Imad M. Abbadi : Publications
Click here to download all publications in a single bibtex file
@article{TowardsTrustworthy2013,
title = "Towards Trustworthy Resource Scheduling in Clouds (to appear)",
author = "Imad M. Abbadi and Anbang Ruan",
year = "2013",
journal = "IEEE Transactions on Information Forensics \& Security",
month = "Jun",
publisher = "IEEE",
}
@article{CloudTrustFramework2012,
title = "A framework for establishing trust in the Cloud",
author = "Imad M. Abbadi and Muntaha Alawneh",
year = "2012",
journal = "Computers and Electrical Engineering Journal",
month = "Sep",
pages = "1073--1087",
publisher = "Springer-Verlag, Berlin",
volume = "38",
}
@inproceedings{CloudsTrustAnchors2012,
title = "Clouds Trust Anchors",
author = "Imad M. Abbadi",
year = "2012",
booktitle = "The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11) ",
month = "Jun",
publisher = "IEEE",
}
@incollection{5608,
title = "{TClouds: Privacy and Resilience for Internet-scale Critical Infrastructures}",
author = "Alysson Bessani and Imad M. Abbadi and Sven Bugiel and Emanuele Cesena and Mina Deng and Michael Gr�ne and Ninja Marnau and Stefan N�rnberger and Marcelo Pasin and Norbert Schirmer",
year = "2012",
booktitle = "European Research Activities in Cloud Computing",
chapter = "6",
editor = "Dana Petcu and JoseLuis Vasquez Poletti",
month = "March",
pages = "160--186",
publisher = "Cambridge Scholars Publishing",
}
@article{CloudProvenanceTrust2012,
title = "A framework for establishing trust in Cloud provenance",
author = "Imad M. Abbadi",
year = "2012",
journal = "International Journal of Information Security",
month = "Nov",
pages = "1--18",
publisher = "Springer-Verlag, Berlin",
volume = "11",
}
@inproceedings{CloudMiddlewareVirtual2011,
title = "{Middleware Services at Cloud Virtual Layer}",
author = "Imad M. Abbadi",
year = "2011",
booktitle = "{DSOC 2011: Proceedings of the 2nd International Workshop on Dependable Service-Oriented and Cloud computing }",
month = "Aug",
publisher = "IEEE Computer Society",
}
@inproceedings{CloudInfrastructureManagement2011,
title = "{Clouds' Infrastructure Taxonomy, Properties, and Management Services}",
author = "Imad M. Abbadi",
year = "2011",
booktitle = "{CloudComp '11: Proceeding of the International workshop on Cloud Computing: Architecture, Algorithms and Applications}",
month = "Jul",
publisher = "Springer-Verlag",
series = "LNCS",
}
@inproceedings{operationalTrust2011,
title = "Operational Trust in Clouds' Environment",
author = "Imad M. Abbadi",
year = "2011",
booktitle = "{MoCS 2011: Proceedings of the Workshop on Management of Cloud Systems}",
month = "Jun",
pages = "141--145",
publisher = "IEEE Computer Society",
}
@inproceedings{4615,
title = "Toward Trustworthy Clouds' Internet Scale Critical Infrastructure",
author = "Imad M. Abbadi",
year = "2011",
booktitle = "ISPEC '11: Proceedings of the 7th Information Security Practice and Experience Conference",
month = "Jun",
publisher = "Springer-Verlag, Berlin",
series = "Lecture Notes in Computer Science",
}
@inproceedings{SelfManagedMar2011,
title = "{Self-Managed Services Conceptual Model in Trustworthy Clouds' Infrastructure}",
author = "Imad M. Abbadi",
year = "2011",
booktitle = "Workshop on Cryptography and Security in Clouds",
month = "Mar",
note = "http://www.zurich.ibm.com/~cca/csc2011/program.html",
publisher = "{IBM}, Zurich",
}
@inproceedings{insidersanalysis2011,
title = "Insiders Analysis in Cloud Computing Focusing on Home Healthcare System",
author = "Imad M. Abbadi and Cornelius Namiluko and Andrew Martin",
year = "2011",
booktitle = "The 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011)",
month = "Dec",
pages = "350--357",
publisher = "IEEE",
}
@inproceedings{dynamicsoftrust2011,
title = "Dynamics of Trust in Clouds --- Challenges and Research Agenda",
author = "Imad M. Abbadi and Cornelius Namiluko",
year = "2011",
booktitle = "The 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011)",
month = "Dec",
pages = "110--115",
publisher = "IEEE",
}
@inproceedings{SecureVirtualLayerManagement2011,
title = "Secure Virtual Layer Management in Clouds",
author = "Imad M. Abbadi and Muntaha Alawneh and Andrew Martin",
year = "2011",
booktitle = "The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-10)",
month = "Nov",
pages = "99--110",
publisher = "IEEE",
}
@inproceedings{insiderdefinition2011,
title = "Defining and Analyzing Insiders and their Threats in Organizations",
author = "Muntaha Alawneh and Imad M. Abbadi",
year = "2011",
booktitle = "The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (IEEE SPIoT 2011)",
month = "Nov",
publisher = "IEEE",
}
@inproceedings{SecureVirtualLayerManagement2011,
title = "Secure Virtual Layer Management of Clouds",
author = "Imad M. Abbadi and Muntaha Alawneh and Andrew Martin",
year = "2011",
booktitle = "The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11) ",
month = "Nov",
publisher = "IEEE",
}
@inproceedings{TrustworthyMiddleware,
title = "{Trustworthy Middleware Services in the Cloud}",
author = "Imad M. Abbadi and Mina Deng and Marco Nalin and Andrew Martin and Milan Petkovic and Ilaria Baroni and Alberto Sanna",
year = "2011",
booktitle = "CloudDB'11",
month = "Oct",
publisher = "ACM Press, NY",
}
@article{TrustInClouds2011,
title = "Trust in the Cloud",
author = "Imad M. Abbadi and Andrew Martin",
year = "2011",
journal = "Information Security Technical Report",
number = "3--4",
pages = "108--114",
volume = "16",
}
@inproceedings{CloudInfrastructureManagement2011,
title = "Clouds' Infrastructure Taxonomy, Properties, and Management Services",
author = "Abbadi, Imad M.",
year = "2011",
booktitle = "Advances in Computing and Communications",
editor = "Abraham, Ajith and Mauri, Jaime Lloret and Buford, John F. and Suzuki, Junichi and Thampi, Sabu M.",
pages = "406-420",
publisher = "Springer Berlin Heidelberg",
series = "Communications in Computer and Information Science",
volume = "193",
}
@inproceedings{AbbadiLyle2011,
title = "Challenges for Provenance in Cloud Computing",
author = "Imad M. Abbadi and John Lyle",
year = "2011",
booktitle = "TaPP 2011: Proceedings of the Third USENIX Workshop on the Theory and Practice of Provenance",
publisher = "USENIX",
url = "http://www.usenix.org/event/tapp11/tech/final_files/Abbadi.pdf",
}
@inproceedings{ProvenanceCloud2011,
title = "Challenges for Provenance in Cloud Computing",
author = "Imad M. Abbadi and John Lyle",
year = "2011",
booktitle = "in {3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP '11)}",
publisher = "USENIX Association",
}
@inproceedings{CloudMiddleware2011,
title = "{Middleware Services at Cloud Application Layer}",
author = "Imad M. Abbadi",
year = "2011",
booktitle = "{IWTMP2PS} '11: Proceedings of Second International Workshop on Trust Management in P2P Systems",
}
@article{Grid2009,
title = "Secure information sharing for grid computing",
author = "Imad M. Abbadi and Muntaha Alawneh",
year = "2009",
journal = "Security and Communication Networks --- John Wiley \& Sons, Ltd",
month = "Dec",
}
@inproceedings{ReplayAttack2009,
title = "Replay Attack of Dynamic Rights within an Authorised Domain",
author = "Imad M. Abbadi and Muntaha Alawneh",
year = "2009",
booktitle = "Proceedings of the Third International Conference on Emerging Security Information, Systems and Technologies",
publisher = "IEEE",
}
@inproceedings{CollaboratingLeakage2008,
title = "Preventing Information Leakage between Collaborating Organisations",
author = "Muntaha Alawneh and Imad M. Abbadi",
year = "2008",
booktitle = "ICEC '08: Proceedings of the tenth international conference on Electronic commerce",
month = "Aug",
pages = "185--194",
publisher = "ACM Press, NY",
}
@inproceedings{DRM-EPS,
title = "{DRM} Domain Authentication using Electronic Payment Systems",
author = "Imad M. Abbadi and Muntaha Alawneh",
year = "2008",
booktitle = "ICEC '08: Proceedings of the tenth international conference on Electronic commerce",
month = "Aug",
pages = "185--194",
publisher = "ACM Press, NY",
}
@techreport{PhDThesis,
title = "Digital Rights Management for Personal Networks",
author = "Imad M. Abbadi",
year = "2008",
institution = "Royal Holloway, University of London",
month = "Jul",
note = "http://www.ma.rhul.ac.uk/tech",
number = "{RHUL-MA}-2008-17",
pages = "262",
}
@inproceedings{DRMTC2008,
title = "Combining DRM with Trusted Computing for Effective Information Access Management",
author = "Imad M. Abbadi and Muntaha Alawneh",
year = "2008",
booktitle = "Proceedings of the 2nd Workshop on Practice and Theory of IT Security, Montreal-Canada",
month = "Jan",
publisher = "IEEE",
}
@inproceedings{springerlink:10.1007/978-0-387-09699-5_33,
title = "Software Licence Protection and Management for Organisations",
author = "Alawneh, Muntaha and Abbadi, Imad",
year = "2008",
affiliation = "University of London Information Security Group, Royal Holloway Egham Surrey, TW20 0EX UK",
booktitle = "Proceedings of The Ifip Tc 11 23<sup>rd</sup> International Information Security Conference",
editor = "Jajodia, Sushil and Samarati, Pierangela and Cimato, Stelvio",
pages = "509-523",
publisher = "Springer Boston",
series = "IFIP International Federation for Information Processing",
volume = "278",
}
@inproceedings{PreventingInsiderLeakage2008,
title = "Preventing Insider Information Leakage for Enterprises",
author = "Imad M. Abbadi and Muntaha Alawneh",
year = "2008",
booktitle = "Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies",
publisher = "IEEE",
}
@inproceedings{SharingbutProtecting2008,
title = "Sharing but Protecting Content Against Internal Leakage for Organisations",
author = "Muntaha Alawneh and Imad M. Abbadi",
year = "2008",
booktitle = "DAS 2008",
pages = "238--253",
publisher = "Springer-Verlag, Berlin",
series = "Lecture Notes in Computer Science",
volume = "5094",
}
@inproceedings{DRM-LBS,
title = "Authorised Domain Management using Location Based Services",
author = "Imad M. Abbadi",
year = "2007",
booktitle = "Mobility '07: proceedings of the 4th International Conference on Mobile Technology, Applications \& Systems",
editor = "Adrian David Cheak and Peter H J Chong and Winston Seah and Shum Ping",
month = "Sep",
pages = "288--295",
publisher = "ACM Press, NY",
}
@inproceedings{DRM-Mobile,
title = "Digital Rights Management using a Mobile Phone",
author = "Imad M. Abbadi and Chris Mitchell",
year = "2007",
booktitle = "ICEC '07: Proceedings of the ninth international conference on Electronic commerce",
month = "Aug",
pages = "185--194",
publisher = "ACM Press, NY",
}
@inproceedings{DRM-MCD,
title = "Digital Rights Management using a Master Control Device",
author = "Imad M. Abbadi",
year = "2007",
booktitle = "ASIAN '07: Proceedings of the 12th Annual Asian Computing Science Conference Focusing on Computer and Network Security",
editor = "I. Cervesato",
month = "Dec",
pages = "126--141",
publisher = "Springer-Verlag, Berlin",
series = "Lecture Notes in Computer Science",
volume = "4846",
}
@inproceedings{DigitalAssetProtection2006-A,
title = "Digital Asset Protection in Personal Private Networks",
author = "Imad M. Abbadi",
year = "2006",
booktitle = "8th International Symposium on Systems and Information Security (SSI 2006), Sao Jose dos Campos, Sao Paulo, Brazil",
month = "Nov",
}