The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Basit Shafiq: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Basit Shafiq, Elisa Bertino, Arif Ghafoor
    Access control management in a distributed environment supporting dynamic collaboration. [Citation Graph (0, 0)][DBLP]
    Digital Identity Management, 2005, pp:104-112 [Conf]
  2. Basit Shafiq, Arjmand Samuel, Elisa Bertino, Arif Ghafoor
    Technique for Optimal Adaptation of Time-Dependent Workflows with Security Constraints. [Citation Graph (0, 0)][DBLP]
    ICDE, 2006, pp:119- [Conf]
  3. Husni Fahmi, Mudassir Latif, Basit Shafiq, Raymond A. Paul, Arif Ghafoor
    Real-Time Resource Reservation for Synchronized Multimedia Object over Wireless LAN. [Citation Graph (0, 0)][DBLP]
    Symposium on Object-Oriented Real-Time Distributed Computing, 2002, pp:386-393 [Conf]
  4. Basit Shafiq, Arjmand Samuel, Halima Ghafoor
    A GTRBAC Based System for Dynamic Workflow Composition and Management. [Citation Graph (0, 0)][DBLP]
    ISORC, 2005, pp:284-290 [Conf]
  5. James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Bertino
    Dependencies and separation of duty constraints in GTRBAC. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:51-64 [Conf]
  6. Basit Shafiq, Ammar Masood, James Joshi, Arif Ghafoor
    A Role-Based Access Control Policy Verification Framework for Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    WORDS, 2005, pp:13-20 [Conf]
  7. Waseem Sheikh, Basit Shafiq, Raymond A. Paul, Arif Ghafoor
    Provision of Multimedia Services in a Mobile Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    WORDS Fall, 2003, pp:87-93 [Conf]
  8. Rafae Bhatti, Basit Shafiq, Mohamed Shehab, Arif Ghafoor
    Distributed Access Management in Multimedia IDCs. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2005, v:38, n:9, pp:60-69 [Journal]
  9. Husni Fahmi, Walid G. Aref, Mudassir Latif, Basit Shafiq, Arif Ghafoor, Peiya Liu, Liang H. Hsu
    Distributed web-based framework for real-time multimedia object communication. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2001, v:16, n:2, pp:79-88 [Journal]
  10. Rafae Bhatti, Basit Shafiq, Elisa Bertino, Arif Ghafoor, James Joshi
    X-gtrbac admin: A decentralized administration model for enterprise-wide access control. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:4, pp:388-423 [Journal]
  11. Basit Shafiq, James Joshi, Elisa Bertino, Arif Ghafoor
    Secure Interoperation in a Multidomain Environment Employing RBAC Policies. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2005, v:17, n:11, pp:1557-1577 [Journal]
  12. J. B. D. Joshi, Zhaohui Kevin Li, Husni Fahmi, Basit Shafiq, Arif Ghafoor
    A model for secure multimedia document database system in a distributed environment. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2002, v:4, n:2, pp:215-234 [Journal]
  13. Nabil R. Adam, Vandana Pursnani Janeja, Aabhas V. Paliwal, Basit Shafiq, Cedric Ulmer, Volker Gersabeck, Anne Hardy, Christof Bornhövd, Joachim Schaper
    Approach for Discovering and Handling Crisis in a Service-Oriented Environment. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:16-24 [Conf]
  14. Aabhas V. Paliwal, Nabil R. Adam, Basit Shafiq, Christof Bornhövd
    Policy based Web Service Orchestration and Goal Reachability Analysis using MSC and CP Nets. [Citation Graph (0, 0)][DBLP]
    CEC/EEE, 2007, pp:131-140 [Conf]
  15. Nabil R. Adam, Ahmet Kozanoglu, Aabhas V. Paliwal, Basit Shafiq
    Secure Information Sharing in a Virtual Multi-Agency Team Environment. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:179, n:, pp:97-109 [Journal]

  16. Secure information sharing and analysis for effective emergency management. [Citation Graph (, )][DBLP]


  17. UICDS compliant resource management system for emergency response. [Citation Graph (, )][DBLP]


  18. Efficient Privacy-Preserving Link Discovery. [Citation Graph (, )][DBLP]


  19. Privacy-preserving link discovery. [Citation Graph (, )][DBLP]


  20. Privacy-preserving trust verification. [Citation Graph (, )][DBLP]


  21. Preserving Privacy in Social Networks: A Structure-Aware Approach. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002