Author of the publication

Security Architecture for Virtual Machines.

, , and . ICA3PP (1), volume 7016 of Lecture Notes in Computer Science, page 218-229. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tupakula, Udaya Kiran
add a person with the name Tupakula, Udaya Kiran
 

Other publications of authors with the same name

Counteracting security attacks in virtual machines in the cloud using property based attestation., and . J. Network and Computer Applications, (2014)On the Security of Tenant Transactions in the Cloud., and . CloudCom (1), page 525-530. IEEE Computer Society, (2013)SBAC: Service Based Access Control., , and . ICECCS, page 202-209. IEEE Computer Society, (2009)Trust and Recommendations in Mobile Ad hoc Networks., , , and . ICNS, page 64. IEEE Computer Society, (2007)Security techniques for zero day attacks., and . IWCMC, page 442-447. IEEE, (2011)Intrusion detection techniques for virtual domains., , and . HiPC, page 1-9. IEEE Computer Society, (2012)Trust Enhanced Cloud Security for Healthcare Services., and . TrustCom, page 344-351. IEEE Computer Society, (2014)A Policy based Security Architecture for Software Defined Networks., , , and . CoRR, (2018)A Policy-Based Security Architecture for Software-Defined Networks., , , and . IEEE Trans. Information Forensics and Security, 14 (4): 897-912 (2019)SDN-based Dynamic Policy Specification and Enforcement for Provisioning SECaaS in Cloud., , and . WISE (2), volume 10570 of Lecture Notes in Computer Science, page 550-561. Springer, (2017)