Somchart Fugkeaw
Orcid: 0000-0001-7156-184X
According to our database1,
Somchart Fugkeaw
authored at least 67 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
SSF-CDW: achieving scalable, secure, and fast OLAP query for encrypted cloud data warehouse.
J. Cloud Comput., December, 2024
FPRESSO: Fast and Privacy-Preserving SSO Authentication With Dynamic Load Balancing for Multi-Cloud-Based Web Applications.
IEEE Access, 2024
Achieving Secure, Verifiable, and Efficient Boolean Keyword Searchable Encryption for Cloud Data Warehouse.
IEEE Access, 2024
PPAC-CDW: A Privacy-Preserving Access Control Scheme With Fast OLAP Query and Efficient Revocation for Cloud Data Warehouse.
IEEE Access, 2024
Secure and Fine-Grained Access Control With Optimized Revocation for Outsourced IoT EHRs With Adaptive Load-Sharing in Fog-Assisted Cloud Environment.
IEEE Access, 2024
LSAC: A Lightweight, Scalable, and Anonymous Cross-Domain Authentication Scheme in IoMT.
Proceedings of the IEEE Intelligent Mobile Computing, 2024
Enabling Efficient Cloud-Based Data Collection System for Smart Home IoT Data Using Data Binning and Lossless Compression.
Proceedings of the 16th International Conference on Knowledge and Smart Technology, 2024
Proceedings of the 16th International Conference on Knowledge and Smart Technology, 2024
Proceedings of the 16th International Conference on Knowledge and Smart Technology, 2024
Proceedings of the 16th International Conference on Knowledge and Smart Technology, 2024
Design and Development of Scalable SIEM as a Service using Spark and Anomaly Detection.
Proceedings of the 21st International Joint Conference on Computer Science and Software Engineering, 2024
A Scalable and Secure Outsourced IoT Electronic Health Records with Efficient User Revocation Using Fog-Assisted Cloud Model.
Proceedings of the 21st International Joint Conference on Computer Science and Software Engineering, 2024
A Design and Development of Web Application Vulnerability Detection Using Graph-Based Modeling Analysis Over CAPEC.
Proceedings of the 21st International Joint Conference on Computer Science and Software Engineering, 2024
Enabling Dynamic Vulnerability Assessment for Multi-web Application Using Executable Directed Acyclic Graph.
Proceedings of the Advanced Information Networking and Applications, 2024
2023
An efficient and scalable vaccine passport verification system based on ciphertext policy attribute-based encryption and blockchain.
J. Cloud Comput., December, 2023
Secure Data Sharing With Efficient Key Update for Industrial Cloud-Based Access Control.
IEEE Trans. Serv. Comput., 2023
A Fully Outsourced Attribute-Based Signcryption Scheme Supporting Privacy-Preserving Policy Update in Mobile Cloud Computing.
IEEE Access, 2023
Secure and Lightweight Blockchain-Enabled Access Control for Fog-Assisted IoT Cloud Based Electronic Medical Records Sharing.
IEEE Access, 2023
Achieving Decentralized and Dynamic SSO-Identity Access Management System for Multi-Application Outsourced in Cloud.
IEEE Access, 2023
Proceedings of the 15th International Conference on Knowledge and Smart Technology, 2023
Proceedings of the 15th International Conference on Knowledge and Smart Technology, 2023
An Efficient Medical Records Access Control with Auditable Outsourced Encryption and Decryption.
Proceedings of the 15th International Conference on Knowledge and Smart Technology, 2023
Design and Implementation of Fast and Secure SSO Authentication for Multi-Application Services Deployed in Cloud.
Proceedings of the 15th International Conference on Knowledge and Smart Technology, 2023
Proceedings of the 15th International Conference on Knowledge and Smart Technology, 2023
A Dynamic and Efficient Crypto-Steganography System for Securing Multiple Files in Cloud.
Proceedings of the 15th International Conference on Knowledge and Smart Technology, 2023
An Efficiently Revocable Cloud-based Access Control Using Proxy Re-encryption and Blockchain.
Proceedings of the 20th IEEE International Joint Conference on Computer Science and Software Engineering, 2023
BLUR & TRACK: Real-time Face Detection with Immediate Blurring and Efficient Tracking.
Proceedings of the 20th IEEE International Joint Conference on Computer Science and Software Engineering, 2023
Proceedings of the 20th IEEE International Joint Conference on Computer Science and Software Engineering, 2023
Implementing An Outsourced Dual-Proxy Signing and Decryption Scheme in Mobile Cloud Computing.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium, 2023
2022
A Review on Data Access Control Schemes in Mobile Cloud Computing: State-of-the-Art Solutions and Research Directions.
SN Comput. Sci., 2022
IEEE Access, 2022
Proceedings of the 10th IEEE International Conference on Mobile Cloud Computing, 2022
Proceedings of the 14th International Conference on Knowledge and Smart Technology, 2022
Proceedings of the 19th International Joint Conference on Computer Science and Software Engineering, 2022
2021
IEEE Access, 2021
IEEE Access, 2021
Proceedings of the 29th Euromicro International Conference on Parallel, 2021
Proceedings of the 13th International Conference on Knowledge and Smart Technology, 2021
Proceedings of the 13th International Conference on Knowledge and Smart Technology, 2021
Proceedings of the 13th International Conference on Knowledge and Smart Technology, 2021
2018
Future Gener. Comput. Syst., 2018
Enabling Dynamic and Efficient Data Access Control in Cloud Computing Based on Attribute Certificate Management and CP-ABE.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018
2017
IEICE Trans. Inf. Syst., 2017
Proceedings of the CLOSER 2017, 2017
2016
Embedding lightweight proxy re-encryption for efficient attribute revocation in cloud computing.
Int. J. High Perform. Comput. Netw., 2016
Proceedings of the Service-Oriented and Cloud Computing, 2016
Key Update as a Service (KAAS): An Agent-Based Modeling for Cloud-Based Access Control.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016
Improved Lightweight Proxy Re-encryption for Flexible and Scalable Mobile Revocation Management in Cloud Computing.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
CLOUD-CAT: A collaborative access control tool for data outsourced in cloud computing.
Proceedings of the Tenth International Conference on Digital Information Management, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Enabling Constraints and Dynamic Preventive Access Control Policy Enforcement in the Cloud.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2012
Proceedings of the Seventh International Conference on Digital Information Management, 2012
2010
Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses.
Proceedings of the Emergent Web Intelligence: Advanced Information Retrieval, 2010
2009
Data Authentication and the Corresponding Provenance Information Management.
J. Digit. Inf. Manag., 2009
Design and Development of the Dynamic DRBAC Model using PMI and XACML-based Authorization.
J. Digit. Inf. Manag., 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
An SSO-Capable Distributed RBAC Model with High Availability across Administrative Domain.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment.
Proceedings of the First International Conference on Emerging Security Information, 2007
Proceedings of the Agent Computing and Multi-Agent Systems, 2007
Multi-Application Authentication Based on Multi-Agent System.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007
Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication Management.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007
2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006
2005
Multi-Version and Evolution Support for Multidimensional Database Schema.
Proceedings of the IASTED International Conference on Databases and Applications, 2005
OLAP Application Development for Multiple Versions Query in Multidimensional Database Systems.
Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering, 2005