Author of the publication

Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing.

, , , and . Concurrency and Computation: Practice and Experience, 22 (13): 1893-1910 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-version Execution for the Dynamic Updating of Cloud Applications., , , , and . COMPSAC, page 185-190. IEEE Computer Society, (2015)Secure Third Party Auditor for Ensuring Data Integrity in Cloud Storage., , , and . UIC/ATC/ScalCom, page 510-517. IEEE Computer Society, (2014)An adaptive meta-scheduler for data-intensive applications., , , and . IJGUC, 1 (1): 32-37 (2005)A Trusted Group Signature Architecture in Virtual Computing Environment., , , and . ATC, volume 5060 of Lecture Notes in Computer Science, page 73-85. Springer, (2008)Fully Context-Sensitive CFI for COTS Binaries., , , , , and . ACISP (2), volume 10343 of Lecture Notes in Computer Science, page 435-442. Springer, (2017)A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment., , , , and . UIC, volume 5061 of Lecture Notes in Computer Science, page 35-45. Springer, (2008)A Novel VO-Based Access Control Model for Grid., , , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 293-300. Springer, (2004)SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities., , , , , , , and . CoRR, (2018)A Secure High-Order Lanczos-Based Orthogonal Tensor SVD for Big Data Reduction in Cloud Environment., , , , and . IEEE Trans. Big Data, 5 (3): 355-367 (2019)A Secure, Usable, and Transparent Middleware for Permission Managers on Android., , , , , and . IEEE Trans. Dependable Sec. Comput., 14 (4): 350-362 (2017)