• A machine learning-based optimization approach for pre-copy live virtual machine migration 

      Haris, Raseena M.; Khan, Khaled M.; Nhlabatsi, Armstrong; Barhamgi, Mahmoud ( Springer , 2023 , Article)
      Organizations widely use cloud computing to outsource their computing needs. One crucial issue of cloud computing is that services must be available to clients at all times. However, the cloud services may be temporarily ...
    • A Process Model for Customisation of Software in Multi-tenant SaaS Model 

      Khan, Khaled M.; Nhlabatsi, Armstrong; Khan, Niamul ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)
      This paper outlines a generic process framework for customisation of software in cloud computing. The flexibility for client-specific customisation of the software offered by software-as-a-service (SaaS) is limited. The ...
    • Design and Implementation of a Threat-Specific Security Risk Assessment Tool 

      Nhlabatsi, Armstrong; Hussein, Alaa; Fetais, Noora; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)
      Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ...
    • Effective Collaboration in the Management of Access Control Policies: A Survey of Tools 

      Fernandez, Rachael; Cheng, Peter C.-H.; Nhlabatsi, Armstrong; Khan, Khaled Md.; Fetais, Noora ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article Review)
      Access control (AC) tools implement security policies for controlling access to various assets, including file systems, physical resources, and social media posts. They are also used as pedagogical tools for exploring and ...
    • Interactive Graphical Access Control Tools 

      Fernandez, Rachael; Cheng, Peter; Smith, Ben; Fenton, Tania; Boraey, Yehia; ... more authors ( IEEE Computer Society , 2023 , Conference)
      Access control (AC) policy creation and implementation is challenging because of its complex structure and specifications. This paper explores the potential of two novel interactive graphical displays whose design draws ...
    • Live migration of virtual machine memory content in networked systems 

      Haris, Raseena M.; Khan, Khaled M.; Nhlabatsi, Armstrong ( Elsevier , 2022 , Article Review)
      Enterprises are increasingly outsourcing their computing needs to cloud computing. This dependency on cloud services requires uninterrupted and high availability of services. However, achieving the availability of services ...
    • Managing Security Control Assumptions Using Causal Traceability 

      Nhlabatsi, Armstrong; Yu, Yijun; Zisman,; rea; Tun, Thein; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)
      Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ...
    • Quantifying Satisfaction of Security Requirements of Cloud Software Systems 

      Nhlabatsi, Armstrong; Khan, Khaled MD; Hong, Jin B.; Kim, Dong Seong; Fernandez, Rachael; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article)
      The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a security requirement is either satisfied (true) or not (false). However, a discrete Boolean value to measure the satisfaction ...
    • Security-Driven Performance Analysis of Lightweight Cryptography for Energy Efficiency Applications 

      Al-Hasan, Tamim M.; Sayed, Aya N.; Bensaali, Faycal; Nhlabatsi, Armstrong; Hamila, Ridha ( IEEE , 2024 , Conference)
      This paper provides a comprehensive analysis of the security-centric performance of the Lightweight Cryptography (LWC) algorithms ASCON, TinyJambu, and Xoodyak, finalists in the NIST standardization process, through their ...
    • Threat-specific security risk evaluation in the cloud 

      Nhlabatsi, Armstrong; Hong, Jin B.; Kim, Dong Seong; Fernandez, Rachael; Hussein, Alaa; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ...
    • ThreatBased Security Risk Evaluation in the Cloud 

      Nhlabatsi, Armstrong; Khan, Khaled; Fetais, Noora; Fernandez, Rachael; Hong, Jin; ... more authors ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference)
      Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources for improved scalability and dynamic ...
    • Traceability for adaptive information security in the cloud 

      Nhlabatsi, Armstrong; Thun, Thein; Khan, Niamul; Yu, Yijun; Bandara, Arosha; ... more authors ( IEEE Computer Society , 2014 , Conference)
      One of the key challenges in cloud computing is the security of the consumer data stored and processed by cloud machines. When the usage context of a cloud application changes, or when the context is unknown, there is a ...