Abdul Ghafoor Abbasi
Abdul Ghafoor Abbasi
Verified email at ri.se - Homepage
TitleCited byYear
Cloud based secure and privacy enhanced authentication & authorization protocol
U Khalid, A Ghafoor, M Irum, MA Shibli
Procedia Computer Science 22, 680-688, 2013
Towards a secure service provisioning framework in a smart city environment
Z Khan, Z Pervez, AG Abbasi
Future Generation Computer Systems 77, 112-135, 2017
Towards cloud based smart cities data security and privacy management
Z Khan, Z Pervez, A Ghafoor
2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing …, 2014
SAGE: Next generation multi-agent system
A Ghafoor, M ur Rehman, ZA Khan, HF Ahmad, A Ali
PDPTA 4, 139-145, 2004
Assessment criteria for trust models in cloud computing
A Kanwal, R Masood, UE Ghazia, MA Shibli, AG Abbasi
2013 IEEE International Conference on Green Computing and Communications and …, 2013
Security aspects of virtualization in cloud computing
M Kazim, R Masood, MA Shibli, AG Abbasi
IFIP International Conference on Computer Information Systems and Industrial …, 2013
Security analysis of VoIP architecture for identifying SIP vulnerabilities
UU Rehman, AG Abbasi
2014 International Conference on Emerging Technologies (ICET), 87-93, 2014
Analysis of BYOD security frameworks
S Ali, MN Qureshi, AG Abbasi
2015 Conference on Information Assurance and Cyber Security (CIACS), 56-61, 2015
CryptoNET: Design and implementation of the secure email system
A Ghafoor, S Muftic, G Schmölzer
2009 Proceedings of the 1st International Workshop on Security and …, 2009
Cryptonet: Softwareprotection and secure execution environment
A Ghafoor, S Muftic
Int. J. Computer Science and Network Security 10 (2), 19-26, 2010
Veidblock: Verifiable identity using blockchain and ledger in a software defined network
AG Abbasi, Z Khan
Companion Proceedings of the10th International Conference on Utility and …, 2017
Towards Attribute‐Centric Access Control: an ABAC versus RBAC argument
A Fatima, Y Ghazi, MA Shibli, AG Abassi
Security and Communication Networks 9 (16), 3152-3166, 2016
Web Contents Protection, Secure Execution and Authorized Distribution
AG Abbasi, S Muftic, I Hotamov
2010 Fifth International Multi-conference on Computing in the Global …, 2010
A Secure Architecture for Inter-cloud Virtual Machine Migration
T Zeb, A Ghafoor, A Shibli, M Yousaf
International Conference on Security and Privacy in Communication Networks …, 2014
Assessment criteria for cloud identity management systems
U Habiba, AG Abassi, R Masood, MA Shibli
2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing …, 2013
DISMI-an intent interface for application-centric transport network services
P Sköldström, S Junique, A Ghafoor, A Marsico, D Siracusa
2017 19th International Conference on Transparent Optical Networks (ICTON), 1-4, 2017
Adaptive transport protocols in multi agent system
A Mehmood, A Ghafoor, HF Ahmed, Z Iqbal
Fifth International Conference on Information Technology: New Generations …, 2008
Smart phone based authentication and authorization protocol for SPACS
FK Bhutta, A Ghafoor, S Sultan
High Capacity Optical Networks and Emerging/Enabling Technologies, 127-131, 2012
CryptoNET: Generic Security Framework for Cloud Computing Environments
AG Abbasi
KTH Royal Institute of Technology, 2011
Cryptonet: security management protocols
AG Abbasi, S Muftic
Proceedings of the 9th WSEAS international conference on Data networks …, 2010
The system can't perform the operation now. Try again later.
Articles 1–20