Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Scalable Service Scheme for Secure Group Communication in Grid., , , , and . COMPSAC (1), page 31-38. IEEE Computer Society, (2007)Real-Time Strategy and Practice in Service Grid., , , , , and . COMPSAC, page 161-166. IEEE Computer Society, (2004)Theory and methodology of research on cloud security., , and . SCIENCE CHINA Information Sciences, 59 (5): 050105:1-050105:3 (2016)Multi-version Execution for the Dynamic Updating of Cloud Applications., , , , and . COMPSAC, page 185-190. IEEE Computer Society, (2015)Secure Third Party Auditor for Ensuring Data Integrity in Cloud Storage., , , and . UIC/ATC/ScalCom, page 510-517. IEEE Computer Society, (2014)CloudMon: Monitoring Virtual Machines in Clouds., , , and . IEEE Trans. Computers, 65 (12): 3787-3793 (2016)A Novel VO-Based Access Control Model for Grid., , , and . GCC, volume 3251 of Lecture Notes in Computer Science, page 293-300. Springer, (2004)RT-Grid: A QoS Oriented Service Grid Framework., , , and . PDCAT, volume 3320 of Lecture Notes in Computer Science, page 345-348. Springer, (2004)Public auditing for secure data storage in cloud through a third party auditor using modern ciphertext., , , , , , and . IAS, page 73-78. IEEE, (2015)Robust image document authentication code with autonomous biometrie key generation, selection, and updating in cloud environment., , , , , , and . IAS, page 61-66. IEEE, (2015)