default search action
Muhammad Rizwan Asghar
Person information
- affiliation: The University of Auckland, NZ
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Saleh Mohamed Alhidaifi, Muhammad Rizwan Asghar, Imran Shafique Ansari:
Towards a Cyber Resilience Quantification Framework (CRQF) for IT infrastructure. Comput. Networks 247: 110446 (2024) - [j28]Ke He, Dan Dongseong Kim, Muhammad Rizwan Asghar:
NIDS-Vis: Improving the generalized adversarial robustness of network intrusion detection system. Comput. Secur. 145: 104028 (2024) - [j27]Saleh Mohamed Alhidaifi, Muhammad Rizwan Asghar, Imran Shafique Ansari:
A Survey on Cyber Resilience: Key Strategies, Research Challenges, and Future Directions. ACM Comput. Surv. 56(8): 196:1-196:48 (2024) - [j26]Amith Murthy, Muhammad Rizwan Asghar, Wanqing Tu:
A lightweight Intrusion Detection for Internet of Things-based smart buildings. Secur. Priv. 7(4) (2024) - 2023
- [j25]Ke He, Dan Dongseong Kim, Muhammad Rizwan Asghar:
Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 25(1): 538-566 (2023) - [i17]Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar:
Zero-Knowledge Proof-based Practical Federated Learning on Blockchain. CoRR abs/2304.05590 (2023) - 2022
- [j24]Jack Huang, Yuan Wei Qi, Muhammad Rizwan Asghar, Andrew Meads, Yu-Cheng Tu:
Sharing medical data using a blockchain-based secure EHR system for New Zealand. IET Blockchain 2(1): 13-28 (2022) - [j23]Gi-Chul Yang, Qinwen Hu, Muhammad Rizwan Asghar:
TIM: Secure and usable authentication for smartphones. J. Inf. Secur. Appl. 71: 103374 (2022) - [j22]Amith Murthy, Muhammad Rizwan Asghar, Wanqing Tu:
Towards a data-driven framework for optimizing security-efficiency tradeoff in QUIC. Secur. Priv. 5(1) (2022) - 2021
- [j21]Qinwen Hu, Muhammad Rizwan Asghar, Sherali Zeadally:
Blockchain-based public ecosystem for auditing security of software applications. Computing 103(11): 2643-2665 (2021) - [j20]Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee:
A large-scale analysis of HTTPS deployments: Challenges, solutions, and recommendations. J. Comput. Secur. 29(1): 25-50 (2021) - [j19]Aditya Bahl, Aastha Sharma, Muhammad Rizwan Asghar:
Vulnerability disclosure and cybersecurity awareness campaigns on twitter during COVID-19. Secur. Priv. 4(6) (2021) - [j18]Manoranjan Mohanty, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello:
e-PRNU: Encrypted Domain PRNU-Based Camera Attribution for Preserving Privacy. IEEE Trans. Dependable Secur. Comput. 18(1): 426-437 (2021) - [j17]Shujie Cui, Sana Belguith, Pramodya De Alwis, Muhammad Rizwan Asghar, Giovanni Russello:
Collusion Defender: Preserving Subscribers' Privacy in Publish and Subscribe Systems. IEEE Trans. Dependable Secur. Comput. 18(3): 1051-1064 (2021) - [j16]Shujie Cui, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello:
Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage. ACM Trans. Priv. Secur. 24(3): 18:1-18:35 (2021) - 2020
- [j15]Muhammad Usman, Marwa K. Qaraqe, Muhammad Rizwan Asghar, Anteneh A. Gebremariam, Imran Shafique Ansari, Fabrizio Granelli, Qammer H. Abbasi:
A Business and Legislative Perspective of V2X and Mobility Applications in 5G Networks. IEEE Access 8: 67426-67435 (2020) - [j14]Muhammad Usman, Marwa K. Qaraqe, Muhammad Rizwan Asghar, Imran Shafique Ansari:
Mitigating distributed denial of service attacks in satellite networks. Trans. Emerg. Telecommun. Technol. 31(6) (2020) - [j13]Qinwen Hu, Se-Young Yu, Muhammad Rizwan Asghar:
Analysing performance issues of open-source intrusion detection systems in high-speed networks. J. Inf. Secur. Appl. 51: 102426 (2020) - [j12]Shujie Cui, Muhammad Rizwan Asghar, Giovanni Russello:
Multi-CDN: Towards Privacy in Content Delivery Networks. IEEE Trans. Dependable Secur. Comput. 17(5): 984-999 (2020) - [c57]Muhammad Usman, Marwa K. Qaraqe, Muhammad Rizwan Asghar, Imran Shafique Ansari:
Energy Efficient Wireless Body Area Networks: Proximity-based Clustering in Medical Implants. COMNET 2020: 1-5 - [c56]Muhammad Usman, Marwa K. Qaraqe, Muhammad Rizwan Asghar, Imran Shafique Ansari, Fabrizio Granelli:
Optimizing Energy in WiFi Direct Based Multi-hop D2D Networks. GLOBECOM 2020: 1-6 - [c55]Abba Garba, Qinwen Hu, Zhong Chen, Muhammad Rizwan Asghar:
BB-PKI: Blockchain-Based Public Key Infrastructure Certificate Management. HPCC/DSS/SmartCity 2020: 824-829 - [c54]Lamine Aouad, Muhammad Rizwan Asghar:
Defender-centric Conceptual Cyber Exposure Ontology for Adaptive Cyber Risk Assessment. ICETE (2) 2020: 580-586 - [c53]Sana Belguith, Muhammad Rizwan Asghar, Song Wang, Karina Mabell Gomez, Giovanni Russello:
SMART: Shared Memory based SDN Architecture to Resist DDoS ATtacks. ICETE (2) 2020: 608-617 - [c52]Muhammad Rizwan Asghar, Andrew Luxton-Reilly:
A Case Study of a Cybersecurity Programme: Curriculum Design, Resource Management, and Reflections. SIGCSE 2020: 16-22 - [c51]Muhammad Rizwan Asghar, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig:
Towards a Theory of Special-Purpose Program Obfuscation. TrustCom 2020: 394-401 - [c50]Manasi Mittal, Muhammad Rizwan Asghar, Arvind K. Tripathi:
Do My Emotions Influence What I Share? Analysing the Effects of Emotions on Privacy Leakage in Twitter. TrustCom 2020: 1228-1235 - [c49]Xiuli Fang, Muhammad Rizwan Asghar:
RevBloc: A Blockchain-based Secure Customer Review System. TrustCom 2020: 1250-1259 - [i16]Muhammad Rizwan Asghar, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig:
Towards a Theory of Special-purpose Program Obfuscation. CoRR abs/2011.02607 (2020)
2010 – 2019
- 2019
- [j11]César Bernardini, Samuel Marchal, Muhammad Rizwan Asghar, Bruno Crispo:
PrivICN: Privacy-preserving content retrieval in information-centric networking. Comput. Networks 149: 13-28 (2019) - [j10]Muhammad Rizwan Asghar, Qinwen Hu, Sherali Zeadally:
Cybersecurity in industrial control systems: Issues, technologies, and challenges. Comput. Networks 165 (2019) - [j9]Muhammad Usman, Marwa K. Qaraqe, Muhammad Rizwan Asghar, Imran Shafique Ansari:
Process Mining and User Privacy in D2D and IoT Networks. Inform. Spektrum 42(5): 340-342 (2019) - [j8]Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee:
Checking certificate revocation efficiently using certificate revocation guard. J. Inf. Secur. Appl. 48 (2019) - [c48]Aditya Kuppa, Slawomir Grzonkowski, Muhammad Rizwan Asghar, Nhien-An Le-Khac:
Black Box Attacks on Deep Anomaly Detectors. ARES 2019: 21:1-21:10 - [c47]Muhammad Usman, Muhammad Rizwan Asghar, Imran Shafique Ansari, Marwa K. Qaraqe:
Trust-Based DoS Mitigation Technique for Medical Implants in Wireless Body Area Networks. ICC 2019: 1-6 - [c46]Aditya Kuppa, Slawomir Grzonkowski, Muhammad Rizwan Asghar, Nhien-An Le-Khac:
Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection. TrustCom/BigDataSE 2019: 442-449 - [c45]Jack Huang, Yuan Wei Qi, Muhammad Rizwan Asghar, Andrew Meads, Yu-Cheng Tu:
MedBloc: A Blockchain-Based Secure EHR System for Sharing and Accessing Medical Data. TrustCom/BigDataSE 2019: 594-601 - [i15]Aditya Kuppa, Slawomir Grzonkowski, Muhammad Rizwan Asghar, Nhien-An Le-Khac:
Finding Rats in Cats: Detecting Stealthy Attacks using Group Anomaly Detection. CoRR abs/1905.07273 (2019) - [i14]Shujie Cui, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello:
Privacy-preserving Searchable Databases with Controllable Leakage. CoRR abs/1909.11624 (2019) - 2018
- [j7]Muhammad Usman, Muhammad Rizwan Asghar, Imran Shafique Ansari, Fabrizio Granelli, Khalid A. Qaraqe:
Technologies and Solutions for Location-Based Services in Smart Cities: Past, Present, and Future. IEEE Access 6: 22240-22248 (2018) - [j6]Muhammad Usman, Muhammad Rizwan Asghar, Imran Shafique Ansari, Marwa K. Qaraqe:
Security in Wireless Body Area Networks: From In-Body to Off-Body Communications. IEEE Access 6: 58064-58074 (2018) - [j5]Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar, Michael Backes, Claudia Díaz:
A Survey on Routing in Anonymous Communication Protocols. ACM Comput. Surv. 51(3): 51:1-51:39 (2018) - [c44]Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee:
Measuring IPv6 DNS Reconnaissance Attacks and Preventing Them Using DNS Guard. DSN 2018: 350-361 - [c43]Muhammad Usman, Muhammad Rizwan Asghar, Imran Shafique Ansari, Marwa K. Qaraqe, Fabrizio Granelli:
An Energy Consumption Model for WiFi Direct Based D2D Communications. GLOBECOM 2018: 1-6 - [c42]Muhammad Rizwan Asghar, Michael Backes, Milivoj Simeonovski:
PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale. ICC 2018: 1-6 - [c41]Shujie Cui, Muhammad Rizwan Asghar, Giovanni Russello:
Towards Blockchain-Based Scalable and Trustworthy File Sharing. ICCCN 2018: 1-2 - [c40]Shujie Cui, Sana Belguith, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello:
Preserving Access Pattern Privacy in SGX-Assisted Encrypted Search. ICCCN 2018: 1-9 - [c39]Muhammad Usman, Muhammad Rizwan Asghar, Fabrizio Granelli, Khalid A. Qaraqe:
Integrating smart city applications in 5G networks. ICFNDS 2018: 2:1-2:5 - [c38]Allen Parrish, John Impagliazzo, Rajendra K. Raj, Henrique M. Dinis Santos, Muhammad Rizwan Asghar, Audun Jøsang, Teresa Susana Mendes Pereira, Eliana Stavrou:
Global perspectives on cybersecurity education for 2030: a case for a meta-discipline. ITiCSE (Companion) 2018: 36-54 - [c37]Allen Parrish, John Impagliazzo, Rajendra K. Raj, Henrique M. Dinis Santos, Muhammad Rizwan Asghar, Audun Jøsang, Teresa Susana Mendes Pereira, Vítor J. Sá, Eliana Stavrou:
Global perspectives on cybersecurity education. ITiCSE 2018: 340-341 - [c36]Song Wang, Sathyanarayanan Chandrasekharan, Karina Mabell Gomez, Kandeepan Sithamparanathan, Akram Al-Hourani, Muhammad Rizwan Asghar, Giovanni Russello, Paul Zanna:
SECOD: SDN sEcure control and data plane algorithm for detecting and defending against DoS attacks. NOMS 2018: 1-5 - [c35]Sana Belguith, Shujie Cui, Muhammad Rizwan Asghar, Giovanni Russello:
Secure publish and subscribe systems with efficient revocation. SAC 2018: 388-394 - [c34]Muhammad Rizwan Asghar, Andrew Luxton-Reilly:
Teaching Cyber Security Using Competitive Software Obfuscation and Reverse Engineering Activities. SIGCSE 2018: 179-184 - [c33]Clemens Zeidler, Muhammad Rizwan Asghar:
AuthStore: Password-Based Authentication and Encrypted Data Storage in Untrusted Environments. TrustCom/BigDataSE 2018: 996-1001 - [c32]Manoranjan Mohanty, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello:
PANDORA: Preserving Privacy in PRNU-Based Source Camera Attribution. TrustCom/BigDataSE 2018: 1202-1207 - [c31]Shujie Cui, Sana Belguith, Pramodya De Alwis, Muhammad Rizwan Asghar, Giovanni Russello:
Malicious Entities are in Vain: Preserving Privacy in Publish and Subscribe Systems. TrustCom/BigDataSE 2018: 1624-1627 - [c30]Muhammad Usman, Muhammad Rizwan Asghar, Imran Shafique Ansari, Fabrizio Granelli, Qammer H. Abbasi, Khalid A. Qaraqe:
A marketplace for efficient and secure caching for IoT applications in 5G networks. WCNC 2018: 1-6 - [i13]Clemens Zeidler, Muhammad Rizwan Asghar:
AuthStore: Password-based Authentication and Encrypted Data Storage in Untrusted Environments. CoRR abs/1805.05033 (2018) - 2017
- [j4]Muhammad Rizwan Asghar, György Dán, Daniele Miorandi, Imrich Chlamtac:
Smart Meter Data Privacy: A Survey. IEEE Commun. Surv. Tutorials 19(4): 2820-2835 (2017) - [j3]César Bernardini, Muhammad Rizwan Asghar, Bruno Crispo:
Security and privacy in vehicular communications: Challenges and opportunities. Veh. Commun. 10: 13-28 (2017) - [c29]Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello:
P-McDb: Privacy-Preserving Search Using Multi-Cloud Encrypted Databases. CLOUD 2017: 334-341 - [c28]Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello:
Secure and Practical Searchable Encryption: A Position Paper. ACISP (1) 2017: 266-281 - [c27]Muhammad Rizwan Asghar, TzeHowe Lee, Mirza Mansoor Baig, Ehsan Ullah, Giovanni Russello, Gillian Dobbie:
A Review of Privacy and Consent Management in Healthcare: A Focus on Emerging Data Sources. eScience 2017: 518-522 - [c26]Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello:
ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage. FPS 2017: 189-205 - [c25]Muhammad Usman, Muhammad Rizwan Asghar, Imran Shafique Ansari, Fabrizio Granelli, Khalid A. Qaraqe:
Towards Energy Efficient Multi-Hop D2D Networks Using WiFi Direct. GLOBECOM 2017: 1-7 - [c24]Muhammad Usman, Muhammad Rizwan Asghar, Imran Shafique Ansari, Fabrizio Granelli:
Towards bootstrapping trust in D2D using PGP and reputation mechanism. ICC 2017: 1-6 - [c23]Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee:
Evaluating network intrusion detection systems for high-speed networks. ITNAC 2017: 1-6 - [c22]Shujie Cui, Muhammad Rizwan Asghar, Giovanni Russello:
Privacy-Preserving Content Delivery Networks. LCN 2017: 607-610 - [c21]Shujie Cui, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello:
Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database. WISTP 2017: 41-55 - [i12]Muhammad Rizwan Asghar, TzeHowe Lee, Mirza Mansoor Baig, Ehsan Ullah, Giovanni Russello, Gillian Dobbie:
A Review of Privacy and Consent Management in Healthcare: A Focus on Emerging Data Sources. CoRR abs/1711.00546 (2017) - 2016
- [j2]Manoranjan Mohanty, Muhammad Rizwan Asghar, Giovanni Russello:
$2DCrypt$ : Image Scaling and Cropping in Encrypted Domains. IEEE Trans. Inf. Forensics Secur. 11(11): 2542-2555 (2016) - [c20]Gabriela Gheorghe, Muhammad Rizwan Asghar, Jean Lancrenon, Sankalp Ghatpande:
SPARER: Secure Cloud-Proof Storage for e-Health Scenarios. ARES 2016: 444-453 - [c19]Clemens Zeidler, Muhammad Rizwan Asghar:
Towards a Framework for Privacy-Preserving Data Sharing in Portable Clouds. CLOSER (Selected Papers) 2016: 273-293 - [c18]Clemens Zeidler, Muhammad Rizwan Asghar:
Privacy-preserving Data Sharing in Portable Clouds. CLOSER (2) 2016: 274-281 - [c17]Muhammad Rizwan Asghar, César Bernardini, Bruno Crispo:
PROTECTOR: Privacy-preserving information lookup in content-centric networks. ICC 2016: 1-7 - [c16]Qinwen Hu, Muhammad Rizwan Asghar, Nevil Brownlee:
Certificate Revocation Guard (CRG): An Efficient Mechanism for Checking Certificate Revocation. LCN 2016: 527-530 - [c15]Clemens Zeidler, Muhammad Rizwan Asghar:
CloudEFS: Efficient and secure file system for cloud storage. PST 2016: 239-246 - [c14]Fatih Turkmen, Muhammad Rizwan Asghar, Yuri Demchenko:
iGenoPri: Privacy-preserving genomic data processing with integrity and correctness proofs. PST 2016: 407-410 - [c13]Manoranjan Mohanty, Muhammad Rizwan Asghar, Giovanni Russello:
3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the Cloud. SECRYPT 2016: 283-291 - [i11]Fatemeh Shirazi, Milivoj Simeonovski, Muhammad Rizwan Asghar, Michael Backes, Claudia Díaz:
A Survey on Routing in Anonymous Communication Protocols. CoRR abs/1608.05538 (2016) - [i10]Muhammad Rizwan Asghar, Michael Backes, Milivoj Simeonovski:
PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale. CoRR abs/1612.01787 (2016) - 2015
- [c12]Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel:
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information. ACNS 2015: 431-453 - [c11]Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo:
E-GRANT: Enforcing Encrypted Dynamic Security Constraints in the Cloud. FiCloud 2015: 135-144 - [c10]Ryan K. L. Ko, Giovanni Russello, Richard Nelson, Shaoning Pang, Aloysius Cheang, Gillian Dobbie, Abdolhossein Sarrafzadeh, Sivadon Chaisiri, Muhammad Rizwan Asghar, Geoffrey Holmes:
STRATUS: Towards Returning Data Control to Cloud Users. ICA3PP (Workshops and Symposiums) 2015: 57-70 - [p1]Muhammad Rizwan Asghar, Giovanni Russello:
Automating Consent Management Lifecycle for Electronic Healthcare Systems. Medical Data Privacy Handbook 2015: 361-387 - [i9]Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel:
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information. CoRR abs/1506.06033 (2015) - [i8]Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel:
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information. IACR Cryptol. ePrint Arch. 2015: 592 (2015) - 2014
- [c9]Muhammad Rizwan Asghar, Ashish Gehani, Bruno Crispo, Giovanni Russello:
PIDGIN: privacy-preserving interest and content sharing in opportunistic networks. AsiaCCS 2014: 135-146 - 2013
- [b1]Muhammad Rizwan Asghar:
Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments. University of Trento, Italy, 2013 - [j1]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOONERBAC: Enforcing security policies in outsourced environments. Comput. Secur. 35: 2-24 (2013) - [c8]Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo, Mihaela Ion:
Supporting complex queries and access policies for multi-user encrypted databases. CCSW 2013: 77-88 - [c7]Soudip Roy Chowdhury, Muhammad Imran, Muhammad Rizwan Asghar, Sihem Amer-Yahia, Carlos Castillo:
Tweet4act: Using incident-specific profiles for classifying crisis-related messages. ISCRAM 2013 - [i7]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. CoRR abs/1306.4828 (2013) - [i6]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON$_{ERBAC}$: Enforcing Security Policies In Outsourced Environments. CoRR abs/1308.3489 (2013) - [i5]Muhammad Rizwan Asghar, Giovanni Russello:
ACTORS: A Goal-driven Approach for Capturing and Managing Consent in e-Health Systems. CoRR abs/1309.2869 (2013) - [i4]Muhammad Rizwan Asghar:
Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments. CoRR abs/1312.6393 (2013) - [i3]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. IACR Cryptol. ePrint Arch. 2013: 277 (2013) - [i2]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments. IACR Cryptol. ePrint Arch. 2013: 587 (2013) - [i1]Muhammad Rizwan Asghar:
Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments. IACR Cryptol. ePrint Arch. 2013: 861 (2013) - 2012
- [c6]Muhammad Rizwan Asghar, Giovanni Russello:
ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems. POLICY 2012: 61-69 - [c5]Muhammad Rizwan Asghar, Daniele Miorandi:
A Holistic View of Security and Privacy Issues in Smart Grids. SmartGridSec 2012: 58-71 - 2011
- [c4]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments. ARES 2011: 99-108 - [c3]Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo:
Poster: ESPOONERBAC: enforcing security policies in outsourced environments with encrypted RBAC. CCS 2011: 841-844 - [c2]Muhammad Rizwan Asghar, Giovanni Russello:
Flexible and Dynamic Consent-Capturing. iNetSeC 2011: 119-131 - [c1]Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo:
Securing Data Provenance in the Cloud. iNetSeC 2011: 145-160
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint