Masoom Alam
TitleCited byYear
A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends
F Zafar, A Khan, SUR Malik, M Ahmed, A Anjum, MI Khan, N Javed, ...
Computers & Security 65, 29-49, 2017
472017
An Android runtime security policy enforcement framework
H Banuri, M Alam, S Khan, J Manzoor, B Ali, Y Khan, M Yaseen, MN Tahir, ...
Personal and Ubiquitous Computing 16 (6), 631-641, 2012
362012
A balanced energy-consuming and hole-alleviating algorithm for wireless sensor networks
N Jan, N Javaid, Q Javaid, N Alrajeh, M Alam, ZA Khan, IA Niaz
IEEE Access 5, 6134-6150, 2017
302017
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
M Alam, X Zhang, K Khan, G Ali
Proceedings of the 16th ACM symposium on Access control models and …, 2011
302011
A cross tenant access control (CTAC) model for cloud computing: Formal specification and verification
Q Alam, SUR Malik, A Akhunzada, KKR Choo, S Tabbasum, M Alam
IEEE Transactions on Information Forensics and Security 12 (6), 1259-1268, 2016
242016
Usage control platformization via trustworthy SELinux
M Alam, JP Seifert, Q Li, X Zhang
Proceedings of the 2008 ACM symposium on Information, computer and …, 2008
242008
Behavioral attestation for web services (BA4WS)
M Alam, X Zhang, M Nauman, T Ali
Proceedings of the 2008 ACM workshop on Secure web services, 21-28, 2008
212008
Method and system for extending SELinux policy models and their enforcement
X Zhang, JP Seifert, M Alam
US Patent 8,051,459, 2011
142011
An accessible formal specification of the UML and OCL meta-model in Isabelle/HOL
T Ali, M Nauman, M Alam
2007 IEEE International Multitopic Conference, 1-6, 2007
142007
Model driven configuration of secure operating systems for mobile applications in healthcare
B Agreiter, M Alam, M Hafner, JP Seifert, X Zhang
Proceedings of the 1st International Workshop on Mode-Based Trustworthy …, 2007
142007
τ-safety: A privacy model for sequential publication with arbitrary updates
A Anjum, G Raschia, M Gelgon, A Khan, N Ahmad, M Ahmed, S Suhail, ...
computers & security 66, 20-39, 2017
132017
Vector Based Genetic Algorithm to optimize predictive analysis in network security
S Ijaz, FA Hashmi, S Asghar, M Alam
Applied Intelligence 48 (5), 1086-1096, 2018
122018
A model-driven framework for trusted computing based systems
M Alam, JP Seifert, X Zhang
11th IEEE International Enterprise Distributed Object Computing Conference …, 2007
122007
Garbled role-based access control in the cloud
M Alam, N Emmanuel, T Khan, Y Xiang, H Hassan
Journal of Ambient Intelligence and Humanized Computing 9 (4), 1153-1166, 2018
112018
Analysis of Dalvik virtual machine and class path library
S Khan, S Khan, H Banuri, M Nauman, M Alam
Tech. rep. Security Engineering Research Group, Institute of Management …, 2009
92009
A scalable and privacy preserving remote attestation mechanism
T Ali, M Alam, M Nauman, T Ali, M Ali, S Anwar
Information-An International Interdisciplinary Journal 14 (4), 1193-1203, 2011
82011
Scalable remote attestation with privacy protection
TA Tanveer, M Alam, M Nauman
International Conference on Trusted Systems, 73-87, 2009
72009
Mauth: A fine-grained and user-centric permission delegation framework for multi-mashup web services
M Alam, X Zhang, M Nauman, S Khan, Q Alam
2010 6th World Congress on Services, 56-63, 2010
62010
Scalable, privacy-preserving remote attestation in and through federated identity management frameworks
T Ali, M Nauman, M Amin, M Alam
2010 International Conference on Information Science and Applications, 1-8, 2010
62010
Optimizing SIEM throughput on the cloud using parallelization
M Alam, A Ihsan, MA Khan, Q Javaid, A Khan, J Manzoor, A Akhundzada, ...
PloS one 11 (11), 2016
32016
The system can't perform the operation now. Try again later.
Articles 1–20