Somchart Fugkeaw

Orcid: 0000-0001-7156-184X

According to our database1, Somchart Fugkeaw authored at least 55 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Achieving Secure, Verifiable, and Efficient Boolean Keyword Searchable Encryption for Cloud Data Warehouse.
IEEE Access, 2024

Enabling Dynamic Vulnerability Assessment for Multi-web Application Using Executable Directed Acyclic Graph.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
An efficient and scalable vaccine passport verification system based on ciphertext policy attribute-based encryption and blockchain.
J. Cloud Comput., December, 2023

Secure Data Sharing With Efficient Key Update for Industrial Cloud-Based Access Control.
IEEE Trans. Serv. Comput., 2023

A Fully Outsourced Attribute-Based Signcryption Scheme Supporting Privacy-Preserving Policy Update in Mobile Cloud Computing.
IEEE Access, 2023

Secure and Lightweight Blockchain-Enabled Access Control for Fog-Assisted IoT Cloud Based Electronic Medical Records Sharing.
IEEE Access, 2023

Achieving Decentralized and Dynamic SSO-Identity Access Management System for Multi-Application Outsourced in Cloud.
IEEE Access, 2023

OWADIS: Rapid Discovery of OWASP10 Vulnerability based on Hybrid IDS.
Proceedings of the 15th International Conference on Knowledge and Smart Technology, 2023

RANDES: A Ransomware Detection System based on Machine Learning.
Proceedings of the 15th International Conference on Knowledge and Smart Technology, 2023

An Efficient Medical Records Access Control with Auditable Outsourced Encryption and Decryption.
Proceedings of the 15th International Conference on Knowledge and Smart Technology, 2023

Design and Implementation of Fast and Secure SSO Authentication for Multi-Application Services Deployed in Cloud.
Proceedings of the 15th International Conference on Knowledge and Smart Technology, 2023

LightPEN: Optimizing the Vulnerability Exposures for Lightweight Penetration Test.
Proceedings of the 15th International Conference on Knowledge and Smart Technology, 2023

A Dynamic and Efficient Crypto-Steganography System for Securing Multiple Files in Cloud.
Proceedings of the 15th International Conference on Knowledge and Smart Technology, 2023

An Efficiently Revocable Cloud-based Access Control Using Proxy Re-encryption and Blockchain.
Proceedings of the 20th IEEE International Joint Conference on Computer Science and Software Engineering, 2023

BLUR & TRACK: Real-time Face Detection with Immediate Blurring and Efficient Tracking.
Proceedings of the 20th IEEE International Joint Conference on Computer Science and Software Engineering, 2023

A Resilient Cloud-based DDoS Attack Detection and Prevention System.
Proceedings of the 20th IEEE International Joint Conference on Computer Science and Software Engineering, 2023

Implementing An Outsourced Dual-Proxy Signing and Decryption Scheme in Mobile Cloud Computing.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium, 2023

2022
A Review on Data Access Control Schemes in Mobile Cloud Computing: State-of-the-Art Solutions and Research Directions.
SN Comput. Sci., 2022

Enabling Trust and Privacy-Preserving e-KYC System Using Blockchain.
IEEE Access, 2022

A Mobile Cloud-based Access Control with Efficiently Outsourced Decryption.
Proceedings of the 10th IEEE International Conference on Mobile Cloud Computing, 2022

VAPE-BRIDGE: Bridging OpenVAS Results for Automating Metasploit Framework.
Proceedings of the 14th International Conference on Knowledge and Smart Technology, 2022

Design and Development of A Cloud-Based IDS using Apache Kafka and Spark Streaming.
Proceedings of the 19th International Joint Conference on Computer Science and Software Engineering, 2022

2021
A Lightweight Policy Update Scheme for Outsourced Personal Health Records Sharing.
IEEE Access, 2021

A Fine-Grained and Lightweight Data Access Control Model for Mobile Cloud Computing.
IEEE Access, 2021

WorkTrue: An Efficient and Secure Cloud-based Workflow Management System.
Proceedings of the 29th Euromicro International Conference on Parallel, 2021

Proxy-Assisted Digital Signing Scheme for Mobile Cloud Computing.
Proceedings of the 13th International Conference on Knowledge and Smart Technology, 2021

DBIM: An Efficient and Resilient PII Data Breach Incident Management System.
Proceedings of the 13th International Conference on Knowledge and Smart Technology, 2021

AP2I: Adaptive PII Scanning and Consent Discovery System.
Proceedings of the 13th International Conference on Knowledge and Smart Technology, 2021

2018
Scalable and secure access control policy update for outsourced big data.
Future Gener. Comput. Syst., 2018

Enabling Dynamic and Efficient Data Access Control in Cloud Computing Based on Attribute Certificate Management and CP-ABE.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

2017
Achieving Scalable and Optimized Attribute Revocation in Cloud Computing.
IEICE Trans. Inf. Syst., 2017

Enforcing Hidden Access Policy for Supporting Write Access in Cloud Storage Systems.
Proceedings of the CLOSER 2017, 2017

2016
Embedding lightweight proxy re-encryption for efficient attribute revocation in cloud computing.
Int. J. High Perform. Comput. Netw., 2016

Updating Policies in CP-ABE-Based Access Control: An Optimized and Secure Service.
Proceedings of the Service-Oriented and Cloud Computing, 2016

Key Update as a Service (KAAS): An Agent-Based Modeling for Cloud-Based Access Control.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

Improved Lightweight Proxy Re-encryption for Flexible and Scalable Mobile Revocation Management in Cloud Computing.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
CLOUD-CAT: A collaborative access control tool for data outsourced in cloud computing.
Proceedings of the Tenth International Conference on Digital Information Management, 2015

An Extended CP-ABE Based Access Control Model for Data Outsourced in the Cloud.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Enabling Constraints and Dynamic Preventive Access Control Policy Enforcement in the Cloud.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2012
Achieving privacy and security in multi-owner data outsourcing.
Proceedings of the Seventh International Conference on Digital Information Management, 2012

2010
Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses.
Proceedings of the Emergent Web Intelligence: Advanced Information Retrieval, 2010

2009
Data Authentication and the Corresponding Provenance Information Management.
J. Digit. Inf. Manag., 2009

Design and Development of the Dynamic DRBAC Model using PMI and XACML-based Authorization.
J. Digit. Inf. Manag., 2009

A-COLD: Access Control of Web OLAP over Multi-data Warehouse.
Proceedings of the The Forth International Conference on Availability, 2009

2008
An SSO-Capable Distributed RBAC Model with High Availability across Administrative Domain.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment.
Proceedings of the First International Conference on Emerging Security Information, 2007

Achieving DRBAC Authorization in Multi-trust Domains with MAS Architecture and PMI.
Proceedings of the Agent Computing and Multi-Agent Systems, 2007

Multi-Application Authentication Based on Multi-Agent System.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

A Robust Single Sign-On Model Based on Multi-Agent System and PKI.
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007

A development of multi-SSO authentication and RBAC model in the distributed systems.
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007

Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication Management.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
Design and development of a multiversion OLAP application.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Direct Access Versioning for Multidimensional Database Schema Creation.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
Multi-Version and Evolution Support for Multidimensional Database Schema.
Proceedings of the IASTED International Conference on Databases and Applications, 2005

OLAP Application Development for Multiple Versions Query in Multidimensional Database Systems.
Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering, 2005


  Loading...