Muhammad Awais Shibli, PhD
Muhammad Awais Shibli, PhD
NUST-SEECS AIS Lab
Verified email at seecs.edu.pk - Homepage
TitleCited byYear
Cloud identity management security issues & solutions: a taxonomy
U Habiba, R Masood, MA Shibli, MA Niazi
Complex Adaptive Systems Modeling 2 (1), 5, 2014
522014
Cloud based secure and privacy enhanced authentication & authorization protocol
U Khalid, A Ghafoor, M Irum, MA Shibli
Procedia Computer Science 22, 680-688, 2013
472013
Security of sharded NoSQL databases: A comparative analysis
A Zahid, R Masood, MA Shibli
2014 Conference on Information Assurance and Cyber Security (CIACS), 1-8, 2014
382014
Intrusion detection system in cloud computing: Challenges and opportunities
Y Mehmood, MA Shibli, U Habiba, R Masood
2013 2nd National Conference on Information Assurance (NCIA), 59-66, 2013
352013
Comparative analysis of access control systems on cloud
R Masood, MA Shibli
2012 13th ACIS International Conference on Software Engineering, Artificial …, 2012
252012
Cloud authorization: exploring techniques and approach towards effective access control framework
R Masood, MA Shibli, Y Ghazi, A Kanwal, A Ali
Frontiers of Computer Science 9 (2), 297-321, 2015
212015
Assessment criteria for trust models in cloud computing
A Kanwal, R Masood, UE Ghazia, MA Shibli, AG Abbasi
2013 IEEE International Conference on Green Computing and Communications and …, 2013
212013
Security aspects of virtualization in cloud computing
M Kazim, R Masood, MA Shibli, AG Abbasi
IFIP International Conference on Computer Information Systems and Industrial …, 2013
192013
Survey on secure live virtual machine (VM) migration in Cloud
N Ahmad, A Kanwal, MA Shibli
2013 2nd National Conference on Information Assurance (NCIA), 101-106, 2013
182013
Securing the virtual machine images in cloud computing
M Kazim, R Masood, MA Shibli
Proceedings of the 6th International Conference on Security of Information …, 2013
182013
Taxonomy for trust models in cloud computing
A Kanwal, R Masood, MA Shibli, R Mumtaz
The Computer Journal 58 (4), 601-626, 2015
152015
Intrusion Detection and Prevention System using Secure Mobile Agents.
MA Shibli, S Muftic
SECRYPT, 107-113, 2008
142008
Management of symmetric cryptographic keys in cloud based environment
F Fakhar, MA Shibli
2013 15th International Conference on Advanced Communications Technology …, 2013
132013
MagicNET: Security system for development, validation and adoption of mobile agents
MA Shibli, S Muftic, A Giambruno, A Lioy
2009 Third International Conference on Network and System Security, 389-396, 2009
132009
Distributed intrusion detection system using mobile agents in cloud computing environment
Y Mehmood, MA Shibli, A Kanwal, R Masood
2015 Conference on Information Assurance and Cyber Security (CIACS), 1-8, 2015
122015
MagicNET: security architecture for creation, classification, and validation of trusted mobile agents
MA Shibli, S Muftic
2009 11th International Conference on Advanced Communication Technology 2 …, 2009
122009
Evaluation and establishment of trust in cloud federation
A Kanwal, R Masood, MA Shibli
Proceedings of the 8th International Conference on Ubiquitous Information …, 2014
112014
MagicNET: The Human Immune System and Network Security System
MA Shibli, J Mwakalinga, S Muftic
IJCSNS International Journal of Computer Science and Network Security 9 (1 …, 2009
112009
Mobile agent middleware for multimedia services
MH Raza, MA Shibli
The 9th International Conference on Advanced Communication Technology 2 …, 2007
112007
Towards Attribute‐Centric Access Control: an ABAC versus RBAC argument
A Fatima, Y Ghazi, MA Shibli, AG Abassi
Security and Communication Networks 9 (16), 3152-3166, 2016
92016
The system can't perform the operation now. Try again later.
Articles 1–20