A Review of Computer Vision Methods in Network Security | 0 | 0.34 | 2021 |
Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps | 0 | 0.34 | 2020 |
Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading | 0 | 0.34 | 2020 |
The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading | 5 | 0.45 | 2019 |
Incognito: A Method for Obfuscating Web Data. | 0 | 0.34 | 2018 |
Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking. | 0 | 0.34 | 2018 |
CRESCENT+: a self-protecting framework for reliable composite web service delivery | 0 | 0.34 | 2018 |
EACF: extensible access control framework for cloud environments. | 1 | 0.37 | 2017 |
POSTER: TouchTrack: How Unique are your Touch Gestures? | 1 | 0.35 | 2017 |
DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases | 1 | 0.35 | 2016 |
Cloud authorization: exploring techniques and approach towards effective access control framework. | 6 | 0.44 | 2015 |
Realization of FGAC model using XACML policy specification | 0 | 0.34 | 2015 |
Taxonomy for Trust Models in Cloud Computing. | 0 | 0.34 | 2015 |
Cloud identity management security issues & solutions: a taxonomy | 5 | 0.44 | 2014 |
Evaluation and establishment of trust in cloud federation | 3 | 0.37 | 2014 |
Assessment Criteria for Cloud Identity Management Systems | 1 | 0.40 | 2013 |
Assessment Criteria for Trust Models in Cloud Computing. | 3 | 0.40 | 2013 |
Securing the virtual machine images in cloud computing | 2 | 0.35 | 2013 |
Usage Control Model Specification In Xacml Policy Language Xacml Policy Engine Of Ucon | 0 | 0.34 | 2012 |
Comparative Analysis of Access Control Systems on Cloud | 10 | 0.58 | 2012 |
SWAM: Stuxnet Worm Analysis in Metasploit | 2 | 0.41 | 2011 |