Follow
Zahid Pervaiz
Zahid Pervaiz
Verified email at cae.nust.edu.pk - Homepage
Title
Cited by
Cited by
Year
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data
Z Pervaiz, WG Aref, A Ghafoor, N Prabhu
IEEE Transactions On Knowledge And Data Engineering 26 (4), 795-807, 2014
532014
Precision-Bounded Access Control Using Sliding-Window Query Views for Privacy-Preserving Data Streams
Z Pervaiz, A Ghafoor, WG Aref
IEEE Transactions on Knowledge and Data Engineering 27 (7), 1992-2004, 2015
182015
xUAVs: Towards Efficient Approximate Computing for UAVs—Low Power Approximate Adders With Single LUT Delay for FPGA-Based Aerial Imaging Optimization
T Nomani, M Mohsin, Z Pervaiz, M Shafique
IEEE Access 8, 102982-102996, 2020
82020
Composability Verification of Multi-Service Workflows in a Policy-Driven Cloud Computing Environment
B Shafiq, S Ghayyur, A Masood, Z Pervaiz, A Almutairi, F Khan, A Ghafoor
IEEE Transactions on Dependable and Secure Computing 14 (5), 478-493, 2017
82017
Access control for healthcare using policy machine
Z Pervaiz, A Samuel, D Ferraiolo, S Gavrila, A Ghafoor
Purdue University, Tech. Rep. CERIAS TR 2009–20 8, 2009
12009
A Privacy Mechanism for Access Controlled Graph Data
MU Arshad, M Felemban, Z Pervaiz, A Ghafoor, WG Aref
IEEE Transactions on Dependable and Secure Computing 16 (5), 819-832, 2017
2017
Mining roles and access control for relational data under privacy and accuracy constraints
Z Pervaiz
Purdue University, 2013
2013
Verification of secure cloud-based workflow services
A Almutairi, Z Pervaiz, B Shafiq, A Ghafoor
Proceedings of the 12th Annual Information Security Symposium, 1-1, 2011
2011
Automatic enforcement of multiple policies in healthcare domain
Z Pervaiz, D Ferraiolo, S Gavrila, A Ghafoor
Proceedings of the 11th Annual Information Security Symposium, 1-1, 2010
2010
A multi-policy framework for mitigating insider threat in healthcare domain
Z Pervaiz
PURDUE UNIVERSITY, 2009
2009
Strengthening Password Storage with Image-Selected Randomization
F Berchmans, YS Cho, M Kirkpatrick, Z Pervaiz
Role Mining on Relational Data
Z Pervaiz, A Ghafoor, WG Aref
The system can't perform the operation now. Try again later.
Articles 1–12