scispace - formally typeset
Q

Qasim Mahmood Rajpoot

Researcher at University of the Sciences

Publications -  11
Citations -  188

Qasim Mahmood Rajpoot is an academic researcher from University of the Sciences. The author has contributed to research in topics: Access control & Role-based access control. The author has an hindex of 6, co-authored 11 publications receiving 154 citations. Previous affiliations of Qasim Mahmood Rajpoot include National University of Science and Technology & Technical University of Denmark.

Papers
More filters
Book ChapterDOI

Attributes Enhanced Role-Based Access Control Model

TL;DR: This paper proposes an access control model that combines the two models in a novel way in order to unify their benefits and provides a fine-grained access control mechanism that not only takes contextual information into account while making the access control decisions but is also suitable for applications where access to resources is controlled by exploiting contents of the resources in the policy.
Book ChapterDOI

Integrating Attributes into Role-Based Access Control

TL;DR: This work proposes an access control model that combines the two models in a novel way in order to unify their benefits and provides a fine-grained access control mechanism that takes into account the current contextual information while making the access control decisions.
Book ChapterDOI

Security and Privacy in Video Surveillance: Requirements and Challenges

TL;DR: A general model of video surveillance systems is presented that will help identify the major security and privacy requirements for a video surveillance system and a gap is shown between the identified security requirements and the proposed security solutions where future research efforts may focus in this domain.
Book ChapterDOI

Video Surveillance: Privacy Issues and Legal Compliance

TL;DR: The authors make a step in the direction of investigating the existing legal infrastructure for ensuring privacy in video surveillance and suggest guidelines in order to help those who want to deploy video surveillance while least compromising the privacy of people and complying with legal infrastructure.
Journal ArticleDOI

Providing secure services for a virtual infrastructure

TL;DR: This paper addresses the problems associated with managing the cryptographic keys upon which such services rely by ensuring that keys remain within the trusted computing base.