Ben Soh
TitleCited byYear
Cloud computing security: from single to multi-clouds
MA AlZain, E Pardede, B Soh, JA Thom
2012 45th Hawaii International Conference on System Sciences, 5490-5499, 2012
2842012
Mcdb: using multi-clouds to ensure security in cloud computing
MA AlZain, B Soh, E Pardede
2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011
932011
TCP New Vegas: improving the performance of TCP Vegas over high latency links
J Sing, B Soh
Fourth IEEE International Symposium on Network Computing and Applications, 73-82, 2005
552005
A new approach using redundancy technique to improve security in cloud computing
MA AlZain, B Soh, E Pardede
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
512012
A survey on data security issues in cloud computing: From single to multi-clouds
MA AlZain, B Soh, E Pardede
Journal of Software 8 (5), 1068-1078, 2013
442013
A comparative study of different sensors for smart car park management
R Kumar, NK Chilamkurti, B Soh
the 2007 International Conference on Intelligent Pervasive Computing (IPC …, 2007
362007
A new model to ensure security in cloud computing services
MA AlZain, B Soh, E Pardede
Journal of Service Science Research 4 (1), 49-70, 2012
312012
A smart approach towards a mobile e-health monitoring system architecture
A Alahmadi, B Soh
2011 International Conference on Research and Innovation in Information …, 2011
312011
A novel approach toward integration of rules into business processes using an agent-oriented framework
S Ali, B Soh, T Torabi
IEEE Transactions on Industrial Informatics 2 (3), 145-154, 2006
282006
Setting optimal intrusion-detection thresholds
BC Soh, TS Dillon
Computers & Security 14 (7), 621-631, 1995
281995
Multi-cloud data management using Shamir's secret sharing and quantum byzantine agreement schemes
MA AlZain, AS Li, B Soh, E Pardede
International Journal of Cloud Applications and Computing (IJCAC) 5 (3), 35-52, 2015
242015
Authenticating mobile agent platforms using signature chaining without trusted third parties
A Saxena, B Soh
2005 IEEE International Conference on e-Technology, e-Commerce and e-Service …, 2005
242005
A critical analysis of multilayer IP security protocol
J Sing, B Soh
Third International Conference on Information Technology and Applications …, 2005
232005
One-way signature chaining: a new paradigm for group cryptosystems.
A Saxena, B Soh
IJICS 2 (3), 268-296, 2008
182008
A novel method for authenticating mobile agents with one-way signature chaining
A Saxena, B Soh
Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005., 187-193, 2005
172005
Challenges and Solutions for Applications and Technologies in the Internet of Things
S Albishi, B Soh, A Ullah, F Algarni
Procedia Computer Science 124, 608-614, 2017
162017
Personalized Web search results with profile comparisons
J Lai, B Soh
Third International Conference on Information Technology and Applications …, 2005
162005
A byzantine fault tolerance model for a multi-cloud computing
MA AlZain, B Soh, E Pardede
2013 IEEE 16Th International Conference On Computational Science And …, 2013
152013
A novel design framework for business process modelling in automotive industry
Z Dubani, B Soh, C Seeling
2010 Fifth IEEE International Symposium on Electronic Design, Test …, 2010
142010
A novel Web security evaluation model for a one-time-password system
B Soh, A Joy
Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003 …, 2003
142003
The system can't perform the operation now. Try again later.
Articles 1–20