Now showing items 141-160 of 2261

    • Compliance checking for usage-constrained credentials in trust negotiation systems 

      Hu, Jinwei; Khan, Khaled M.; Bai, Yun; Zhang, Yan ( Springer Berlin Heidelberg , 2012 , Conference Paper)
      We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical ...
    • Profile-based security assurances for service software 

      Khan, Khaled M. ( Springer Verlag , 2011 , Conference Paper)
      In service software, it is highly desirable to have a service composition mechanism that supports automatic reasoning about the security assurances of services. Service consumers such as human, machine, even application ...
    • SecCom: A prototype for integrating security-aware components 

      Khan, Khaled M.; Tan, Calvin ( Springer Verlag , 2009 , Conference Paper)
      This paper addresses information security from systems development point of view. This paper presents a prototype demonstrating how security-aware software components can be composed with other remote objects in terms of ...
    • Cloud computing without seeing 

      Malluhi, Qutaibah; Khan, Khaled M. ( Association for Computing Machinery , 2011 , Conference Paper)
      In the emerging cloud computing model, security is of paramount concern. This paper discusses the need for practical techniques that enable private outsourcing on the cloud by allowing the service provider to work on ...
    • Automatic verification of health regulatory compliance in cloud computing 

      Khan, Khaled M.; Bai, Yun ( IEEE , 2013 , Conference Paper)
      This paper aims to develop an approach that enables cloud computing clients to verify health regulatory compliance claimed by cloud computing providers. In this approach, clients of cloud computing could check automatically ...
    • Social access control language (SocACL) 

      Caprin, Edward; Zhang, Yan; Khan, Khaled M. ( Association for Computing Machinery , 2013 , Conference Paper)
      Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ...
    • A modal logic for information system security 

      Bai, Yun; Khan, Khaled M. ( Australian Computer Society, Inc. , 2011 , Article)
      As a security mechanism, authorization or access control ensures that all accesses to the system resources occur exclusively according to the access polices and rules specified by the systemsecurity agent. Authorization ...
    • Tracking and constraining authorization provenance 

      Hu, Jinwei; Khan, Khaled M.; Bai, Yun; Zhang, Yan ( Springer Berlin Heidelberg , 2012 , Conference Paper)
      Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. ...
    • Role of contextual properties in enterprise service migration to cloud computing 

      Khan, Khaled M.; Malluhi, Qutaibah ( John Wiley and Sons Ltd , 2013 , Article Review)
      This paper attempts to identify the role of contextual properties of enterprise systems architecture in relation to service migration to cloud computing. In a cloud-based service architecture, the shift of ownership, scope, ...
    • Highlight on cryptocurrencies mining with CPUs and GPUs and their benefits based on their characteristics 

      Alkaeed, Mahdi Kh.; Alamro, Zaid; Al-Ali, Muhammed Samir; Al-Mohammed, Hasan Abbas; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      Nowadays cryptography and their technologies have been with us for a long time. This field of science is developing day by day. Blockchain has come a long way since the birth of its first application. This application is ...
    • Garbled computation in cloud 

      Wang, Yongge; Malluhi, Qutaibah M.; Khan, Khaled MD ( Elsevier , 2016 , Article)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • Full-Scale Seawater Reverse Osmosis Desalination Plant Simulator 

      Elnour, Mariam; Meskin, Nader; Khan, Khlaed M.; Jain, Raj; Zaidi, Syed; ... more authors ( Elsevier , 2020 , Conference Paper)
      Reverse Osmosis (RO) is an evolving membrane-based technology for water desalination that started to gain increased popularity in the light of the increased global water demand due its high efficiency and low carbon ...
    • Data Obfuscation for Privacy and Confidentiality in Cloud Computing 

      Khan, Khaled M.; Shaheen, Mahboob ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...
    • Managing Security Control Assumptions Using Causal Traceability 

      Nhlabatsi, Armstrong; Yu, Yijun; Zisman,; rea; Tun, Thein; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ...
    • Traceability for adaptive information security in the cloud 

      Nhlabatsi, Armstrong; Thun, Thein; Khan, Niamul; Yu, Yijun; Bandara, Arosha; ... more authors ( IEEE Computer Society , 2014 , Conference Paper)
      One of the key challenges in cloud computing is the security of the consumer data stored and processed by cloud machines. When the usage context of a cloud application changes, or when the context is unknown, there is a ...
    • Distributed Framework via Block-chain Smart Contracts for Smart Grid Systems against Cyber-Attacks 

      Alkaeed, Mahdi; Soliman, Md Mohiuddin; Khan, Khaled M.; Elfouly, Tarek M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      In this century, the demand for energy is increasing daily, and the need for energy resources has become urgent and inevitable. New ways of generating energy, such as renewable resources that depend on many sources, including ...
    • Live migration of virtual machine memory content in networked systems 

      Haris, Raseena M.; Khan, Khaled M.; Nhlabatsi, Armstrong ( Elsevier , 2022 , Article Review)
      Enterprises are increasingly outsourcing their computing needs to cloud computing. This dependency on cloud services requires uninterrupted and high availability of services. However, achieving the availability of services ...
    • A Process Model for Customisation of Software in Multi-tenant SaaS Model 

      Khan, Khaled M.; Nhlabatsi, Armstrong; Khan, Niamul ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      This paper outlines a generic process framework for customisation of software in cloud computing. The flexibility for client-specific customisation of the software offered by software-as-a-service (SaaS) is limited. The ...
    • Understanding the Impact of Emotions on the Quality of Software Artifacts 

      Khan, Khaled M.; Saleh, Moutaz ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      This paper proposes a framework for investigating the impact of emotions on the quality of software artifacts and portrays some observations captured during the development of several software engineering projects. The ...
    • A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems 

      Elnour, Mariam; Noorizadeh, Mohammad; Shakerpour, Mohammad; Meskin, Nader; Khan, Khaled; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2023 , Article)
      In light of the advancement of the technologies used in industrial control systems, securing their operation has become crucial, primarily since their activity is consistently associated with integral elements related to ...