@article{TowardsTrustworthy2013, title = "Towards Trustworthy Resource Scheduling in Clouds (to appear)", author = "Imad M. Abbadi and Anbang Ruan", year = "2013", journal = "IEEE Transactions on Information Forensics \& Security", month = "Jun", publisher = "IEEE", } @inproceedings{CloudsTrustAnchors2012, title = "Clouds Trust Anchors", author = "Imad M. Abbadi", year = "2012", booktitle = "The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11) ", month = "Jun", publisher = "IEEE", } @article{CloudProvenanceTrust2012, title = "A framework for establishing trust in Cloud provenance", author = "Imad M. Abbadi", year = "2012", journal = "International Journal of Information Security", month = "Nov", pages = "1--18", publisher = "Springer-Verlag, Berlin", volume = "11", } @article{CloudTrustFramework2012, title = "A framework for establishing trust in the Cloud", author = "Imad M. Abbadi and Muntaha Alawneh", year = "2012", journal = "Computers and Electrical Engineering Journal", month = "Sep", pages = "1073--1087", publisher = "Springer-Verlag, Berlin", volume = "38", } @incollection{5608, title = "{TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures}", author = "Alysson Bessani and Imad M. Abbadi and Sven Bugiel and Emanuele Cesena and Mina Deng and Michael Gr�ne and Ninja Marnau and Stefan N�rnberger and Marcelo Pasin and Norbert Schirmer", year = "2012", booktitle = "European Research Activities in Cloud Computing", chapter = "6", editor = "Dana Petcu and JoseLuis Vasquez Poletti", month = "March", pages = "160--186", publisher = "Cambridge Scholars Publishing", } @inproceedings{CloudInfrastructureManagement2011, title = "Clouds' Infrastructure Taxonomy, Properties, and Management Services", author = "Abbadi, Imad M.", year = "2011", booktitle = "Advances in Computing and Communications", editor = "Abraham, Ajith and Mauri, Jaime Lloret and Buford, John F. and Suzuki, Junichi and Thampi, Sabu M.", pages = "406-420", publisher = "Springer Berlin Heidelberg", series = "Communications in Computer and Information Science", volume = "193", } @article{TrustInClouds2011, title = "Trust in the Cloud", author = "Imad M. Abbadi and Andrew Martin", year = "2011", journal = "Information Security Technical Report", number = "3--4", pages = "108--114", volume = "16", } @inproceedings{SecureVirtualLayerManagement2011, title = "Secure Virtual Layer Management in Clouds", author = "Imad M. Abbadi and Muntaha Alawneh and Andrew Martin", year = "2011", booktitle = "The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-10)", month = "Nov", pages = "99--110", publisher = "IEEE", } @inproceedings{insidersanalysis2011, title = "Insiders Analysis in Cloud Computing Focusing on Home Healthcare System", author = "Imad M. Abbadi and Cornelius Namiluko and Andrew Martin", year = "2011", booktitle = "The 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011)", month = "Dec", pages = "350--357", publisher = "IEEE", } @inproceedings{dynamicsoftrust2011, title = "Dynamics of Trust in Clouds --- Challenges and Research Agenda", author = "Imad M. Abbadi and Cornelius Namiluko", year = "2011", booktitle = "The 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011)", month = "Dec", pages = "110--115", publisher = "IEEE", } @inproceedings{insiderdefinition2011, title = "Defining and Analyzing Insiders and their Threats in Organizations", author = "Muntaha Alawneh and Imad M. Abbadi", year = "2011", booktitle = "The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (IEEE SPIoT 2011)", month = "Nov", publisher = "IEEE", } @inproceedings{SecureVirtualLayerManagement2011, title = "Secure Virtual Layer Management of Clouds", author = "Imad M. Abbadi and Muntaha Alawneh and Andrew Martin", year = "2011", booktitle = "The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11) ", month = "Nov", publisher = "IEEE", } @inproceedings{TrustworthyMiddleware, title = "{Trustworthy Middleware Services in the Cloud}", author = "Imad M. Abbadi and Mina Deng and Marco Nalin and Andrew Martin and Milan Petkovic and Ilaria Baroni and Alberto Sanna", year = "2011", booktitle = "CloudDB'11", month = "Oct", publisher = "ACM Press, NY", } @inproceedings{AbbadiLyle2011, title = "Challenges for Provenance in Cloud Computing", author = "Imad M. Abbadi and John Lyle", year = "2011", booktitle = "TaPP 2011: Proceedings of the Third USENIX Workshop on the Theory and Practice of Provenance", publisher = "USENIX", url = "http://www.usenix.org/event/tapp11/tech/final_files/Abbadi.pdf", } @inproceedings{ProvenanceCloud2011, title = "Challenges for Provenance in Cloud Computing", author = "Imad M. Abbadi and John Lyle", year = "2011", booktitle = "in {3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP '11)}", publisher = "USENIX Association", } @inproceedings{CloudMiddleware2011, title = "{Middleware Services at Cloud Application Layer}", author = "Imad M. Abbadi", year = "2011", booktitle = "{IWTMP2PS} '11: Proceedings of Second International Workshop on Trust Management in P2P Systems", } @inproceedings{CloudMiddlewareVirtual2011, title = "{Middleware Services at Cloud Virtual Layer}", author = "Imad M. Abbadi", year = "2011", booktitle = "{DSOC 2011: Proceedings of the 2nd International Workshop on Dependable Service-Oriented and Cloud computing }", month = "Aug", publisher = "IEEE Computer Society", } @inproceedings{operationalTrust2011, title = "Operational Trust in Clouds' Environment", author = "Imad M. Abbadi", year = "2011", booktitle = "{MoCS 2011: Proceedings of the Workshop on Management of Cloud Systems}", month = "Jun", pages = "141--145", publisher = "IEEE Computer Society", } @inproceedings{CloudInfrastructureManagement2011, title = "{Clouds' Infrastructure Taxonomy, Properties, and Management Services}", author = "Imad M. Abbadi", year = "2011", booktitle = "{CloudComp '11: Proceeding of the International workshop on Cloud Computing: Architecture, Algorithms and Applications}", month = "Jul", publisher = "Springer-Verlag", series = "LNCS", } @inproceedings{SelfManagedMar2011, title = "{Self-Managed Services Conceptual Model in Trustworthy Clouds' Infrastructure}", author = "Imad M. Abbadi", year = "2011", booktitle = "Workshop on Cryptography and Security in Clouds", month = "Mar", note = "http://www.zurich.ibm.com/~cca/csc2011/program.html", publisher = "{IBM}, Zurich", } @inproceedings{4615, title = "Toward Trustworthy Clouds' Internet Scale Critical Infrastructure", author = "Imad M. Abbadi", year = "2011", booktitle = "ISPEC '11: Proceedings of the 7th Information Security Practice and Experience Conference", month = "Jun", publisher = "Springer-Verlag, Berlin", series = "Lecture Notes in Computer Science", } @article{Grid2009, title = "Secure information sharing for grid computing", author = "Imad M. Abbadi and Muntaha Alawneh", year = "2009", journal = "Security and Communication Networks --- John Wiley \& Sons, Ltd", month = "Dec", } @inproceedings{ReplayAttack2009, title = "Replay Attack of Dynamic Rights within an Authorised Domain", author = "Imad M. Abbadi and Muntaha Alawneh", year = "2009", booktitle = "Proceedings of the Third International Conference on Emerging Security Information, Systems and Technologies", publisher = "IEEE", } @inproceedings{springerlink:10.1007/978-0-387-09699-5_33, title = "Software Licence Protection and Management for Organisations", author = "Alawneh, Muntaha and Abbadi, Imad", year = "2008", affiliation = "University of London Information Security Group, Royal Holloway Egham Surrey, TW20 0EX UK", booktitle = "Proceedings of The Ifip Tc 11 23<sup>rd</sup> International Information Security Conference", editor = "Jajodia, Sushil and Samarati, Pierangela and Cimato, Stelvio", pages = "509-523", publisher = "Springer Boston", series = "IFIP International Federation for Information Processing", volume = "278", } @inproceedings{DRMTC2008, title = "Combining DRM with Trusted Computing for Effective Information Access Management", author = "Imad M. Abbadi and Muntaha Alawneh", year = "2008", booktitle = "Proceedings of the 2nd Workshop on Practice and Theory of IT Security, Montreal-Canada", month = "Jan", publisher = "IEEE", } @inproceedings{CollaboratingLeakage2008, title = "Preventing Information Leakage between Collaborating Organisations", author = "Muntaha Alawneh and Imad M. Abbadi", year = "2008", booktitle = "ICEC '08: Proceedings of the tenth international conference on Electronic commerce", month = "Aug", pages = "185--194", publisher = "ACM Press, NY", } @techreport{PhDThesis, title = "Digital Rights Management for Personal Networks", author = "Imad M. Abbadi", year = "2008", institution = "Royal Holloway, University of London", month = "Jul", note = "http://www.ma.rhul.ac.uk/tech", number = "{RHUL-MA}-2008-17", pages = "262", } @inproceedings{PreventingInsiderLeakage2008, title = "Preventing Insider Information Leakage for Enterprises", author = "Imad M. Abbadi and Muntaha Alawneh", year = "2008", booktitle = "Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies", publisher = "IEEE", } @inproceedings{SharingbutProtecting2008, title = "Sharing but Protecting Content Against Internal Leakage for Organisations", author = "Muntaha Alawneh and Imad M. Abbadi", year = "2008", booktitle = "DAS 2008", pages = "238--253", publisher = "Springer-Verlag, Berlin", series = "Lecture Notes in Computer Science", volume = "5094", } @inproceedings{DRM-EPS, title = "{DRM} Domain Authentication using Electronic Payment Systems", author = "Imad M. Abbadi and Muntaha Alawneh", year = "2008", booktitle = "ICEC '08: Proceedings of the tenth international conference on Electronic commerce", month = "Aug", pages = "185--194", publisher = "ACM Press, NY", } @inproceedings{DRM-LBS, title = "Authorised Domain Management using Location Based Services", author = "Imad M. Abbadi", year = "2007", booktitle = "Mobility '07: proceedings of the 4th International Conference on Mobile Technology, Applications \& Systems", editor = "Adrian David Cheak and Peter H J Chong and Winston Seah and Shum Ping", month = "Sep", pages = "288--295", publisher = "ACM Press, NY", } @inproceedings{DRM-Mobile, title = "Digital Rights Management using a Mobile Phone", author = "Imad M. Abbadi and Chris Mitchell", year = "2007", booktitle = "ICEC '07: Proceedings of the ninth international conference on Electronic commerce", month = "Aug", pages = "185--194", publisher = "ACM Press, NY", } @inproceedings{DRM-MCD, title = "Digital Rights Management using a Master Control Device", author = "Imad M. Abbadi", year = "2007", booktitle = "ASIAN '07: Proceedings of the 12th Annual Asian Computing Science Conference Focusing on Computer and Network Security", editor = "I. Cervesato", month = "Dec", pages = "126--141", publisher = "Springer-Verlag, Berlin", series = "Lecture Notes in Computer Science", volume = "4846", } @inproceedings{DigitalAssetProtection2006-A, title = "Digital Asset Protection in Personal Private Networks", author = "Imad M. Abbadi", year = "2006", booktitle = "8th International Symposium on Systems and Information Security (SSI 2006), Sao Jose dos Campos, Sao Paulo, Brazil", month = "Nov", }