Follow
Qasim Rajpoot
Title
Cited by
Cited by
Year
Attributes enhanced role-based access control model
QM Rajpoot, CD Jensen, R Krishnan
Trust, Privacy and Security in Digital Business: 12th International …, 2015
652015
Video surveillance: Privacy issues and legal compliance
QM Rajpoot, CD Jensen
Promoting social change and democracy through information technology, 69-92, 2015
572015
Integrating attributes into role-based access control
QM Rajpoot, CD Jensen, R Krishnan
Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015
572015
Security and Privacy in Video Surveillance: Requirements and Challenges
QM Rajpoot, CD Jensen
29th IFIP International Information Security and Privacy Conference (IFIP …, 2014
472014
Providing secure services for a virtual infrastructure
A Baldwin, C Dalton, S Shiu, K Kostienko, Q Rajpoot
ACM SIGOPS Operating Systems Review 43 (1), 44-51, 2009
15*2009
Reliable identification of counterfeit medicine using camera equipped mobile phones
S ur Rehman, RU Rasool, MS Ayub, S Ullah, A Kamal, QM Rajpoot, ...
8th International Conference on High-capacity Optical Networks and Emerging …, 2011
112011
Interoperability among access control models
K Hafeez, Q Rajpoot, A Shibli
2012 15th International Multitopic Conference (INMIC), 111-118, 2012
72012
Policy conflict management using XACML
I Shamoon, Q Rajpoot, A Shibli
2012 8th international conference on computing and networking technology …, 2012
62012
TAMEC: trusted augmented mobile execution on cloud
SL Shah, IA Abbasi, A Bashier Gism Elseed, S Ali, Z Anwar, Q Rajpoot, ...
Scientific Programming 2021, 1-8, 2021
52021
Enhancing Security and Privacy in Video Surveillance through Role-Oriented Access Control Mechanism
QM Rajpoot
Technical University of Denmark, 2016
22016
Enhancing Security and Privacy in Large-Scale Video Surveillance through Role-Oriented Access Control Mechanism
QM Rajpoot
Access Control Lists Conflict Detection and Resolution System
Z Anwar, A Ghafoor, MQ Rajpoot, A Shibli, I Shamoon
Interoperability among Access Control Models
Z Anwar, A Ghafoor, Q Rajpoot, A Shibli, K Hafeez
The system can't perform the operation now. Try again later.
Articles 1–13