Follow
Mudassar Aslam (PhD)
Title
Cited by
Cited by
Year
Security and trust preserving VM migrations in public clouds
M Aslam, C Gehrmann, M Björkman
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
822012
A survey on privacy and access control schemes in fog computing
T Khalid, MAK Abbasi, M Zuraiz, AN Khan, M Ali, RW Ahmad, ...
International Journal of Communication Systems 34 (2), e4181, 2021
302021
Trusted launch of virtual machine instances in public iaas environments
N Paladi, C Gehrmann, M Aslam, F Morenius
International Conference on Information Security and Cryptology, 309-323, 2012
29*2012
Securely Launching Virtual Machines on Trustworthy Platforms in a Public Cloud
M Aslam, C Gehrmann, L Rasmusson, M Björkman
SciTePress, 2012
232012
FoNAC-An Automated Fog Node Audit and Certification Scheme
M Aslam, B Mohsin, A Nasir, S Raza
Computers & Security, 101759, 2020
152020
Trusted geolocation-aware data placement in infrastructure clouds
N Paladi, M Aslam, C Gehrmann
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
142014
Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques
M Aslam, C Gehrmann, M Björkman
Proceedings of the 6th International Conference on Security of Information …, 2013
102013
Security Considerations for Virtual Platform Provisioning
M Aslam, C Gehrmann
European Conference on Information Warfare and Security ECIW-2011, 7-8 July …, 2011
82011
Security and trust preserving inter‐and intra‐cloud VM migrations
M Aslam, S Bouget, S Raza
International Journal of Network Management, e2103, 2020
62020
ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergies
M Aslam, C Gehrmann, M Björkman
Journal of Information Security and Applications 22, 28-39, 2015
62015
Protecting private data in the cloud
L Rasmusson, M Aslam
2nd International Conference on Cloud Computing and Services Science (CLOSER …, 2012
52012
Agent‐based ARP cache poisoning detection in switched LAN environments
D Sakhawat, AN Khan, M Aslam, AT Chronopoulos
IET Networks 8 (1), 67-73, 2019
42019
Secure Service Provisioning in a Public Cloud
M Aslam
Mälardalen Univsersity, 2012
32012
Quantitative System-Level Security Verification of the IoV Infrastructure
J Lauinger, M Aslam, M Hamad, S Raza, S Steinhorst
arXiv preprint arXiv:2101.06137, 2021
12021
Bringing Visibility in the Clouds: using Security, Transparency and Assurance Services
M Aslam
Mälardalen University, 2014
12014
Bringing Visibility in the Clouds: using Security, Transparency and Assurance Services
M Aslam
Mälardalen University, 2014
12014
Prevention of Cryptojacking Attacks in Business and FinTech Applications
S Ullah, T Ahmad, R Ahmad, M Aslam
Handbook of Research on Cybersecurity Issues and Challenges for Business and …, 2023
2023
TEE-Watchdog: Mitigating Unauthorized Activities within Trusted Execution Environments in ARM-Based Low-Power IoT Devices
A Khurshid, SD Yalew, M Aslam, S Raza
Security and Communication Networks 2022, 2022
2022
ShieLD: Shielding Cross-zone Communication within Limited-resourced IoT Devices running Vulnerable Software Stack
A Khurshid, SD Yalew, M Aslam, S Raza
IEEE Transactions on Dependable and Secure Computing, 2022
2022
TruCerT: Trusted Certification of IoT Devices Using Continuousand Trustworthy Mechanisms
A Khurshid, M Aslam, S Bouget, S Raza
2022
The system can't perform the operation now. Try again later.
Articles 1–20