Masoom Alam
Cited by
Cited by
A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends
F Zafar, A Khan, SUR Malik, M Ahmed, A Anjum, MI Khan, N Javed, ...
Computers & Security 65, 29-49, 2017
A balanced energy-consuming and hole-alleviating algorithm for wireless sensor networks
N Jan, N Javaid, Q Javaid, N Alrajeh, M Alam, ZA Khan, IA Niaz
IEEE Access 5, 6134-6150, 2017
A cross tenant access control (CTAC) model for cloud computing: formal specification and verification
Q Alam, SUR Malik, A Akhunzada, KKR Choo, S Tabbasum, M Alam
IEEE Transactions on Information Forensics and Security 12 (6), 1259-1268, 2016
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
M Alam, X Zhang, K Khan, G Ali
Proceedings of the 16th ACM symposium on Access control models and …, 2011
An Android runtime security policy enforcement framework
H Banuri, M Alam, S Khan, J Manzoor, B Ali, Y Khan, M Yaseen, MN Tahir, ...
Personal and Ubiquitous Computing 16, 631-641, 2012
Vector based genetic algorithm to optimize predictive analysis in network security
S Ijaz, FA Hashmi, S Asghar, M Alam
Applied intelligence 48, 1086-1096, 2018
Usage control platformization via trustworthy SELinux
M Alam, JP Seifert, Q Li, X Zhang
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
τ-safety: A privacy model for sequential publication with arbitrary updates
A Anjum, G Raschia, M Gelgon, A Khan, N Ahmad, M Ahmed, S Suhail, ...
computers & security 66, 20-39, 2017
Garbled role-based access control in the cloud
M Alam, N Emmanuel, T Khan, Y Xiang, H Hassan
Journal of Ambient Intelligence and Humanized Computing 9, 1153-1166, 2018
Behavioral attestation for web services (BA4WS)
M Alam, X Zhang, M Nauman, T Ali
Proceedings of the 2008 ACM workshop on Secure web services, 21-28, 2008
Method and system for extending SELinux policy models and their enforcement
X Zhang, JP Seifert, M Alam
US Patent 8,051,459, 2011
An accessible formal specification of the UML and OCL meta-model in Isabelle/HOL
T Ali, M Nauman, M Alam
2007 IEEE International Multitopic Conference, 1-6, 2007
Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits
A Saleem, A Khan, F Shahid, MM Alam, MK Khan
Journal of Network and Computer Applications 108, 1-19, 2018
Towards a set aggregation-based data integrity scheme for smart grids
M Tahir, A Khan, A Hameed, M Alam, MK Khan, F Jabeen
Annals of Telecommunications 72, 551-561, 2017
Scalable, privacy-preserving remote attestation in and through federated identity management frameworks
T Ali, M Nauman, M Amin, M Alam
2010 International Conference on Information Science and Applications, 1-8, 2010
A model-driven framework for trusted computing based systems
M Alam, JP Seifert, X Zhang
11th IEEE International Enterprise Distributed Object Computing Conference …, 2007
Model driven configuration of secure operating systems for mobile applications in healthcare
B Agreiter, M Alam, M Hafner, JP Seifert, X Zhang
Proceedings of the 1st International Workshop on Mode-Based Trustworthy …, 2007
Analysis of Dalvik virtual machine and class path library
S Khan, S Khan, H Banuri, M Nauman, M Alam
Tech. rep. Security Engineering Research Group, Institute of Management …, 2009
A scalable and privacy preserving remote attestation mechanism
T Ali, M Alam, M Nauman, T Ali, M Ali, S Anwar
Information-An International Interdisciplinary Journal 14 (4), 1193-1203, 2011
A high-level domain-specific language for SIEM (design, development and formal verification)
A Nazir, M Alam, SUR Malik, A Akhunzada, MN Cheema, MK Khan, ...
Cluster Computing 20, 2423-2437, 2017
The system can't perform the operation now. Try again later.
Articles 1–20