Mamadou H. Diallo

According to our database1, Mamadou H. Diallo authored at least 16 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
IoT Notary: Sensor Data Attestation in Smart Environment.
CoRR, 2019

2018
Trustworthy Sensing in an Untrusted IoT Environment.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

Homomorphic Encryption for Secure Computation on Big Data.
Proceedings of the 3rd International Conference on Internet of Things, 2018

Trustworthy Privacy Policy Translation in Untrusted IoT Environments.
Proceedings of the 3rd International Conference on Internet of Things, 2018

A Forensic Pattern-Based Approach for Investigations in Cloud System Environments.
Proceedings of the 2nd Cyber Security in Networking Conference, 2018

2017
AutoMigrate: a framework for developing intelligent, self-managing cloud services with maximum availability.
Cluster Computing, 2017

AnomalyDetect: Anomaly Detection for Preserving Availability of Virtualized Cloud Services.
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017

2016
AutoMigrate: A Framework for Developing Intelligent, Self-Managing Cloud Services with Maximum Availability.
Proceedings of the 2016 International Conference on Cloud and Autonomic Computing, 2016

CallForFire: A Mission-Critical Cloud-Based Application Built Using the Nomad Framework.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
Nomad: A Framework for Developing Mission-Critical Cloud-Based Applications.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2012
Indexing Encrypted Documents for Supporting Efficient Keyword Search.
Proceedings of the Secure Data Management - 9th VLDB Workshop, 2012

CloudProtect: Managing Data Privacy in Cloud Applications.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2009
Middleware for Pervasive Spaces: Balancing Privacy and Utility.
Proceedings of the Middleware 2009, ACM/IFIP/USENIX, 10th International Middleware Conference, Urbana, IL, USA, November 30, 2009

2007
Toward Architecture Evaluation through Ontology-Based Requirements-Level Scenarios.
Proceedings of the Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], 2007

2006
Architecting trust-enabled peer-to-peer file-sharing applications.
ACM Crossroads, 2006

Architectural support for trust models in decentralized applications.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006


  Loading...