A
Afnan Ullah Khan
Researcher at University of York
Publications - 6
Citations - 264
Afnan Ullah Khan is an academic researcher from University of York. The author has contributed to research in topics: Encryption & Cloud computing security. The author has an hindex of 5, co-authored 6 publications receiving 254 citations.
Papers
More filters
Proceedings ArticleDOI
Towards Secure Cloud Bursting, Brokerage and Aggregation
Srijith K. Nair,Sakshi Porwal,Theo Dimitrakos,Ana Juan Ferrer,Johan Tordsson,Tabassum Sharif,Craig Sheridan,Muttukrishnan Rajarajan,Afnan Ullah Khan +8 more
TL;DR: This paper describes the concepts of cloud bursting and cloud brokerage and discusses the open management and security issues associated with the two models and presents a possible architectural framework capable of powering the brokerage based cloud services that is currently being developed in the scope of OPTIMIS, an EU FP7 project.
Proceedings ArticleDOI
Security risks and their management in cloud computing
TL;DR: A risk inventory is presented which documents the security threats identified in terms of availability, integrity and confidentiality for cloud infrastructures in detail for future security risks and proposes a methodology for performing security risk assessment for cloud computing architectures presenting some of the initial results.
Patent
Method and system for network data access
TL;DR: In this article, the authors propose a method and system which allow ready revocation of end user access rights by virtue of storing data in an encrypted form in a network environment, and using a trusted proxy server to re-encrypt the data itself to permit eventual decryption of the data by an authorised end user.
MRST: A New Technique For Information Summarization.
TL;DR: The paper proposes a new technique for information summarization that basically combines the rhetorical structure theory with the MEAD summarizer system as Mead is based totally based on mathematical calculation and lack a knowledge base Rhetorical Structure Theory is used to overcome this weakness.
Patent
Keys for protecting user access to media
Afnan Ullah Khan,Theo Dimitrakos +1 more
TL;DR: In this article, a broadcasting server is configured to send a first key part to a first user device of a plurality of user devices, the first key being one of the plurality of key parts, send a second key part and encrypt data for broadcast with the encryption key and to broadcast the encrypted data to said plurality of devices.