Ragib Hasan, Ph.D. - Publications

Affiliations: 
2009 University of Illinois, Urbana-Champaign, Urbana-Champaign, IL 
Area:
Computer Science

13 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 Hasan R, Hossain MM, Khan R. Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading Future Generation Computer Systems. 86: 821-835. DOI: 10.1016/J.Future.2017.11.024  0.305
2017 Hossain MM, Islam SMR, Ali F, Kwak KS, Hasan R. An Internet of Things-based health prescription assistant and its security system design Future Generation Computer Systems. 82: 422-439. DOI: 10.1016/J.Future.2017.11.020  0.371
2017 Hasan R, Khan R. Unified authentication factors and fuzzy service access using interaction provenance Computers & Security. 67: 211-231. DOI: 10.1016/J.Cose.2017.02.014  0.357
2016 Hasan R, Khan R, Zawoad S, Haque MM. WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices Ieee Transactions On Emerging Topics in Computing. 4: 129-141. DOI: 10.1109/Tetc.2015.2401394  0.351
2016 Zawoad S, Dutta AK, Hasan R. Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service Ieee Transactions On Dependable and Secure Computing. 13: 148-162. DOI: 10.1109/Tdsc.2015.2482484  0.388
2016 Zawoad S, Hasan R. Trustworthy Digital Forensics in the Cloud Computer. 49: 78-81. DOI: 10.1109/Mc.2016.89  0.324
2015 Zawoad S, Hasan R, Grimes J. LINCS: Towards building a trustworthy litigation hold enabled cloud storage system Digital Investigation. 14: S55-S67. DOI: 10.1016/J.Diin.2015.05.014  0.389
2014 Zawoad S, Mernik M, Hasan R. Towards building a forensics aware language for secure logging Computer Science and Information Systems. 11: 1291-1314. DOI: 10.2298/Csis131201051Z  0.335
2013 Zawoad S, Hasan R. I have the proof: Providing proofs of past data possession in cloud forensics Proceedings of the 2012 Ase International Conference On Cyber Security, Cybersecurity 2012. 75-82. DOI: 10.1109/Cybersecurity.2012.17  0.352
2011 Hasan R, Winslett M. Efficient audit-based compliance for relational data retention Proceedings of the 6th International Symposium On Information, Computer and Communications Security, Asiaccs 2011. 238-248. DOI: 10.1145/1966913.1966944  0.472
2010 Hasan R, Winslett M. Trustworthy vacuuming and litigation holds in long-term high-integrity records retention Advances in Database Technology - Edbt 2010 - 13th International Conference On Extending Database Technology, Proceedings. 621-632. DOI: 10.1145/1739041.1739115  0.491
2009 Hasan R, Sion R, Winslett M. Preventing history forgery with secure provenance Acm Transactions On Storage. 5. DOI: 10.1145/1629080.1629082  0.521
2005 Hasan R, Tucek J, Stanton P, Yurcik W, Brumbaugh L, Rosendale J, Boonstra R. The techniques and challenges of immutable storage with applications in multimedia Proceedings of Spie - the International Society For Optical Engineering. 5682: 41-52. DOI: 10.1117/12.588103  0.322
Show low-probability matches.