Items where Author is "Abdallah, Ali E."

Up a level
Export as [feed] RSS
Group by: Item Type | No Grouping
Number of items: 32.

Article

Zhou, Xiaohu and Nehme, Antonio and Jesus, Vitor and Wang, Yonghao and Josephs, Mark and Mahbub, Khaled and Abdallah, Ali E. (2022) AudiWFlow: Confidential, Collusion-resistant Auditing of Distributed Workflows. Blockchain: Research and Applications. ISSN 2096-7209

Wagner, Thomas D. and Mahbub, Khaled and Palomar, Esther and Abdallah, Ali E. (2019) Cyber threat intelligence sharing: Survey and research directions. Computers & Security, 87 (Nov-19). p. 101589. ISSN 01674048

Ghahremanlou, Lida and Tawil, Abdel-Rahman H. and Kearney, Paul and Zhao, Xia and Nevisi, Hossein and Abdallah, Ali E. (2018) A Survey of Open Data Platforms in Six UK Smart City Initiatives. The Computer Journal. ISSN Online ISSN 1460-2067 Print ISSN 0010-4620

Wagner, Thomas D. and Palomar, Esther and Mahbub, Khaled and Abdallah, Ali E. (2018) A Novel Trust Taxonomy for Shared Cyber Threat Intelligence. Security and Communication Networks, 2018. ISSN 1939-0114

Nehme, Antonio and Jesus, Vitor and Mahbub, Khaled and Abdallah, Ali E. (2018) Securing Microservices. IT Professional. ISSN 1520-9202

Abdallah, Fatima and Basurra, Shadi and Abdallah, Ali E. (2016) An Analysis Approach for Context-Aware Energy Feedback Systems. The Ninth York Doctoral Symposium on Computer Science and Electronics.

Gheyas, Iffat and Abdallah, Ali E. (2016) Detection and prediction of insider threats to cyber security: a systematic literature review and meta-analysis. Big Data Analytics, 1 (6). pp. 1-29. ISSN 2058-6345

Barros Barbosa, Igor and Theoharis, Theoharis and Abdallah, Ali E. (2016) On the use of fingernail images as transient biometric identifiers. Machine Vision and Applications, 27 (1). pp. 65-76. ISSN 0932-8092

Haidar, A. N. and Zasada, Stefan J. and Coveney, P. V. and Abdallah, Ali E. and Beckles, B. and Jones, M. A. S. (2011) Audited credential delegation: a usable security solution for the virtual physiological human toolkit. Interface Focus, 1 (3). pp. 462-473. ISSN 2042-8898

Haidar, Ali Nasrat and Abdallah, Ali E. (2009) Formal Modelling of PKI Based Authentication. Electronic Notes in Theoretical Computer Science, 235. pp. 55-70. ISSN 15710661

Book Section

Wagner, Thomas D. and Palomar, Esther and Mahbub, Khaled and Abdallah, Ali E. (2018) Towards an Anonymity Supported Platform for Shared Cyber Threat Intelligence. In: Risks and Security of Internet and Systems: 12th International Conference, CRiSIS 2017. Lecture Notes in Computer Science . Springer International Publishing, pp. 175-183. ISBN 978-3-319-76686-7

Wagner, Thomas D. and Palomar, Esther and Mahbub, Khaled and Abdallah, Ali E. (2017) Relevance Filtering for Shared Cyber Threat Intelligence (Short Paper). In: Information Security Practice and Experience: 13th International Conference, ISPEC 2017. Lecture Notes in Computer Science . Springer International Publishing, pp. 576-586. ISBN 978-3-319-72358-7

Bull, Peter and Abdallah, Ali E. and Aliyu, Aliyu Lawal (2017) Performance Implication and Analysis of the OpenFlow SDN Protocol. In: Advanced Information Networking and Applications Workshops (WAINA), 2017 31st International Conference on. IEEE. ISBN 978-1-5090-6231-7

Bull, Peter and Lawal Aliyu, Aliyu and Abdallah, Ali E. (2017) A Trust Management Framework for Network Applications within an SDN Environment. In: 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, Taipei, Taiwan, Taiwan. ISBN 978-1-5090-6231-7

Abdallah, Fatima and Abdallah, Ali E. and Basurra, Shadi (2016) Defining Context for Home Electricity Feedback Systems. In: Proceedings of Zero Carbon Buildings Today and in the Future. Birmingham City University, Birmingham, pp. 147-152. ISBN 978-1-904839-88-0

Alcaide, Almudena and Abdallah, Ali E. and González–Tablas, Ana I. and Fuentes, José M. (2011) L–PEP: A Logic to Reason about Privacy–Enhancing Cryptography Protocols. In: Data Privacy Management and Autonomous Spontaneous Security. Springer, Berlin, Heidelberg, pp. 108-122. ISBN 978-3-642-19348-4

Alcaide, Almudena and Palomar, Esther and Barroso-Perez, Israel and Abdallah, Ali E. (2011) Privacy-enhancing cryptography-based materials. In: Proceedings of the International Conference on Security and Cryptography. IEEE Conference Publications, pp. 379-382. ISBN 978-989-8425-71-3

Möckel, Caroline and Abdallah, Ali E. (2010) Threat modeling approaches and tools for securing architectural designs of an e-banking application. In: Information Assurance and Security (IAS), 2010 Sixth International Conference. IEEE Conference Publications, pp. 149-154. ISBN 978-1-4244-7409-7

Chehab, Maya I. and Abdallah, Ali E. (2010) Assurance in identity management systems. In: Information Assurance and Security (IAS), 2010 Sixth International Conference. IEEE Conference Publications, pp. 216-221. ISBN 978-1-4244-7409-7

Haidar, A. N. and Zasada, Stefan J. and Coveney, P. V. and Abdallah, Ali E. and Beckles, B. (2010) Audited credential delegation - a user-centric identity management solution for computational grid environments. In: Information Assurance and Security (IAS), 2010 Sixth International Conference. IEEE Conference Publications, pp. 222-227. ISBN 978-1-4244-7409-7

Chehab, Maya I. and Abdallah, Ali E. (2009) Architectures for identity management. In: International Conference on Internet Technology and Secured Transactions, ICITST 2009. IEEE Conference Publications, pp. 1-8. ISBN 978-1-4244-5648-2

Cooper, Stephen and Nickell, Christine and Piotrowski, Victor and Oldfield, Brenda and Abdallah, Ali E. and Bishop, Matt and Caelli, Bill and Dark, Melissa and Hawthorne, E. K. and Hoffman, Lance and Pérez, Lance C. and Pfleeger, Charles and Raines, Richard and Schou, Corey and Brynielsson, Joel (2009) An exploration of the current state of information assurance education. In: An Exploration of the Current State of Information Assurance Education. ACM, pp. 109-125.

Haidar, Ali N. and Abdallah, Ali E. (2008) Comparison and Evaluation of Identity Management in Three Architectures for Virtual Organizations. In: Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference. IEEE Conference Publications, pp. 21-26. ISBN 978-0-7695-3324-7

Haidar, Ali Nasrat and Abdallah, Ali E. (2008) Composition and Customization of Web Services Using Wrappers: A Formal Approach Based on CSP. In: Software Engineering Workshop, 2008. SEW '08. 32nd Annual IEEE. IEEE Conference Publications, pp. 187-194. ISBN 978-0-7695-3617-0

Haidar, Ali Nasrat and Abdallah, Ali E. (2008) Composition of Web Services Using Wrappers. In: Leveraging Applications of Formal Methods, Verification and Validation. Springer, pp. 862-865. ISBN 0302-9743

Abdallah, Ali E. and Takabi, Hassan (2008) Integrating Delegation with the Formal Core RBAC Model. In: Information Assurance and Security, 2008. ISIAS '08. Fourth International Conference. IEEE Conference Publications, pp. 33-36. ISBN 978-0-7695-3324-7

Haidar, Ali Nasrat and Abdallah, Ali E. (2008) Weaving Authentication and Authorization Requirements into the Functional Model of a System Using Z Promotion. In: Leveraging Applications of Formal Methods, Verification and Validation. Springer, pp. 831-846. ISBN 0302-9743

Abdallah, Ali E. and Khayat, Etienne J. (2006) Formal Z Specifications of Several Flat Role-Based Access Control Models. In: 2006 30th Annual IEEE/NASA Software Engineering Workshop. IEEE Conference Publications, pp. 282-292. ISBN 0-7695-2624-1

Haidar, Ali Nasrat and Abdallah, Ali E. (2006) Towards a Formal Framework for Developing Secure Web Services. In: Automated Specification and Verification of Web Systems, 2006. WWV '06. 2nd International Workshop. IEEE Conference Publications, pp. 61-70. ISBN 0-7695-2826-0

Abdallah, Ali E. and Khayat, Etienne J. (2005) A Formal Model for Parameterized Role-Based Access Control. In: Formal Aspects in Security and Trust. Springer, pp. 233-246. ISBN 978-0-387-24050-3

Conference or Workshop Item

Nehme, Antonio and Jesus, Vitor and Mahbub, Khaled and Abdallah, Ali E. (2019) Decentralised and Collaborative Auditing of Workflows. In: 16th International Conference on Trust, Privacy and Security in Digital Business - TrustBus 2019, August 26 - 29, 2019, Linz, Austria.

Haidar, Ali N. and Abdallah, Ali E. (2009) Abstractions of Web Services. In: 2009 14th IEEE International Conference on Engineering of Complex Computer Systems, 2 - 4 June 2009, Potsdam.

This list was generated on Mon Apr 29 20:08:54 2024 UTC.

Research

In this section...