Saif Ur Rehman Malik

According to our database1, Saif Ur Rehman Malik authored at least 28 papers between 2013 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 





An efficient approach for publishing microdata for multiple sensitive attributes.
The Journal of Supercomputing, 2018

An efficient privacy mechanism for electronic health records.
Computers & Security, 2018

Improved Generalization for Secure Data Publishing.
IEEE Access, 2018

SLA-Aware Energy Efficient Resource Management for Cloud Environments.
IEEE Access, 2018

Calculating Completeness of Agile Scope in Scaled Agile Development.
IEEE Access, 2018

CloudNetSim++: A GUI Based Framework for Modeling and Simulation of Data Centers in OMNeT++.
IEEE Trans. Services Computing, 2017

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification.
IEEE Trans. Information Forensics and Security, 2017

DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party.
IEEE Trans. Cloud Computing, 2017

Modeling and Analysis of the Thermal Properties Exhibited by Cyberphysical Data Centers.
IEEE Systems Journal, 2017

Formal modeling and verification of security controls for multimedia systems in the cloud.
Multimedia Tools Appl., 2017

Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy.
MONET, 2017

RedEdge: A Novel Architecture for Big Data Processing in Mobile Edge Computing Environments.
J. Sensor and Actuator Networks, 2017

Formal verification and performance evaluation of task scheduling heuristics for makespan optimization and workflow distribution in large-scale computing systems.
Comput. Syst. Sci. Eng., 2017

A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends.
Computers & Security, 2017

τ-safety: A privacy model for sequential publication with arbitrary updates.
Computers & Security, 2017

A high-level domain-specific language for SIEM (design, development and formal verification).
Cluster Computing, 2017

Identifying Deviations in Software Processes.
IEEE Access, 2017

Fog Computing Over IoT: A Secure Deployment and Formal Verification.
IEEE Access, 2017

Enhanced Architecture for Privacy Preserving Data Integration in a Medical Research Environment.
IEEE Access, 2017

Formal Verification of the xDAuth Protocol.
IEEE Trans. Information Forensics and Security, 2016

Designing and Modeling of Covert Channels in Operating Systems.
IEEE Trans. Computers, 2016

MATF: a multi-attribute trust framework for MANETs.
EURASIP J. Wireless Comm. and Networking, 2016

Performance analysis of data intensive cloud systems based on data management and replication: a survey.
Distributed and Parallel Databases, 2016

Dynamic task mapping for Network-on-Chip based systems.
Journal of Systems Architecture - Embedded Systems Design, 2015

A taxonomy and survey on Green Data Center Networks.
Future Generation Comp. Syst., 2014

Trends and Challenges in Cloud Datacenters.
IEEE Cloud Computing, 2014

Modeling and Analysis of State-of-the-art VM-based Cloud Management Platforms.
IEEE Trans. Cloud Computing, 2013

A survey on resource allocation in high performance distributed computing systems.
Parallel Computing, 2013