Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data Z Pervaiz, WG Aref, A Ghafoor, N Prabhu IEEE Transactions On Knowledge And Data Engineering 26 (4), 795-807, 2014 | 51 | 2014 |
Precision-Bounded Access Control Using Sliding-Window Query Views for Privacy-Preserving Data Streams Z Pervaiz, A Ghafoor, WG Aref IEEE Transactions on Knowledge and Data Engineering 27 (7), 1992-2004, 2015 | 19 | 2015 |
xUAVs: Towards Efficient Approximate Computing for UAVs—Low Power Approximate Adders With Single LUT Delay for FPGA-Based Aerial Imaging Optimization T Nomani, M Mohsin, Z Pervaiz, M Shafique IEEE Access 8, 102982-102996, 2020 | 16 | 2020 |
Composability Verification of Multi-Service Workflows in a Policy-Driven Cloud Computing Environment B Shafiq, S Ghayyur, A Masood, Z Pervaiz, A Almutairi, F Khan, A Ghafoor IEEE Transactions on Dependable and Secure Computing 14 (5), 478-493, 2017 | 11 | 2017 |
A Privacy Mechanism for Access Controlled Graph Data MU Arshad, M Felemban, Z Pervaiz, A Ghafoor, WG Aref IEEE Transactions on Dependable and Secure Computing 16 (5), 819-832, 2017 | 2 | 2017 |
Access control for healthcare using policy machine Z Pervaiz, A Samuel, D Ferraiolo, S Gavrila, A Ghafoor Purdue University, Tech. Rep. CERIAS TR 2009–20 8, 2009 | 1 | 2009 |
Mining roles and access control for relational data under privacy and accuracy constraints Z Pervaiz Purdue University, 2013 | | 2013 |
Verification of secure cloud-based workflow services A Almutairi, Z Pervaiz, B Shafiq, A Ghafoor Proceedings of the 12th Annual Information Security Symposium, 1-1, 2011 | | 2011 |
Automatic enforcement of multiple policies in healthcare domain Z Pervaiz, D Ferraiolo, S Gavrila, A Ghafoor Proceedings of the 11th Annual Information Security Symposium, 1-1, 2010 | | 2010 |
A multi-policy framework for mitigating insider threat in healthcare domain Z Pervaiz PURDUE UNIVERSITY, 2009 | | 2009 |
Strengthening Password Storage with Image-Selected Randomization F Berchmans, YS Cho, M Kirkpatrick, Z Pervaiz | | |
Role Mining on Relational Data Z Pervaiz, A Ghafoor, WG Aref | | |