Abdul Ghafoor Abbasi
Abdul Ghafoor Abbasi
Verified email at ri.se - Homepage
Cited by
Cited by
Towards a secure service provisioning framework in a smart city environment
Z Khan, Z Pervez, AG Abbasi
Future Generation Computer Systems 77, 112-135, 2017
Cloud based secure and privacy enhanced authentication & authorization protocol
U Khalid, A Ghafoor, M Irum, MA Shibli
Procedia Computer Science 22, 680-688, 2013
Towards cloud based smart cities data security and privacy management
Z Khan, Z Pervez, A Ghafoor
2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing …, 2014
SAGE: Next generation multi-agent system
A Ghafoor, M ur Rehman, ZA Khan, HF Ahmad, A Ali
PDPTA 4, 139-145, 2004
Veidblock: Verifiable identity using blockchain and ledger in a software defined network
AG Abbasi, Z Khan
Companion Proceedings of the10th International Conference on Utility and …, 2017
Security analysis of VoIP architecture for identifying SIP vulnerabilities
UU Rehman, AG Abbasi
2014 International Conference on Emerging Technologies (ICET), 87-93, 2014
Security aspects of virtualization in cloud computing
M Kazim, R Masood, MA Shibli, AG Abbasi
IFIP International Conference on Computer Information Systems and Industrial …, 2013
Assessment criteria for trust models in cloud computing
A Kanwal, R Masood, UE Ghazia, MA Shibli, AG Abbasi
2013 IEEE International Conference on Green Computing and Communications and …, 2013
Analysis of BYOD security frameworks
S Ali, MN Qureshi, AG Abbasi
2015 Conference on Information Assurance and Cyber Security (CIACS), 56-61, 2015
Blockchain and edge computing–based architecture for participatory smart city applications
Z Khan, AG Abbasi, Z Pervez
Concurrency and Computation: Practice and Experience 32 (12), e5566, 2020
Dismi-an intent interface for application-centric transport network services
P Sköldström, S Junique, A Ghafoor, A Marsico, D Siracusa
2017 19th International Conference on Transparent Optical Networks (ICTON), 1-4, 2017
CryptoNET: Design and implementation of the secure email system
A Ghafoor, S Muftic, G Schmölzer
2009 Proceedings of the 1st International Workshop on Security and …, 2009
A secure architecture for inter-cloud virtual machine migration
T Zeb, A Ghafoor, A Shibli, M Yousaf
International Conference on Security and Privacy in Communication Networks …, 2014
CryptoNET: software protection and secure execution environment
A Ghafoor, S Muftic
Int. J. Computer Science and Network Security 10 (2), 19-26, 2010
Towards Attribute‐Centric Access Control: an ABAC versus RBAC argument
A Fatima, Y Ghazi, MA Shibli, AG Abassi
Security and Communication Networks 9 (16), 3152-3166, 2016
Assessment criteria for cloud identity management systems
U Habiba, AG Abassi, R Masood, MA Shibli
2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing …, 2013
Smart phone based authentication and authorization protocol for SPACS
FK Bhutta, A Ghafoor, S Sultan
High Capacity Optical Networks and Emerging/Enabling Technologies, 127-131, 2012
Web Contents Protection, Secure Execution and Authorized Distribution
AG Abbasi, S Muftic, I Hotamov
2010 Fifth International Multi-conference on Computing in the Global …, 2010
Adaptive transport protocols in multi agent system
A Mehmood, A Ghafoor, HF Ahmed, Z Iqbal
Fifth International Conference on Information Technology: New Generations …, 2008
An interactive intent-based negotiation scheme for application-centric networks
A Marsico, M Santuari, M Savi, D Siracusa, A Ghafoor, S Junique, ...
2017 IEEE Conference on Network Softwarization (NetSoft), 1-2, 2017
The system can't perform the operation now. Try again later.
Articles 1–20