Items where Author is "Arshad, Junaid"

Up a level
Export as [feed] RSS
Group by: Item Type | No Grouping
Number of items: 11.

Article

Ajmal Azad, Muhammad, Morla, Ricardo, Arshad, Junaid and Salah, Khaled (2016) Clustering VoIP caller for SPIT identification. Security and Communication Networks, 9 (18). pp. 4827-4838. ISSN 1939-0114

Arshad, Junaid, Terstyanszky, Gabor, Kiss, Tamas, Weingarten, Noam and Taffoni, Giuliano (2016) A formal approach to support interoperability in scientific meta-workflows. Journal of Grid Computing, 14 (4). pp. 655-671. ISSN 1570-7873

Arshad, Junaid, Hoffmann, Alexander, Gesing, Sandra, Grunzke, Richard, Krüger, Jens, Kiss, Tamas, Herres-Pawlis, Sonja and Terstyanszky, Gabor (2016) Multi-level meta-workflows: new concept for regularly occurring tasks in quantum chemistry. Journal of Cheminformatics, 8 (58). ISSN 1758-2946

Arshad, Junaid, Azad, Muhammad Ajmal, Jokhio, Imran Ali and Townend, Paul (2013) Intrusion damage assessment for multi-stage attacks for clouds. IET Communications, 7 (12). pp. 1304-1315. ISSN 1751-8628

Arshad, Junaid, Townend, Paul, Xu, Jie and Jie, Wei (2012) Cloud computing security: opportunities and pitfalls. International Journal of Grid and High Performance Computing, 4 (1). pp. 52-66. ISSN 1938-0259

Jie, Wei, Arshad, Junaid, Sinnott, Richard, Townend, Paul and Lei, Zhou (2011) A review of grid authentication and authorization technologies and support for federated access control. ACM Computing Surveys, 43 (2). ISSN 0360-0300

Jie, Wei, Arshad, Junaid and Ekin, Pascal (2010) Authentication and authorization infrastructure for grids - issues, technologies, trends and experiences. Journal of Supercomputing, 52 (1). pp. 82-96. ISSN 0920-8542

Book Section

Bayliss, Christopher, Sinnott, Richard, Jie, Wei and Arshad, Junaid (2011) The design, development and application of a proxy credential auditing infrastructure for collaborative research. In: E-Technologies: Transformation in a Connected World. Lecture Notes in Business Information Processing (LNBIP), 78 . Springer, Heidelberg, Germany, pp. 211-226. ISBN 9783642208614

Conference or Workshop Item

Bayliss, Christopher, Sinnott, Richard, Jie, Wei and Arshad, Junaid (2010) A proxy credential auditing infrastructure for UK e-science national grid service. In: The 11th ACM/IEEE International Conference on Grid Computing (Grid 2010), 25-28 October 2010, Brussels, Belgium.

Arshad, Junaid and Jie, Wei (2009) Building security infrastructure for e-social science - issues and experiences. In: The 5th International Conference on e-Social Science, 26 June 2009, Cologne, Germany.

Jie, Wei, Young, Alistair, Arshad, Junaid, Finch, June, Procter, Rob and Turner, Andy (2008) A Guanxi Shibboleth based security infrastructure for e-social science. In: International Workshop on Security and Privacy in Enterprise Computing (InSPEC 2008), 12th IEEE International Enterprise Computing Conference (EDOC 2008), 15 September 2008, Munich, Germany.

This list was generated on Wed Jun 28 16:39:44 2017 UTC.

Menu