|Up a level|
Ajmal Azad, Muhammad, Morla, Ricardo, Arshad, Junaid and Salah, Khaled (2016) Clustering VoIP caller for SPIT identification. Security and Communication Networks, 9 (18). pp. 4827-4838. ISSN 1939-0114
Arshad, Junaid, Terstyanszky, Gabor, Kiss, Tamas, Weingarten, Noam and Taffoni, Giuliano (2016) A formal approach to support interoperability in scientific meta-workflows. Journal of Grid Computing, 14 (4). pp. 655-671. ISSN 1570-7873
Arshad, Junaid, Hoffmann, Alexander, Gesing, Sandra, Grunzke, Richard, Krüger, Jens, Kiss, Tamas, Herres-Pawlis, Sonja and Terstyanszky, Gabor (2016) Multi-level meta-workflows: new concept for regularly occurring tasks in quantum chemistry. Journal of Cheminformatics, 8 (58). ISSN 1758-2946
Arshad, Junaid, Azad, Muhammad Ajmal, Jokhio, Imran Ali and Townend, Paul (2013) Intrusion damage assessment for multi-stage attacks for clouds. IET Communications, 7 (12). pp. 1304-1315. ISSN 1751-8628
Arshad, Junaid, Townend, Paul, Xu, Jie and Jie, Wei (2012) Cloud computing security: opportunities and pitfalls. International Journal of Grid and High Performance Computing, 4 (1). pp. 52-66. ISSN 1938-0259
Jie, Wei, Arshad, Junaid, Sinnott, Richard, Townend, Paul and Lei, Zhou (2011) A review of grid authentication and authorization technologies and support for federated access control. ACM Computing Surveys, 43 (2). ISSN 0360-0300
Jie, Wei, Arshad, Junaid and Ekin, Pascal (2010) Authentication and authorization infrastructure for grids - issues, technologies, trends and experiences. Journal of Supercomputing, 52 (1). pp. 82-96. ISSN 0920-8542
Bayliss, Christopher, Sinnott, Richard, Jie, Wei and Arshad, Junaid (2011) The design, development and application of a proxy credential auditing infrastructure for collaborative research. In: E-Technologies: Transformation in a Connected World. Lecture Notes in Business Information Processing (LNBIP), 78 . Springer, Heidelberg, Germany, pp. 211-226. ISBN 9783642208614
Bayliss, Christopher, Sinnott, Richard, Jie, Wei and Arshad, Junaid (2010) A proxy credential auditing infrastructure for UK e-science national grid service. In: The 11th ACM/IEEE International Conference on Grid Computing (Grid 2010), 25-28 October 2010, Brussels, Belgium.
Arshad, Junaid and Jie, Wei (2009) Building security infrastructure for e-social science - issues and experiences. In: The 5th International Conference on e-Social Science, 26 June 2009, Cologne, Germany.
Jie, Wei, Young, Alistair, Arshad, Junaid, Finch, June, Procter, Rob and Turner, Andy (2008) A Guanxi Shibboleth based security infrastructure for e-social science. In: International Workshop on Security and Privacy in Enterprise Computing (InSPEC 2008), 12th IEEE International Enterprise Computing Conference (EDOC 2008), 15 September 2008, Munich, Germany.