Applications through Service Store.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

2012
Secure communication using dynamic VPN provisioning in an Inter-Cloud environment.
Proceedings of the 18th IEEE International Conference on Networks, 2012

2009
On achieving good operating points on an ROC plane using stochastic anomaly score prediction.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

2005
MAGI - Mobile Access to Grid Infrastructure: Bringing the gifts of Grid to Mobile Computing.
Proceedings of the NODe 2005, 2005

Framework of an Application-Aware Adaptation Scheme for Disconnected Operations.
Proceedings of the Active and Programmable Networks, 2005

A Trust Model for Ubiquitous Systems based on Vectors of Trust Values.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005

Mobile-to-Grid Middleware: An Approach for Breaching the Divide Between Mobile and Grid Environments.
Proceedings of the Networking, 2005

AutoMAGI - an Autonomic middleware for enabling Mobile Access to Grid Infrastructure.
Proceedings of the Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, 2005

A Component-based Architecture for an Autonomic Middleware Enabling Mobile Access to Grid Infrastructure.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Mobile-to-Grid Middleware: Bridging the Gap Between Mobile and Grid Environments.
Proceedings of the Advances in Grid Computing, 2005


  Loading...