Ali Sajjad
Ali Sajjad
BT Applied Research
Verified email at
Cited by
Cited by
A trust model for ubiquitous systems based on vectors of trust values
H Jameel, LX Hung, U Kalim, A Sajjad, S Lee, YK Lee
Seventh IEEE International Symposium on Multimedia (ISM'05), 6 pp., 2005
A comparative evaluation of anomaly detectors under portscan attacks
AB Ashfaq, MJ Robert, A Mumtaz, MQ Ali, A Sajjad, SA Khayam
International Workshop on Recent Advances in Intrusion Detection, 351-371, 2008
Mobile-To-Grid Middleware: Bridging the gap between mobile and Grid environments
H Jameel, U Kalim, A Sajjad, S Lee, T Jeon
European Grid Conference, 932-941, 2005
Security-as-a-service in multi-cloud and federated cloud environments
PS Pawar, A Sajjad, T Dimitrakos, DW Chadwick
IFIP international conference on trust management, 251-261, 2015
Automagi-an autonomic middleware for enabling mobile access to grid infrastructure
A Sajjad, H Jameel, U Kalim, SM Han, YK Lee, S Lee
Joint International Conference on Autonomic and Autonomous Systems andá…, 2005
On achieving good operating points on an ROC plane using stochastic anomaly score prediction
MQ Ali, H Khan, A Sajjad, SA Khayam
Proceedings of the 16th ACM conference on Computer and communicationsá…, 2009
A component-based architecture for an autonomic middleware enabling mobile access to grid infrastructure
A Sajjad, H Jameel, U Kalim, YK Lee, S Lee
International Conference on Embedded and Ubiquitous Computing, 1225-1234, 2005
Mobile-to-grid middleware: An approach for breaching the divide between mobile and grid environments
U Kalim, H Jameel, A Sajjad, S Lee
International Conference on Networking, 1-8, 2005
Seamless enablement of intelligent protection for enterprise cloud applications through service store
J Daniel, T Dimitrakos, F El-Moussa, G Ducatel, P Pawar, A Sajjad
2014 IEEE 6th International Conference on Cloud Computing Technology andá…, 2014
Secure Cloud Storage: A framework for Data Protection as a Service in the multi-cloud environment
QH Vu, M Colombo, R Asal, A Sajjad, FA El-Moussa, T Dimitrakos
2015 IEEE Conference on Communications and Network Security (CNS), 638-642, 2015
Integrating security services in cloud service stores
J Daniel, F El-Moussa, G Ducatel, P Pawar, A Sajjad, R Rowlingson, ...
IFIP International Conference on Trust Management, 226-239, 2015
MAGI-Mobile access to grid infrastructure: Bringing the gifts of grid to mobile computing
A Sajjad, H Jameel, U Kalim, YK Lee, S Lee
NODe 2005–GSEM 2005, 2005
A parallelized disjunctive query based searchable encryption scheme for big data
S Tahir, L Steponkus, S Ruj, M Rajarajan, A Sajjad
Future Generation Computer Systems, 2018
A scalable and dynamic application-level secure communication framework for inter-cloud services
A Sajjad, M Rajarajan, A Zisman, T Dimitrakos
Future Generation Computer Systems 48, 19-27, 2015
Requirements and architecture of a cloud broker
SK Nair, P Pawar, A Sajjad, M Kiran, M Jiang, J Tordsson
OPTIMIS Consortium, 2011
Towards holistic cloud management
J Tordsson, K Djemame, D Espling, G Katsaros, W Ziegler, O Wńldrich, ...
European Research Activities in Cloud Computing, 122-150, 2012
An architecture for privacy-preserving sharing of CTI with 3rdparty analysis services
F Giubilo, A Sajjad, M Shackleton, DW Chadwick, W Fan, R de Lemos
2017 12th International Conference for Internet Technology and Securedá…, 2017
Dynamic wireless network access point selection
F El-Moussa, A Sajjad
US Patent App. 15/313,511, 2017
A ranked searchable encryption scheme for encrypted data hosted on the public cloud
S Tahir, M Rajarajan, A Sajjad
2017 International Conference on Information Networking (ICOIN), 242-247, 2017
Managed security service distribution model
G Ducatel, J Daniel, T Dimitrakos, F El-Moussa, R Rowlingson, A Sajjad
2016 4th International Conference on Cloud Computing and Intelligenceá…, 2016
The system can't perform the operation now. Try again later.
Articles 1–20