• Addressing security compatibility for multi-tenant cloud services 

      Khan, Khaled M.; Erradi, Abdelkarim; Alhazbi, Saleh; Han, Jun ( Inderscience Publishers , 2013 , Article)
      This paper addresses the issue of compatibility checking between the security requirements of service clients and the security assurances provided by multi-tenant cloud services. To allow early detection of security ...
    • Assessing Quality of Web Based Systems 

      Khan, Khaled M. ( IEEE , 2008 , Conference Paper)
      This paper proposes an assessment model for Web-based systems in terms of non-functional properties of the system. The proposed model consists of two stages: (i) deriving quality metrics using goal-question-metric (GQM) ...
    • Data confidentiality in cloud-based pervasive system 

      Khan, Khaled M.; Shaheen, Mahboob; Wang, Yongge ( Association for Computing Machinery , 2017 , Conference Paper)
      Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ...
    • Empowering users of cloud computing on data confidentiality 

      Khan, Khaled M.; Shaheen, Mahboob ( IEEE , 2014 , Conference Paper)
      Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore ...
    • Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service 

      Khan, Khaled M.; Jiang, Zhuhan ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      Maintainability and easy-to-customisation are some quality properties that most application software in software-as-a-service (SaaS) should posses. These quality attributes are the pre requisite for most application software ...
    • Reasoning about Policies in Security-Aware Service Discovery Using Answer Set Programming 

      Asuncion, Vernon; Khan, Khaled M.; Erradi, Abdelkarim; Alhazbi, Saleh ( World Scientific Publishing Co. Pte Ltd , 2016 , Article)
      In order to enable a secure interaction between dynamically discovered software services and the client's application in a cooperative information system such as service oriented system, one of the pre-requisites is the ...
    • Role updating in information systems using model checking 

      Hu, Jinwei; Khan, Khaled M.; Zhang, Yan; Bai, Yun; Li, Ruixuan ( Springer London , 2017 , Article)
      The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the ...
    • Security Dynamics of Cloud Computing 

      Khan, Khaled M. ( Cutter Consortium , 2009 , Article)
      This paper explores various dimensions of cloud computing security. It argues that security concerns of cloud computing need to be addressed from the perspective of individual stakeholder. Security focuses of cloud computing ...
    • Security oriented service composition: A framework 

      Khan, Khaled M.; Erradi, Abdelkarim; Alhazbi, Saleh; Han, Jun ( IEEE , 2012 , Conference Paper)
      This paper argues that in order to address the challenges of security compatibility checking between the client's software and the service software in a service oriented software environment, the followings have to be ...
    • Specifying Security Goals of Component Based Systems: An End-User Perspective 

      Khan, Khaled M.; Han, Jun ( IEEE , 2008 , Conference Paper)
      This paper treats security from a software engineering point of view. Security issues of software components are usually handled at the two levels of development abstractions: by the security experts during the component ...
    • Using block cipher for confidentiality of images in cloud-based systems 

      Rihan, Rana Adnan; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ...