Rahat Masood
Rahat Masood
The University of New South Wales (UNSW), National University of Sciences & Technology (NUST)
Verified email at student.unsw.edu.au - Homepage
TitleCited byYear
Cloud identity management security issues & solutions: a taxonomy
U Habiba, R Masood, MA Shibli, MA Niazi
Complex Adaptive Systems Modeling 2 (1), 5, 2014
522014
Security of sharded NoSQL databases: A comparative analysis
A Zahid, R Masood, MA Shibli
2014 Conference on Information Assurance and Cyber Security (CIACS), 1-8, 2014
382014
Intrusion detection system in cloud computing: Challenges and opportunities
Y Mehmood, MA Shibli, U Habiba, R Masood
2013 2nd National Conference on Information Assurance (NCIA), 59-66, 2013
352013
Comparative analysis of access control systems on cloud
R Masood, MA Shibli
2012 13th ACIS International Conference on Software Engineering, Artificial …, 2012
252012
Cloud authorization: exploring techniques and approach towards effective access control framework
R Masood, MA Shibli, Y Ghazi, A Kanwal, A Ali
Frontiers of Computer Science 9 (2), 297-321, 2015
212015
Assessment criteria for trust models in cloud computing
A Kanwal, R Masood, UE Ghazia, MA Shibli, AG Abbasi
2013 IEEE International Conference on Green Computing and Communications and …, 2013
212013
SWAM: Stuxnet worm analysis in metasploit
R Masood, Z Anwar
2011 Frontiers of Information Technology, 142-147, 2011
212011
Security aspects of virtualization in cloud computing
M Kazim, R Masood, MA Shibli, AG Abbasi
IFIP International Conference on Computer Information Systems and Industrial …, 2013
192013
Securing the virtual machine images in cloud computing
M Kazim, R Masood, MA Shibli
Proceedings of the 6th International Conference on Security of Information …, 2013
182013
Taxonomy for trust models in cloud computing
A Kanwal, R Masood, MA Shibli, R Mumtaz
The Computer Journal 58 (4), 601-626, 2015
152015
Distributed intrusion detection system using mobile agents in cloud computing environment
Y Mehmood, MA Shibli, A Kanwal, R Masood
2015 Conference on Information Assurance and Cyber Security (CIACS), 1-8, 2015
122015
Evaluation and establishment of trust in cloud federation
A Kanwal, R Masood, MA Shibli
Proceedings of the 8th International Conference on Ubiquitous Information …, 2014
112014
The chain of implicit trust: An analysis of the web third-party resources loading
M Ikram, R Masood, G Tyson, MA Kaafar, N Loizon, R Ensafi
The World Wide Web Conference, 2851-2857, 2019
102019
Usage control model specification in XACML policy language
R Masood, MA Shibli, M Bilal
IFIP International Conference on Computer Information Systems and Industrial …, 2012
92012
DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases
Y Ghazi, R Masood, A Rauf, MA Shibli, O Hassan
EURASIP Journal on Information Security 2016 (1), 16, 2016
82016
Assessment criteria for cloud identity management systems
U Habiba, AG Abassi, R Masood, MA Shibli
2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing …, 2013
82013
Touch and you˘re trapp (ck) ed: Quantifying the uniqueness of touch gestures for tracking
R Masood, BZH Zhao, HJ Asghar, MA Kaafar
Proceedings on Privacy Enhancing Technologies 2018 (2), 122-142, 2018
72018
Security aspects of database-as-a-service (DBaaS) in cloud computing
F Mehak, R Masood, Y Ghazi, MA Shibli, S Khan
Cloud Computing, 297-324, 2014
72014
Incognito: A method for obfuscating web data
R Masood, D Vatsalan, M Ikram, MA Kaafar
Proceedings of the 2018 World Wide Web Conference, 267-276, 2018
52018
Assessment of Cyber Security Challenges in Nuclear Power Plants - Security Incidents, Threats, and Initiatives
R Masood
http://www.cspri.seas.gwu.edu/assessment-of-cyber-security-challenges-in …, 2016
52016
The system can't perform the operation now. Try again later.
Articles 1–20