Canh Ngo
Title
Cited by
Cited by
Year
Intercloud architecture for interoperability and integration
Y Demchenko, MX Makkes, R Strijkers, C De Laat
4th IEEE International Conference on Cloud Computing Technology and Science …, 2012
782012
Transmission time-based mechanism to detect wormhole attacks
T Van Phuong, NT Canh, YK Lee, S Lee, H Lee
The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007), 172-178, 2007
612007
Big security for big data: Addressing security challenges for the big data infrastructure
Y Demchenko, C Ngo, C de Laat, P Membrey, D Gordijenko
Workshop on Secure Data Management, 76-94, 2013
532013
Intercloud architecture framework for heterogeneous cloud based infrastructure services provisioning on-demand
Y Demchenko, C Ngo, C De Laat, JA Garcia-Espin, S Figuerola, ...
2013 27th International Conference on Advanced Information Networking and …, 2013
532013
Multi-tenant attribute-based access control for cloud infrastructure services
C Ngo, Y Demchenko, C de Laat
Journal of information security and applications 27, 65-84, 2016
482016
Federated access control in heterogeneous intercloud environment: Basic models and architecture patterns
Y Demchenko, C Ngo, C de Laat, C Lee
2014 IEEE International Conference on Cloud Engineering, 439-445, 2014
392014
Toward a Dynamic Trust Establishment Approach for Multi-provider Intercloud Environment
C Ngo, Y Demchenko, C de Laat
Cloudcom 2012, 2012
392012
Security infrastructure for on-demand provisioned cloud infrastructure services
Y Demchenko, C Ngo, C de Laat, TW Wlodarczyk, C Rong, W Ziegler
2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011
312011
Multi-data-types interval decision diagrams for XACML evaluation engine
C Ngo, MX Makkes, Y Demchenko, C de Laat
2013 Eleventh Annual Conference on Privacy, Security and Trust, 257-266, 2013
282013
Defining intercloud federation framework for multi-provider cloud services integration
MX Makkes, C Ngo, Y Demchenko, R Strijkers, R Meijer, C De Laat
IARIA, 2013
262013
Decision diagrams for XACML policy evaluation and management
C Ngo, Y Demchenko, C De Laat
Computers & Security 49, 1-16, 2015
242015
HGKM: A group-based key management scheme for sensor networks using deployment knowledge
NT Canh, YK Lee, S Lee
6th Annual Communication Networks and Services Research Conference (cnsr …, 2008
242008
Policy and context management in dynamically provisioned access control service for virtualized cloud infrastructures
C Ngo, P Membrey, Y Demchenko, C de Laat
2012 seventh international conference on availability, reliability and …, 2012
222012
Bringing optical networks to the cloud: An architecture for a sustainable future Internet
T Polska
The future internet, 307, 2011
222011
Trusted virtual infrastructure bootstrapping for on demand services
P Membrey, KCC Chan, C Ngo, Y Demchenko, C de Laat
2012 Seventh International Conference on Availability, Reliability and …, 2012
212012
An energy-efficient secure routing and key management scheme for mobile sinks in wireless sensor networks using deployment knowledge
LX Hung, NT Canh, S Lee, YK Lee, H Lee
Sensors 8 (12), 7753-7782, 2008
162008
Security framework for virtualised infrastructure services provisioned on-demand
C Ngo, P Membrey, Y Demchenko, C de Laat
2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011
142011
Enhanced group-based key management scheme for wireless sensor networks using deployment knowledge
NT Canh, PTH Truc, TH Hai, LX Hung, YK Lee, S Lee
2009 6th IEEE Consumer Communications and Networking Conference, 1-5, 2009
142009
Access control infrastructure for on-demand provisioned virtualised infrastructure services
Y Demchenko, C Ngo, C De Laat
2011 International Conference on Collaboration Technologies and Systems (CTS …, 2011
132011
Gembus based services composition platform for cloud paas
Y Demchenko, C Ngo, P Martínez-Julia, E Torroglosa, M Grammatikou, ...
European Conference on Service-Oriented and Cloud Computing, 32-47, 2012
102012
The system can't perform the operation now. Try again later.
Articles 1–20