A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends F Zafar, A Khan, SUR Malik, M Ahmed, A Anjum, MI Khan, N Javed, ... Computers & Security 65, 29-49, 2017 | 151 | 2017 |
A balanced energy-consuming and hole-alleviating algorithm for wireless sensor networks N Jan, N Javaid, Q Javaid, N Alrajeh, M Alam, ZA Khan, IA Niaz IEEE Access 5, 6134-6150, 2017 | 91 | 2017 |
A cross tenant access control (CTAC) model for cloud computing: formal specification and verification Q Alam, SUR Malik, A Akhunzada, KKR Choo, S Tabbasum, M Alam IEEE Transactions on Information Forensics and Security 12 (6), 1259-1268, 2016 | 67 | 2016 |
xDAuth: a scalable and lightweight framework for cross domain access control and delegation M Alam, X Zhang, K Khan, G Ali Proceedings of the 16th ACM symposium on Access control models and …, 2011 | 49 | 2011 |
An Android runtime security policy enforcement framework H Banuri, M Alam, S Khan, J Manzoor, B Ali, Y Khan, M Yaseen, MN Tahir, ... Personal and Ubiquitous Computing 16, 631-641, 2012 | 44 | 2012 |
Vector based genetic algorithm to optimize predictive analysis in network security S Ijaz, FA Hashmi, S Asghar, M Alam Applied intelligence 48, 1086-1096, 2018 | 34 | 2018 |
Usage control platformization via trustworthy SELinux M Alam, JP Seifert, Q Li, X Zhang Proceedings of the 2008 ACM symposium on Information, computer and …, 2008 | 33 | 2008 |
τ-safety: A privacy model for sequential publication with arbitrary updates A Anjum, G Raschia, M Gelgon, A Khan, N Ahmad, M Ahmed, S Suhail, ... computers & security 66, 20-39, 2017 | 28 | 2017 |
Garbled role-based access control in the cloud M Alam, N Emmanuel, T Khan, Y Xiang, H Hassan Journal of Ambient Intelligence and Humanized Computing 9, 1153-1166, 2018 | 23 | 2018 |
Behavioral attestation for web services (BA4WS) M Alam, X Zhang, M Nauman, T Ali Proceedings of the 2008 ACM workshop on Secure web services, 21-28, 2008 | 23 | 2008 |
Method and system for extending SELinux policy models and their enforcement X Zhang, JP Seifert, M Alam US Patent 8,051,459, 2011 | 21 | 2011 |
An accessible formal specification of the UML and OCL meta-model in Isabelle/HOL T Ali, M Nauman, M Alam 2007 IEEE International Multitopic Conference, 1-6, 2007 | 19 | 2007 |
Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits A Saleem, A Khan, F Shahid, MM Alam, MK Khan Journal of Network and Computer Applications 108, 1-19, 2018 | 18 | 2018 |
Towards a set aggregation-based data integrity scheme for smart grids M Tahir, A Khan, A Hameed, M Alam, MK Khan, F Jabeen Annals of Telecommunications 72, 551-561, 2017 | 17 | 2017 |
Scalable, privacy-preserving remote attestation in and through federated identity management frameworks T Ali, M Nauman, M Amin, M Alam 2010 International Conference on Information Science and Applications, 1-8, 2010 | 15 | 2010 |
A model-driven framework for trusted computing based systems M Alam, JP Seifert, X Zhang 11th IEEE International Enterprise Distributed Object Computing Conference …, 2007 | 14 | 2007 |
Model driven configuration of secure operating systems for mobile applications in healthcare B Agreiter, M Alam, M Hafner, JP Seifert, X Zhang Proceedings of the 1st International Workshop on Mode-Based Trustworthy …, 2007 | 13 | 2007 |
Analysis of Dalvik virtual machine and class path library S Khan, S Khan, H Banuri, M Nauman, M Alam Tech. rep. Security Engineering Research Group, Institute of Management …, 2009 | 12 | 2009 |
A scalable and privacy preserving remote attestation mechanism T Ali, M Alam, M Nauman, T Ali, M Ali, S Anwar Information-An International Interdisciplinary Journal 14 (4), 1193-1203, 2011 | 10 | 2011 |
A high-level domain-specific language for SIEM (design, development and formal verification) A Nazir, M Alam, SUR Malik, A Akhunzada, MN Cheema, MK Khan, ... Cluster Computing 20, 2423-2437, 2017 | 9 | 2017 |