Zahoor, Ehtesham
50  Ergebnisse:
Personensuche X
?
3

A Blockchain-Based Approach for Secure Data Migration From ..:

Khan, Hooria ; Zahoor, Ehtesham ; Akhtar, Sabina.
International Journal of Web Services Research.  19 (2022)  1 - p. 1-20 , 2022
 
?
4

A blockchain based approach for the authorization policies ..:

Sherazi, Syed Noman Ali ; Zahoor, Ehtesham ; Akhtar, Sabina.
Transactions on Emerging Telecommunications Technologies.  33 (2022)  5 - p. , 2022
 
?
8

Shadowed Authorization Policies - A Disaster Waiting to Hap..:

, In: Web Information Systems Engineering – WISE 2019; Lecture Notes in Computer Science,
Zahoor, Ehtesham ; Bibi, Uzma ; Perrin, Olivier - p. 341-355 , 2019
 
?
9

Authorization Policies Specification and Consistency Manage..:

, In: Secure IT Systems; Lecture Notes in Computer Science,
Zahoor, Ehtesham ; Ikram, Asim ; Akhtar, Sabina. - p. 272-288 , 2018
 
?
10

Dynamic Authorisation Policies for Event-Based Task Delegat..:

, In: Notes on Numerical Fluid Mechanics and Multidisciplinary Design; Active Flow and Combustion Control 2018,
 
?
11

Mashup Model and Verification Using Mashup Processing Netwo..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Collaborative Computing: Networking, Applications and Worksharing,
 
?
12

A Formal Approach for the Verification of AWS IAM Access Co..:

Zahoor, Ehtesham ; Asma, Zubaria ; Perrin, Olivier
info:eu-repo/semantics/altIdentifier/doi/10.1007/978-3-319-67262-5_5.  , 2017
 
?
14

A Formal Approach for the Verification of AWS IAM Access Co..:

Zahoor, Ehtesham ; Asma, Zubaria ; Perrin, Olivier
info:eu-repo/semantics/altIdentifier/doi/10.1007/978-3-319-67262-5_5.  , 2017
 
?
15

A Formal Approach for the Verification of AWS IAM Access Co..:

Zahoor, Ehtesham ; Asma, Zubaria ; Perrin, Olivier
info:eu-repo/semantics/altIdentifier/doi/10.1007/978-3-319-67262-5_5.  , 2017
 
1-15