Now showing items 321-340 of 2427

    • Identifying contextual properties of software architecture in cloud computing 

      Khan, Khaled M.; Malluhi, Qutaibah ( IEEE , 2011 , Conference)
      This paper argues that the contextual properties of cloud-enabled software architecture should be identified and understood differently by cloud consumers. The existing architectures are not designed to exploit the contextual ...
    • Selecting Web services with security compliances: A managerial perspective 

      Khan, Khaled MD ( dblp computer science bibliography , 2007 , Conference)
      This paper proposes a framework of a decision support system (DSS) for the assessment process of selecting Web services with security compliances consistent with the enterprise business goal. The proposed DSS framework is ...
    • A modal logic for information system security 

      Bai, Yun; Khan, Khaled M. ( Australian Computer Society, Inc. , 2011 , Article)
      As a security mechanism, authorization or access control ensures that all accesses to the system resources occur exclusively according to the access polices and rules specified by the systemsecurity agent. Authorization ...
    • Profile-based security assurances for service software 

      Khan, Khaled M. ( Springer Verlag , 2011 , Conference)
      In service software, it is highly desirable to have a service composition mechanism that supports automatic reasoning about the security assurances of services. Service consumers such as human, machine, even application ...
    • SecCom: A prototype for integrating security-aware components 

      Khan, Khaled M.; Tan, Calvin ( Springer Verlag , 2009 , Conference)
      This paper addresses information security from systems development point of view. This paper presents a prototype demonstrating how security-aware software components can be composed with other remote objects in terms of ...
    • Tracking and constraining authorization provenance 

      Hu, Jinwei; Khan, Khaled M.; Bai, Yun; Zhang, Yan ( Springer Berlin Heidelberg , 2012 , Conference)
      Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. ...
    • Cloud computing without seeing 

      Malluhi, Qutaibah; Khan, Khaled M. ( Association for Computing Machinery , 2011 , Conference)
      In the emerging cloud computing model, security is of paramount concern. This paper discusses the need for practical techniques that enable private outsourcing on the cloud by allowing the service provider to work on ...
    • A machine learning-based optimization approach for pre-copy live virtual machine migration 

      Haris, Raseena M.; Khan, Khaled M.; Nhlabatsi, Armstrong; Barhamgi, Mahmoud ( Springer , 2023 , Article)
      Organizations widely use cloud computing to outsource their computing needs. One crucial issue of cloud computing is that services must be available to clients at all times. However, the cloud services may be temporarily ...
    • Understanding the Impact of Emotions on the Quality of Software Artifacts 

      Khan, Khaled M.; Saleh, Moutaz ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)
      This paper proposes a framework for investigating the impact of emotions on the quality of software artifacts and portrays some observations captured during the development of several software engineering projects. The ...
    • Distributed Framework via Block-chain Smart Contracts for Smart Grid Systems against Cyber-Attacks 

      Alkaeed, Mahdi; Soliman, Md Mohiuddin; Khan, Khaled M.; Elfouly, Tarek M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)
      In this century, the demand for energy is increasing daily, and the need for energy resources has become urgent and inevitable. New ways of generating energy, such as renewable resources that depend on many sources, including ...
    • Highlight on cryptocurrencies mining with CPUs and GPUs and their benefits based on their characteristics 

      Alkaeed, Mahdi Kh.; Alamro, Zaid; Al-Ali, Muhammed Samir; Al-Mohammed, Hasan Abbas; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference)
      Nowadays cryptography and their technologies have been with us for a long time. This field of science is developing day by day. Blockchain has come a long way since the birth of its first application. This application is ...
    • Live migration of virtual machine memory content in networked systems 

      Haris, Raseena M.; Khan, Khaled M.; Nhlabatsi, Armstrong ( Elsevier , 2022 , Article Review)
      Enterprises are increasingly outsourcing their computing needs to cloud computing. This dependency on cloud services requires uninterrupted and high availability of services. However, achieving the availability of services ...
    • Garbled computation in cloud 

      Wang, Yongge; Malluhi, Qutaibah M.; Khan, Khaled MD ( Elsevier , 2016 , Article)
      With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
    • Managing Security Control Assumptions Using Causal Traceability 

      Nhlabatsi, Armstrong; Yu, Yijun; Zisman,; rea; Tun, Thein; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)
      Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ...
    • Full-Scale Seawater Reverse Osmosis Desalination Plant Simulator 

      Elnour, Mariam; Meskin, Nader; Khan, Khlaed M.; Jain, Raj; Zaidi, Syed; ... more authors ( Elsevier , 2020 , Conference)
      Reverse Osmosis (RO) is an evolving membrane-based technology for water desalination that started to gain increased popularity in the light of the increased global water demand due its high efficiency and low carbon ...
    • Data Obfuscation for Privacy and Confidentiality in Cloud Computing 

      Khan, Khaled M.; Shaheen, Mahboob ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference)
      This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...
    • Wireless application deploying cell broadcast, and bulk SMS/MMS 

      Samaka, Mohammed; Fakhroo, Abdulaziz; Al-Omari, Noha; Moeinzadeh, Zohreh; Al-Kubaisi, Saada; ... more authors ( International Business Information Management Association, IBIMA , 2009 , Conference)
      Cell broadcast is a mobile technology that allows messages to be broadcast to all mobile handsets and similar devices within a designated geographical area. The broadcast range can be varied, from a single cell to the ...
    • MB-C: Check-in mobile application using barcodes 

      Samaka, Mohammed; Hassan, Mohammed ( International Business Information Management Association, IBIMA , 2008 , Conference)
      This project involves the design and development of a mobile application, called Mobile Bar-Code (MB-C) that uses the bar-code concept in the process of check-in to the provider's venue or facility. The MB-C integrates ...
    • Altmetrics for country-level research assessment 

      Alhoori, Hamed; Furuta, Richard; Tabet, Myrna; Samaka, Mohammed; Fox, Edward A. ( Springer Verlag , 2014 , Article)
      Changes are occurring in scholarly communication and the geography of science.Policymakersand research funding agencies are looking for ways to measure the comprehensive impact of research and benefit from the research ...
    • Workplace learning using mobile technology: A case study in the oil and gas industry 

      Ally, Mohamed; Samaka, Mohammed; Impagliazzo, John; Mohamed, Abdulahi; Robinson, Martha ( Springer Verlag , 2014 , Article)
      This article presents an innovative project using mobile technology to train workers in the oil and gas industry to develop their communication skills while functioning on the job. The training was delivered on mobile ...