التسجيلات التي قمت بإرسالها

  • Selecting Web services with security compliances: A managerial perspective 

    Khan, Khaled MD ( dblp computer science bibliography , 2007 , Conference Paper)
    This paper proposes a framework of a decision support system (DSS) for the assessment process of selecting Web services with security compliances consistent with the enterprise business goal. The proposed DSS framework is ...
  • Security-oriented service composition and evolution 

    Khan, K.M.; Kowalczyk, R.; Jun, Han ( IEEE , 2006 , Conference Paper)
    This paper introduces a framework for security-oriented software service composition and evolution. Key building blocks of the framework are a semantic model for specifying the security objectives and properties at the ...
  • Identifying contextual properties of software architecture in cloud computing 

    Khan, Khaled M.; Malluhi, Qutaibah ( IEEE , 2011 , Conference Paper)
    This paper argues that the contextual properties of cloud-enabled software architecture should be identified and understood differently by cloud consumers. The existing architectures are not designed to exploit the contextual ...
  • Secure cloud services: Matrix multiplication revisited 

    Khan, Khaled M.; Shaheen, Mahboob ( IEEE , 2013 , Conference Paper)
    This paper revisits the issue of secure outsourcing of services. It proposes a data scrambling approach of transforming private data into public without public key encryption in the cloud computing context. The approach ...
  • Trust in cloud services: Providing more controls to clients 

    Khan, Khaled M.; Malluhi, Qutaibah ( IEEE , 2013 , Article)
    Trust is more important than money and will ultimately determine cloud computing's success.
  • Constraint-enhanced role engineering via answer set programming 

    Hu, Jinwei; Khan, Khaled M.; Bai, Yun; Zhang, Yan ( Association for Computing Machinery , 2012 , Conference Paper)
    Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security ...
  • Compliance checking for usage-constrained credentials in trust negotiation systems 

    Hu, Jinwei; Khan, Khaled M.; Bai, Yun; Zhang, Yan ( Springer Berlin Heidelberg , 2012 , Conference Paper)
    We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical ...
  • Profile-based security assurances for service software 

    Khan, Khaled M. ( Springer Verlag , 2011 , Conference Paper)
    In service software, it is highly desirable to have a service composition mechanism that supports automatic reasoning about the security assurances of services. Service consumers such as human, machine, even application ...
  • SecCom: A prototype for integrating security-aware components 

    Khan, Khaled M.; Tan, Calvin ( Springer Verlag , 2009 , Conference Paper)
    This paper addresses information security from systems development point of view. This paper presents a prototype demonstrating how security-aware software components can be composed with other remote objects in terms of ...
  • Cloud computing without seeing 

    Malluhi, Qutaibah; Khan, Khaled M. ( Association for Computing Machinery , 2011 , Conference Paper)
    In the emerging cloud computing model, security is of paramount concern. This paper discusses the need for practical techniques that enable private outsourcing on the cloud by allowing the service provider to work on ...
  • Automatic verification of health regulatory compliance in cloud computing 

    Khan, Khaled M.; Bai, Yun ( IEEE , 2013 , Conference Paper)
    This paper aims to develop an approach that enables cloud computing clients to verify health regulatory compliance claimed by cloud computing providers. In this approach, clients of cloud computing could check automatically ...
  • Social access control language (SocACL) 

    Caprin, Edward; Zhang, Yan; Khan, Khaled M. ( Association for Computing Machinery , 2013 , Conference Paper)
    Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ...
  • A modal logic for information system security 

    Bai, Yun; Khan, Khaled M. ( Australian Computer Society, Inc. , 2011 , Article)
    As a security mechanism, authorization or access control ensures that all accesses to the system resources occur exclusively according to the access polices and rules specified by the systemsecurity agent. Authorization ...
  • Tracking and constraining authorization provenance 

    Hu, Jinwei; Khan, Khaled M.; Bai, Yun; Zhang, Yan ( Springer Berlin Heidelberg , 2012 , Conference Paper)
    Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. ...
  • Role of contextual properties in enterprise service migration to cloud computing 

    Khan, Khaled M.; Malluhi, Qutaibah ( John Wiley and Sons Ltd , 2013 , Article Review)
    This paper attempts to identify the role of contextual properties of enterprise systems architecture in relation to service migration to cloud computing. In a cloud-based service architecture, the shift of ownership, scope, ...
  • Highlight on cryptocurrencies mining with CPUs and GPUs and their benefits based on their characteristics 

    Alkaeed, Mahdi Kh.; Alamro, Zaid; Al-Ali, Muhammed Samir; Al-Mohammed, Hasan Abbas; Khan, Khaled M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
    Nowadays cryptography and their technologies have been with us for a long time. This field of science is developing day by day. Blockchain has come a long way since the birth of its first application. This application is ...
  • Garbled computation in cloud 

    Wang, Yongge; Malluhi, Qutaibah M.; Khan, Khaled MD ( Elsevier , 2016 , Article)
    With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
  • Full-Scale Seawater Reverse Osmosis Desalination Plant Simulator 

    Elnour, Mariam; Meskin, Nader; Khan, Khlaed M.; Jain, Raj; Zaidi, Syed; ... more authors ( Elsevier , 2020 , Conference Paper)
    Reverse Osmosis (RO) is an evolving membrane-based technology for water desalination that started to gain increased popularity in the light of the increased global water demand due its high efficiency and low carbon ...
  • Data Obfuscation for Privacy and Confidentiality in Cloud Computing 

    Khan, Khaled M.; Shaheen, Mahboob ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
    This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with ...
  • Managing Security Control Assumptions Using Causal Traceability 

    Nhlabatsi, Armstrong; Yu, Yijun; Zisman,; rea; Tun, Thein; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
    Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ...

عرض المزيد