Author:
Khan Fakhri Alam,Shaheen Sadaf,Asif Muhammad,Rahman Atta Ur,Imran Muhammad,Rehman Saeed Ur
Publisher
Springer Science and Business Media LLC
Reference25 articles.
1. Bilal M, Asif M, Bashir A (2018) Assessment of secure OpenID-Based DAAA protocol for avoiding session hijacking in web applications. Secur Commun Netw.
https://doi.org/10.1155/2018/6315039
2. Buneman P, Khanna S, Wang-Chiew T (2001) Why and where: a characterization of data provenance. International conference on database theory. Springer, New York, pp 316–330
3. Cui Y, Widom J, Wiener JL (2000) Tracing the lineage of view data in a warehousing environment. ACM Trans Database Syst (TODS) 25:179–227
4. Dunlop L (2006) ) Electronic health records: Interoperability challenges Patients’ right to privacy. Shidler JL Com & Tech 3:1
5. Endo PT, Rodrigues M, Gonçalves GE, Kelner J, Sadok DH, Curescu C (2016) High availability in clouds: systematic review and research challenges. J Cloud Comput 5:16.
https://doi.org/10.1186/s13677-016-0066-8
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献