Azeem Ahmad
Home
Experience
Publications
Research Grants
Teaching Portfolio
Contact
A. Ahmad
Latest
An identification and prevention of theft-of-service attack on cloud computing
A Multi-token Authorization Strategy for Secure Mobile Cloud Computing
Security Concerns in Cloud Computing
Requirement Development Life Cycle: The Industry Practices
Requirements prioritization with respect to Geographically Distributed Stakeholders
Requirements Development Life Cycle with Respect to Geographically Distributed Stakeholders: The "V" Model
Cite
×