Srijith Krishnan Nair

According to our database1, Srijith Krishnan Nair authored at least 29 papers between 2002 and 2012.

Collaborative distances :
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2012
Privacy preserving collaborative filtering for SaaS enabling PaaS clouds.
J. Cloud Computing, 2012

OPTIMIS: A holistic approach to cloud service provisioning.
Future Generation Comp. Syst., 2012

Self Managed Security Cell, a security model for the Internet of Things and Services
CoRR, 2012

An Architecture for the Enforcement of Privacy and Security Requirements in Internet-Centric Services.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Trust Model for Optimized Cloud Services.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Secure communication using dynamic VPN provisioning in an Inter-Cloud environment.
Proceedings of the 18th IEEE International Conference on Networks, 2012

Opinion Model Based Security Reputation Enabling Cloud Broker Architecture.
Proceedings of the Cloud Computing - Third International Conference, 2012

2011

Regulatory Impact of Data Protection and Privacy in the Cloud.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

Towards a Contextualization Solution for Cloud Platform Services.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
Security of Service Networks.
Proceedings of the Handbook of Information and Communication Security, 2010

An Efficient Secure Shared Storage Service with Fault and Investigative Disruption Tolerance.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Towards Secure Cloud Bursting, Brokerage and Aggregation.
Proceedings of the 8th IEEE European Conference on Web Services (ECOWS 2010), 2010

2009
Prestige-based peer sampling service: interdisciplinary approach to secure gossip.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

2008
Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme.
Fundam. Inform., 2008

A Virtual Machine Based Information Flow Control System for Policy Enforcement.
Electr. Notes Theor. Comput. Sci., 2008

Turning Teenagers into Stores.
IEEE Computer, 2008

Floodgate: A Micropayment Incentivized P2P Content Delivery Network.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

Enforcing DRM policies across applications.
Proceedings of the 8th ACM Workshop on Digital Rights Management, 2008

2007
Secure web service federation management using tpm virtualisation.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

A Hybrid PKI-IBC Based Ephemerizer System.
Proceedings of the New Approaches for Security, 2007

Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Nuovo DRM Paradiso: Towards a Verified Fair DRM Scheme.
Proceedings of the International Symposium on Fundamentals of Software Engineering, 2007

2006
Towards a Secure Application-Semantic Aware Policy Enforcement Architecture.
Proceedings of the Security Protocols, 2006

Towards a Secure Application-Semantic Aware Policy Enforcement Architecture.
Proceedings of the Security Protocols, 2006

2005
TCP Vegas-A: Improving the Performance of TCP Vegas.
Computer Communications, 2005

Enabling DRM-Preserving Digital Content Redistribution.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

2002
Analysis of the Defacement of Indian Web Sites.
First Monday, 2002

Effectiveness of TCP SACK, TCP HACK and TCP Trunk over satellite links.
Proceedings of the IEEE International Conference on Communications, 2002


  Loading...