Imad M. Abbadi : Publications
-
[1]
Towards Trustworthy Resource Scheduling in Clouds (to appear)
Imad M. Abbadi and Anbang Ruan
In IEEE Transactions on Information Forensics & Security. June, 2013.
Details about Towards Trustworthy Resource Scheduling in Clouds (to appear) | BibTeX data for Towards Trustworthy Resource Scheduling in Clouds (to appear)
-
[2]
A framework for establishing trust in the Cloud
Imad M. Abbadi and Muntaha Alawneh
In Computers and Electrical Engineering Journal. Vol. 38. Pages 1073–1087. September, 2012.
Details about A framework for establishing trust in the Cloud | BibTeX data for A framework for establishing trust in the Cloud
-
[3]
Clouds Trust Anchors
Imad M. Abbadi
In The 11th IEEE International Conference on Trust‚ Security and Privacy in Computing and Communications (IEEE TrustCom−11). IEEE. June, 2012.
Details about Clouds Trust Anchors | BibTeX data for Clouds Trust Anchors
-
[4]
TClouds: Privacy and Resilience for Internet−scale Critical Infrastructures
Alysson Bessani‚ Imad M. Abbadi‚ Sven Bugiel‚ Emanuele Cesena‚ Mina Deng‚ Michael Gr�ne‚ Ninja Marnau‚ Stefan N�rnberger‚ Marcelo Pasin and Norbert Schirmer
In Dana Petcu and JoseLuis Vasquez Poletti, editors, European Research Activities in Cloud Computing. Chapter 6. Pages 160–186. Cambridge Scholars Publishing. March, 2012.
Details about TClouds: Privacy and Resilience for Internet−scale Critical Infrastructures | BibTeX data for TClouds: Privacy and Resilience for Internet−scale Critical Infrastructures
-
[5]
A framework for establishing trust in Cloud provenance
Imad M. Abbadi
In International Journal of Information Security. Vol. 11. Pages 1–18. November, 2012.
Details about A framework for establishing trust in Cloud provenance | BibTeX data for A framework for establishing trust in Cloud provenance
-
[6]
Middleware Services at Cloud Virtual Layer
Imad M. Abbadi
In DSOC 2011: Proceedings of the 2nd International Workshop on Dependable Service−Oriented and Cloud computing . IEEE Computer Society. August, 2011.
Details about Middleware Services at Cloud Virtual Layer | BibTeX data for Middleware Services at Cloud Virtual Layer
-
[7]
Clouds' Infrastructure Taxonomy‚ Properties‚ and Management Services
Imad M. Abbadi
In CloudComp '11: Proceeding of the International workshop on Cloud Computing: Architecture‚ Algorithms and Applications. Springer−Verlag. July, 2011.
Details about Clouds' Infrastructure Taxonomy‚ Properties‚ and Management Services | BibTeX data for Clouds' Infrastructure Taxonomy‚ Properties‚ and Management Services
-
[8]
Operational Trust in Clouds' Environment
Imad M. Abbadi
In MoCS 2011: Proceedings of the Workshop on Management of Cloud Systems. Pages 141–145. IEEE Computer Society. June, 2011.
Details about Operational Trust in Clouds' Environment | BibTeX data for Operational Trust in Clouds' Environment
-
[9]
Toward Trustworthy Clouds' Internet Scale Critical Infrastructure
Imad M. Abbadi
In ISPEC '11: Proceedings of the 7th Information Security Practice and Experience Conference. Springer−Verlag‚ Berlin. June, 2011.
Details about Toward Trustworthy Clouds' Internet Scale Critical Infrastructure | BibTeX data for Toward Trustworthy Clouds' Internet Scale Critical Infrastructure
-
[10]
Self−Managed Services Conceptual Model in Trustworthy Clouds' Infrastructure
Imad M. Abbadi
In Workshop on Cryptography and Security in Clouds. IBM‚ Zurich. March, 2011.
http://www.zurich.ibm.com/ cca/csc2011/program.html
Details about Self−Managed Services Conceptual Model in Trustworthy Clouds' Infrastructure | BibTeX data for Self−Managed Services Conceptual Model in Trustworthy Clouds' Infrastructure
-
[11]
Insiders Analysis in Cloud Computing Focusing on Home Healthcare System
Imad M. Abbadi‚ Cornelius Namiluko and Andrew Martin
In The 6th International Conference for Internet Technology and Secured Transactions (ICITST−2011). Pages 350–357. IEEE. December, 2011.
Details about Insiders Analysis in Cloud Computing Focusing on Home Healthcare System | BibTeX data for Insiders Analysis in Cloud Computing Focusing on Home Healthcare System
-
[12]
Dynamics of Trust in Clouds — Challenges and Research Agenda
Imad M. Abbadi and Cornelius Namiluko
In The 6th International Conference for Internet Technology and Secured Transactions (ICITST−2011). Pages 110–115. IEEE. December, 2011.
Details about Dynamics of Trust in Clouds — Challenges and Research Agenda | BibTeX data for Dynamics of Trust in Clouds — Challenges and Research Agenda
-
[13]
Secure Virtual Layer Management in Clouds
Imad M. Abbadi‚ Muntaha Alawneh and Andrew Martin
In The 10th IEEE International Conference on Trust‚ Security and Privacy in Computing and Communications (IEEE TrustCom−10). Pages 99–110. IEEE. November, 2011.
Details about Secure Virtual Layer Management in Clouds | BibTeX data for Secure Virtual Layer Management in Clouds
-
[14]
Defining and Analyzing Insiders and their Threats in Organizations
Muntaha Alawneh and Imad M. Abbadi
In The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (IEEE SPIoT 2011). IEEE. November, 2011.
Details about Defining and Analyzing Insiders and their Threats in Organizations | BibTeX data for Defining and Analyzing Insiders and their Threats in Organizations
-
[15]
Secure Virtual Layer Management of Clouds
Imad M. Abbadi‚ Muntaha Alawneh and Andrew Martin
In The 10th IEEE International Conference on Trust‚ Security and Privacy in Computing and Communications (IEEE TrustCom−11). IEEE. November, 2011.
Details about Secure Virtual Layer Management of Clouds | BibTeX data for Secure Virtual Layer Management of Clouds
-
[16]
Trustworthy Middleware Services in the Cloud
Imad M. Abbadi‚ Mina Deng‚ Marco Nalin‚ Andrew Martin‚ Milan Petkovic‚ Ilaria Baroni and Alberto Sanna
In CloudDB'11. ACM Press‚ NY. October, 2011.
Details about Trustworthy Middleware Services in the Cloud | BibTeX data for Trustworthy Middleware Services in the Cloud
-
[17]
Trust in the Cloud
Imad M. Abbadi and Andrew Martin
In Information Security Technical Report. Vol. 16. No. 3–4. Pages 108–114. 2011.
Details about Trust in the Cloud | BibTeX data for Trust in the Cloud
-
[18]
Clouds' Infrastructure Taxonomy‚ Properties‚ and Management Services
Imad M. Abbadi
In Ajith Abraham‚ Jaime Lloret Mauri‚ John F. Buford‚ Junichi Suzuki and Sabu M. Thampi, editors, Advances in Computing and Communications. Vol. 193 of Communications in Computer and Information Science. Pages 406−420. Springer Berlin Heidelberg. 2011.
Details about Clouds' Infrastructure Taxonomy‚ Properties‚ and Management Services | BibTeX data for Clouds' Infrastructure Taxonomy‚ Properties‚ and Management Services
-
[19]
Challenges for Provenance in Cloud Computing
Imad M. Abbadi and John Lyle
In TaPP 2011: Proceedings of the Third USENIX Workshop on the Theory and Practice of Provenance. USENIX. 2011.
Details about Challenges for Provenance in Cloud Computing | BibTeX data for Challenges for Provenance in Cloud Computing | Download (pdf) of Challenges for Provenance in Cloud Computing
-
[20]
Challenges for Provenance in Cloud Computing
Imad M. Abbadi and John Lyle
In in 3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP '11). USENIX Association. 2011.
Details about Challenges for Provenance in Cloud Computing | BibTeX data for Challenges for Provenance in Cloud Computing
-
[21]
Middleware Services at Cloud Application Layer
Imad M. Abbadi
In IWTMP2PS '11: Proceedings of Second International Workshop on Trust Management in P2P Systems. 2011.
Details about Middleware Services at Cloud Application Layer | BibTeX data for Middleware Services at Cloud Application Layer
-
[22]
Secure information sharing for grid computing
Imad M. Abbadi and Muntaha Alawneh
In Security and Communication Networks — John Wiley & Sons‚ Ltd. December, 2009.
Details about Secure information sharing for grid computing | BibTeX data for Secure information sharing for grid computing
-
[23]
Replay Attack of Dynamic Rights within an Authorised Domain
Imad M. Abbadi and Muntaha Alawneh
In Proceedings of the Third International Conference on Emerging Security Information‚ Systems and Technologies. IEEE. 2009.
Details about Replay Attack of Dynamic Rights within an Authorised Domain | BibTeX data for Replay Attack of Dynamic Rights within an Authorised Domain
-
[24]
Preventing Information Leakage between Collaborating Organisations
Muntaha Alawneh and Imad M. Abbadi
In ICEC '08: Proceedings of the tenth international conference on Electronic commerce. Pages 185–194. ACM Press‚ NY. August, 2008.
Details about Preventing Information Leakage between Collaborating Organisations | BibTeX data for Preventing Information Leakage between Collaborating Organisations
-
[25]
DRM Domain Authentication using Electronic Payment Systems
Imad M. Abbadi and Muntaha Alawneh
In ICEC '08: Proceedings of the tenth international conference on Electronic commerce. Pages 185–194. ACM Press‚ NY. August, 2008.
Details about DRM Domain Authentication using Electronic Payment Systems | BibTeX data for DRM Domain Authentication using Electronic Payment Systems
-
[26]
Digital Rights Management for Personal Networks
Imad M. Abbadi
No. RHUL−MA−2008−17. Royal Holloway‚ University of London. July, 2008.
http://www.ma.rhul.ac.uk/tech
Details about Digital Rights Management for Personal Networks | BibTeX data for Digital Rights Management for Personal Networks
-
[27]
Combining DRM with Trusted Computing for Effective Information Access Management
Imad M. Abbadi and Muntaha Alawneh
In Proceedings of the 2nd Workshop on Practice and Theory of IT Security‚ Montreal−Canada. IEEE. January, 2008.
Details about Combining DRM with Trusted Computing for Effective Information Access Management | BibTeX data for Combining DRM with Trusted Computing for Effective Information Access Management
-
[28]
Software Licence Protection and Management for Organisations
Muntaha Alawneh and Imad Abbadi
In Sushil Jajodia‚ Pierangela Samarati and Stelvio Cimato, editors, Proceedings of The Ifip Tc 11 23rd International Information Security Conference. Vol. 278 of IFIP International Federation for Information Processing. Pages 509−523. Springer Boston. 2008.
Details about Software Licence Protection and Management for Organisations | BibTeX data for Software Licence Protection and Management for Organisations
-
[29]
Preventing Insider Information Leakage for Enterprises
Imad M. Abbadi and Muntaha Alawneh
In Proceedings of the Second International Conference on Emerging Security Information‚ Systems and Technologies. IEEE. 2008.
Details about Preventing Insider Information Leakage for Enterprises | BibTeX data for Preventing Insider Information Leakage for Enterprises
-
[30]
Sharing but Protecting Content Against Internal Leakage for Organisations
Muntaha Alawneh and Imad M. Abbadi
In DAS 2008. Vol. 5094 of Lecture Notes in Computer Science. Pages 238–253. Springer−Verlag‚ Berlin. 2008.
Details about Sharing but Protecting Content Against Internal Leakage for Organisations | BibTeX data for Sharing but Protecting Content Against Internal Leakage for Organisations
-
[31]
Authorised Domain Management using Location Based Services
Imad M. Abbadi
In Adrian David Cheak‚ Peter H J Chong‚ Winston Seah and Shum Ping, editors, Mobility '07: proceedings of the 4th International Conference on Mobile Technology‚ Applications Applications & Systems. Pages 288–295. ACM Press‚ NY. September, 2007.
Details about Authorised Domain Management using Location Based Services | BibTeX data for Authorised Domain Management using Location Based Services
-
[32]
Digital Rights Management using a Mobile Phone
Imad M. Abbadi and Chris Mitchell
In ICEC '07: Proceedings of the ninth international conference on Electronic commerce. Pages 185–194. ACM Press‚ NY. August, 2007.
Details about Digital Rights Management using a Mobile Phone | BibTeX data for Digital Rights Management using a Mobile Phone
-
[33]
Digital Rights Management using a Master Control Device
Imad M. Abbadi
In I. Cervesato, editor, ASIAN '07: Proceedings of the 12th Annual Asian Computing Science Conference Focusing on Computer and Network Security. Vol. 4846 of Lecture Notes in Computer Science. Pages 126–141. Springer−Verlag‚ Berlin. December, 2007.
Details about Digital Rights Management using a Master Control Device | BibTeX data for Digital Rights Management using a Master Control Device
-
[34]
Digital Asset Protection in Personal Private Networks
Imad M. Abbadi
In 8th International Symposium on Systems and Information Security (SSI 2006)‚ Sao Jose dos Campos‚ Sao Paulo‚ Brazil. November, 2006.
Details about Digital Asset Protection in Personal Private Networks | BibTeX data for Digital Asset Protection in Personal Private Networks