Muhammad Awais Shibli, PhD
Muhammad Awais Shibli, PhD
NUST-SEECS AIS Lab
Verified email at seecs.edu.pk - Homepage
Title
Cited by
Cited by
Year
Cloud identity management security issues & solutions: a taxonomy
U Habiba, R Masood, MA Shibli, MA Niazi
Complex Adaptive Systems Modeling 2 (1), 5, 2014
592014
Cloud based secure and privacy enhanced authentication & authorization protocol
U Khalid, A Ghafoor, M Irum, MA Shibli
Procedia Computer Science 22, 680-688, 2013
512013
Security of sharded NoSQL databases: A comparative analysis
A Zahid, R Masood, MA Shibli
2014 Conference on Information Assurance and Cyber Security (CIACS), 1-8, 2014
452014
Intrusion detection system in cloud computing: Challenges and opportunities
Y Mehmood, MA Shibli, U Habiba, R Masood
2013 2nd National Conference on Information Assurance (NCIA), 59-66, 2013
382013
Comparative analysis of access control systems on cloud
R Masood, MA Shibli
2012 13th ACIS International Conference on Software Engineering, Artificial …, 2012
252012
Assessment criteria for trust models in cloud computing
A Kanwal, R Masood, UE Ghazia, MA Shibli, AG Abbasi
2013 IEEE International Conference on Green Computing and Communications and …, 2013
242013
Cloud authorization: exploring techniques and approach towards effective access control framework
R Masood, MA Shibli, Y Ghazi, A Kanwal, A Ali
Frontiers of Computer Science 9 (2), 297-321, 2015
222015
Security aspects of virtualization in cloud computing
M Kazim, R Masood, MA Shibli, AG Abbasi
IFIP International Conference on Computer Information Systems and Industrial …, 2013
212013
Survey on secure live virtual machine (VM) migration in Cloud
N Ahmad, A Kanwal, MA Shibli
2013 2nd National Conference on Information Assurance (NCIA), 101-106, 2013
192013
Securing the virtual machine images in cloud computing
M Kazim, R Masood, MA Shibli
Proceedings of the 6th International Conference on Security of Information …, 2013
182013
Taxonomy for trust models in cloud computing
A Kanwal, R Masood, MA Shibli, R Mumtaz
The Computer Journal 58 (4), 601-626, 2015
172015
Distributed intrusion detection system using mobile agents in cloud computing environment
Y Mehmood, MA Shibli, A Kanwal, R Masood
2015 Conference on Information Assurance and Cyber Security (CIACS), 1-8, 2015
162015
Intrusion Detection and Prevention System using Secure Mobile Agents.
MA Shibli, S Muftic
SECRYPT, 107-113, 2008
152008
Management of symmetric cryptographic keys in cloud based environment
F Fakhar, MA Shibli
2013 15th International Conference on Advanced Communications Technology …, 2013
142013
MagicNET: security architecture for creation, classification, and validation of trusted mobile agents
MA Shibli, S Muftic
2009 11th International Conference on Advanced Communication Technology 2 …, 2009
142009
MagicNET: Security system for development, validation and adoption of mobile agents
MA Shibli, S Muftic, A Giambruno, A Lioy
2009 Third International Conference on Network and System Security, 389-396, 2009
132009
Evaluation and establishment of trust in cloud federation
A Kanwal, R Masood, MA Shibli
Proceedings of the 8th International Conference on Ubiquitous Information …, 2014
122014
Usage control model specification in XACML policy language
R Masood, MA Shibli, M Bilal
IFIP International Conference on Computer Information Systems and Industrial …, 2012
122012
Mobile agent middleware for multimedia services
MH Raza, MA Shibli
The 9th International Conference on Advanced Communication Technology 2 …, 2007
112007
DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases
Y Ghazi, R Masood, A Rauf, MA Shibli, O Hassan
EURASIP Journal on Information Security 2016 (1), 16, 2016
102016
The system can't perform the operation now. Try again later.
Articles 1–20