Skip to main content

Imad M. Abbadi : Publications

Click here to download all publications in a single bibtex file

@article{TowardsTrustworthy2013,
  title = "Towards Trustworthy Resource Scheduling in Clouds (to appear)",
  author = "Imad M. Abbadi and Anbang Ruan",
  year = "2013",
  journal = "IEEE Transactions on Information Forensics \& Security",
  month = "Jun",
  publisher = "IEEE",
}
@article{CloudTrustFramework2012,
  title = "A framework for establishing trust in the Cloud",
  author = "Imad M. Abbadi and Muntaha Alawneh",
  year = "2012",
  journal = "Computers and Electrical Engineering Journal",
  month = "Sep",
  pages = "1073--1087",
  publisher = "Springer-Verlag, Berlin",
  volume = "38",
}
@inproceedings{CloudsTrustAnchors2012,
  title = "Clouds Trust Anchors",
  author = "Imad M. Abbadi",
  year = "2012",
  booktitle = "The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11) ",
  month = "Jun",
  publisher = "IEEE",
}
@incollection{5608,
  title = "{TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures}",
  author = "Alysson Bessani and Imad M. Abbadi and Sven Bugiel and Emanuele Cesena and Mina Deng and Michael Gr�ne and Ninja Marnau and Stefan N�rnberger and Marcelo Pasin and Norbert Schirmer",
  year = "2012",
  booktitle = "European Research Activities in Cloud Computing",
  chapter = "6",
  editor = "Dana Petcu and JoseLuis Vasquez Poletti",
  month = "March",
  pages = "160--186",
  publisher = "Cambridge Scholars Publishing",
}
@article{CloudProvenanceTrust2012,
  title = "A framework for establishing trust in Cloud provenance",
  author = "Imad M. Abbadi",
  year = "2012",
  journal = "International Journal of Information Security",
  month = "Nov",
  pages = "1--18",
  publisher = "Springer-Verlag, Berlin",
  volume = "11",
}
@inproceedings{CloudMiddlewareVirtual2011,
  title = "{Middleware Services at Cloud Virtual Layer}",
  author = "Imad M. Abbadi",
  year = "2011",
  booktitle = "{DSOC 2011: Proceedings of the 2nd International Workshop on Dependable Service-Oriented and Cloud computing }",
  month = "Aug",
  publisher = "IEEE Computer Society",
}
@inproceedings{CloudInfrastructureManagement2011,
  title = "{Clouds' Infrastructure Taxonomy, Properties, and Management Services}",
  author = "Imad M. Abbadi",
  year = "2011",
  booktitle = "{CloudComp '11: Proceeding of the International workshop on Cloud Computing: Architecture, Algorithms and Applications}",
  month = "Jul",
  publisher = "Springer-Verlag",
  series = "LNCS",
}
@inproceedings{operationalTrust2011,
  title = "Operational Trust in Clouds' Environment",
  author = "Imad M. Abbadi",
  year = "2011",
  booktitle = "{MoCS 2011: Proceedings of the Workshop on Management of Cloud Systems}",
  month = "Jun",
  pages = "141--145",
  publisher = "IEEE Computer Society",
}
@inproceedings{4615,
  title = "Toward Trustworthy Clouds' Internet Scale Critical Infrastructure",
  author = "Imad M. Abbadi",
  year = "2011",
  booktitle = "ISPEC '11: Proceedings of the 7th Information Security Practice and Experience Conference",
  month = "Jun",
  publisher = "Springer-Verlag, Berlin",
  series = "Lecture Notes in Computer Science",
}
@inproceedings{SelfManagedMar2011,
  title = "{Self-Managed Services Conceptual Model in Trustworthy Clouds' Infrastructure}",
  author = "Imad M. Abbadi",
  year = "2011",
  booktitle = "Workshop on Cryptography and Security in Clouds",
  month = "Mar",
  note = "http://www.zurich.ibm.com/~cca/csc2011/program.html",
  publisher = "{IBM}, Zurich",
}
@inproceedings{insidersanalysis2011,
  title = "Insiders Analysis in Cloud Computing Focusing on Home Healthcare System",
  author = "Imad M. Abbadi and Cornelius Namiluko and Andrew Martin",
  year = "2011",
  booktitle = "The 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011)",
  month = "Dec",
  pages = "350--357",
  publisher = "IEEE",
}
@inproceedings{dynamicsoftrust2011,
  title = "Dynamics of Trust in Clouds --- Challenges and Research Agenda",
  author = "Imad M. Abbadi and Cornelius Namiluko",
  year = "2011",
  booktitle = "The 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011)",
  month = "Dec",
  pages = "110--115",
  publisher = "IEEE",
}
@inproceedings{SecureVirtualLayerManagement2011,
  title = "Secure Virtual Layer Management in Clouds",
  author = "Imad M. Abbadi and Muntaha Alawneh and Andrew Martin",
  year = "2011",
  booktitle = "The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-10)",
  month = "Nov",
  pages = "99--110",
  publisher = "IEEE",
}
@inproceedings{insiderdefinition2011,
  title = "Defining and Analyzing Insiders and their Threats in Organizations",
  author = "Muntaha Alawneh and Imad M. Abbadi",
  year = "2011",
  booktitle = "The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (IEEE SPIoT 2011)",
  month = "Nov",
  publisher = "IEEE",
}
@inproceedings{SecureVirtualLayerManagement2011,
  title = "Secure Virtual Layer Management of Clouds",
  author = "Imad M. Abbadi and Muntaha Alawneh and Andrew Martin",
  year = "2011",
  booktitle = "The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11) ",
  month = "Nov",
  publisher = "IEEE",
}
@inproceedings{TrustworthyMiddleware,
  title = "{Trustworthy Middleware Services in the Cloud}",
  author = "Imad M. Abbadi and Mina Deng and Marco Nalin and Andrew Martin and Milan Petkovic and Ilaria Baroni and Alberto Sanna",
  year = "2011",
  booktitle = "CloudDB'11",
  month = "Oct",
  publisher = "ACM Press, NY",
}
@article{TrustInClouds2011,
  title = "Trust in the Cloud",
  author = "Imad M. Abbadi and Andrew Martin",
  year = "2011",
  journal = "Information Security Technical Report",
  number = "3--4",
  pages = "108--114",
  volume = "16",
}
@inproceedings{CloudInfrastructureManagement2011,
  title = "Clouds' Infrastructure Taxonomy, Properties, and Management Services",
  author = "Abbadi, Imad M.",
  year = "2011",
  booktitle = "Advances in Computing and Communications",
  editor = "Abraham, Ajith and Mauri, Jaime Lloret and Buford, John F. and Suzuki, Junichi and Thampi, Sabu M.",
  pages = "406-420",
  publisher = "Springer Berlin Heidelberg",
  series = "Communications in Computer and Information Science",
  volume = "193",
}
@inproceedings{AbbadiLyle2011,
  title = "Challenges for Provenance in Cloud Computing",
  author = "Imad M. Abbadi and John Lyle",
  year = "2011",
  booktitle = "TaPP 2011: Proceedings of the Third USENIX Workshop on the Theory and Practice of Provenance",
  publisher = "USENIX",
  url = "http://www.usenix.org/event/tapp11/tech/final_files/Abbadi.pdf",
}
@inproceedings{ProvenanceCloud2011,
  title = "Challenges for Provenance in Cloud Computing",
  author = "Imad M. Abbadi and John Lyle",
  year = "2011",
  booktitle = "in {3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP '11)}",
  publisher = "USENIX Association",
}
@inproceedings{CloudMiddleware2011,
  title = "{Middleware Services at Cloud Application Layer}",
  author = "Imad M. Abbadi",
  year = "2011",
  booktitle = "{IWTMP2PS} '11: Proceedings of Second International Workshop on Trust Management in P2P Systems",
}
@article{Grid2009,
  title = "Secure information sharing for grid computing",
  author = "Imad M. Abbadi and Muntaha Alawneh",
  year = "2009",
  journal = "Security and Communication Networks --- John Wiley \& Sons, Ltd",
  month = "Dec",
}
@inproceedings{ReplayAttack2009,
  title = "Replay Attack of Dynamic Rights within an Authorised Domain",
  author = "Imad M. Abbadi and Muntaha Alawneh",
  year = "2009",
  booktitle = "Proceedings of the Third International Conference on Emerging Security Information, Systems and Technologies",
  publisher = "IEEE",
}
@inproceedings{CollaboratingLeakage2008,
  title = "Preventing Information Leakage between Collaborating Organisations",
  author = "Muntaha Alawneh and Imad M. Abbadi",
  year = "2008",
  booktitle = "ICEC '08: Proceedings of the tenth international conference on Electronic commerce",
  month = "Aug",
  pages = "185--194",
  publisher = "ACM Press, NY",
}
@inproceedings{DRM-EPS,
  title = "{DRM} Domain Authentication using Electronic Payment Systems",
  author = "Imad M. Abbadi and Muntaha Alawneh",
  year = "2008",
  booktitle = "ICEC '08: Proceedings of the tenth international conference on Electronic commerce",
  month = "Aug",
  pages = "185--194",
  publisher = "ACM Press, NY",
}
@techreport{PhDThesis,
  title = "Digital Rights Management for Personal Networks",
  author = "Imad M. Abbadi",
  year = "2008",
  institution = "Royal Holloway, University of London",
  month = "Jul",
  note = "http://www.ma.rhul.ac.uk/tech",
  number = "{RHUL-MA}-2008-17",
  pages = "262",
}
@inproceedings{DRMTC2008,
  title = "Combining DRM with Trusted Computing for Effective Information Access Management",
  author = "Imad M. Abbadi and Muntaha Alawneh",
  year = "2008",
  booktitle = "Proceedings of the 2nd Workshop on Practice and Theory of IT Security, Montreal-Canada",
  month = "Jan",
  publisher = "IEEE",
}
@inproceedings{springerlink:10.1007/978-0-387-09699-5_33,
  title = "Software Licence Protection and Management for Organisations",
  author = "Alawneh, Muntaha and Abbadi, Imad",
  year = "2008",
  affiliation = "University of London Information Security Group, Royal Holloway Egham Surrey, TW20 0EX UK",
  booktitle = "Proceedings of The Ifip Tc 11 23<sup>rd</sup> International Information Security Conference",
  editor = "Jajodia, Sushil and Samarati, Pierangela and Cimato, Stelvio",
  pages = "509-523",
  publisher = "Springer Boston",
  series = "IFIP International Federation for Information Processing",
  volume = "278",
}
@inproceedings{PreventingInsiderLeakage2008,
  title = "Preventing Insider Information Leakage for Enterprises",
  author = "Imad M. Abbadi and Muntaha Alawneh",
  year = "2008",
  booktitle = "Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies",
  publisher = "IEEE",
}
@inproceedings{SharingbutProtecting2008,
  title = "Sharing but Protecting Content Against Internal Leakage for Organisations",
  author = "Muntaha Alawneh and Imad M. Abbadi",
  year = "2008",
  booktitle = "DAS 2008",
  pages = "238--253",
  publisher = "Springer-Verlag, Berlin",
  series = "Lecture Notes in Computer Science",
  volume = "5094",
}
@inproceedings{DRM-LBS,
  title = "Authorised Domain Management using Location Based Services",
  author = "Imad M. Abbadi",
  year = "2007",
  booktitle = "Mobility '07: proceedings of the 4th International Conference on Mobile Technology, Applications \& Systems",
  editor = "Adrian David Cheak and Peter H J Chong and Winston Seah and Shum Ping",
  month = "Sep",
  pages = "288--295",
  publisher = "ACM Press, NY",
}
@inproceedings{DRM-Mobile,
  title = "Digital Rights Management using a Mobile Phone",
  author = "Imad M. Abbadi and Chris Mitchell",
  year = "2007",
  booktitle = "ICEC '07: Proceedings of the ninth international conference on Electronic commerce",
  month = "Aug",
  pages = "185--194",
  publisher = "ACM Press, NY",
}
@inproceedings{DRM-MCD,
  title = "Digital Rights Management using a Master Control Device",
  author = "Imad M. Abbadi",
  year = "2007",
  booktitle = "ASIAN '07: Proceedings of the 12th Annual Asian Computing Science Conference Focusing on Computer and Network Security",
  editor = "I. Cervesato",
  month = "Dec",
  pages = "126--141",
  publisher = "Springer-Verlag, Berlin",
  series = "Lecture Notes in Computer Science",
  volume = "4846",
}
@inproceedings{DigitalAssetProtection2006-A,
  title = "Digital Asset Protection in Personal Private Networks",
  author = "Imad M. Abbadi",
  year = "2006",
  booktitle = "8th International Symposium on Systems and Information Security (SSI 2006), Sao Jose dos Campos, Sao Paulo, Brazil",
  month = "Nov",
}