Imad M. Abbadi : Publications
-
[1]
A framework for establishing trust in Cloud provenance
Imad M. Abbadi
In International Journal of Information Security. Vol. 11. Pages 1–18. November, 2012.
Details about A framework for establishing trust in Cloud provenance | BibTeX data for A framework for establishing trust in Cloud provenance
-
[2]
A framework for establishing trust in the Cloud
Imad M. Abbadi and Muntaha Alawneh
In Computers and Electrical Engineering Journal. Vol. 38. Pages 1073–1087. September, 2012.
Details about A framework for establishing trust in the Cloud | BibTeX data for A framework for establishing trust in the Cloud
-
[3]
Authorised Domain Management using Location Based Services
Imad M. Abbadi
In Adrian David Cheak‚ Peter H J Chong‚ Winston Seah and Shum Ping, editors, Mobility '07: proceedings of the 4th International Conference on Mobile Technology‚ Applications Applications & Systems. Pages 288–295. ACM Press‚ NY. September, 2007.
Details about Authorised Domain Management using Location Based Services | BibTeX data for Authorised Domain Management using Location Based Services
-
[4]
Challenges for Provenance in Cloud Computing
Imad M. Abbadi and John Lyle
In TaPP 2011: Proceedings of the Third USENIX Workshop on the Theory and Practice of Provenance. USENIX. 2011.
Details about Challenges for Provenance in Cloud Computing | BibTeX data for Challenges for Provenance in Cloud Computing | Download (pdf) of Challenges for Provenance in Cloud Computing
-
[5]
Challenges for Provenance in Cloud Computing
Imad M. Abbadi and John Lyle
In in 3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP '11). USENIX Association. 2011.
Details about Challenges for Provenance in Cloud Computing | BibTeX data for Challenges for Provenance in Cloud Computing
-
[6]
Clouds Trust Anchors
Imad M. Abbadi
In The 11th IEEE International Conference on Trust‚ Security and Privacy in Computing and Communications (IEEE TrustCom−11). IEEE. June, 2012.
Details about Clouds Trust Anchors | BibTeX data for Clouds Trust Anchors
-
[7]
Clouds' Infrastructure Taxonomy‚ Properties‚ and Management Services
Imad M. Abbadi
In Ajith Abraham‚ Jaime Lloret Mauri‚ John F. Buford‚ Junichi Suzuki and Sabu M. Thampi, editors, Advances in Computing and Communications. Vol. 193 of Communications in Computer and Information Science. Pages 406−420. Springer Berlin Heidelberg. 2011.
Details about Clouds' Infrastructure Taxonomy‚ Properties‚ and Management Services | BibTeX data for Clouds' Infrastructure Taxonomy‚ Properties‚ and Management Services
-
[8]
Combining DRM with Trusted Computing for Effective Information Access Management
Imad M. Abbadi and Muntaha Alawneh
In Proceedings of the 2nd Workshop on Practice and Theory of IT Security‚ Montreal−Canada. IEEE. January, 2008.
Details about Combining DRM with Trusted Computing for Effective Information Access Management | BibTeX data for Combining DRM with Trusted Computing for Effective Information Access Management
-
[9]
Defining and Analyzing Insiders and their Threats in Organizations
Muntaha Alawneh and Imad M. Abbadi
In The 2011 IEEE International Workshop on Security and Privacy in Internet of Things (IEEE SPIoT 2011). IEEE. November, 2011.
Details about Defining and Analyzing Insiders and their Threats in Organizations | BibTeX data for Defining and Analyzing Insiders and their Threats in Organizations
-
[10]
Digital Asset Protection in Personal Private Networks
Imad M. Abbadi
In 8th International Symposium on Systems and Information Security (SSI 2006)‚ Sao Jose dos Campos‚ Sao Paulo‚ Brazil. November, 2006.
Details about Digital Asset Protection in Personal Private Networks | BibTeX data for Digital Asset Protection in Personal Private Networks
-
[11]
Digital Rights Management for Personal Networks
Imad M. Abbadi
No. RHUL−MA−2008−17. Royal Holloway‚ University of London. July, 2008.
http://www.ma.rhul.ac.uk/tech
Details about Digital Rights Management for Personal Networks | BibTeX data for Digital Rights Management for Personal Networks
-
[12]
Digital Rights Management using a Master Control Device
Imad M. Abbadi
In I. Cervesato, editor, ASIAN '07: Proceedings of the 12th Annual Asian Computing Science Conference Focusing on Computer and Network Security. Vol. 4846 of Lecture Notes in Computer Science. Pages 126–141. Springer−Verlag‚ Berlin. December, 2007.
Details about Digital Rights Management using a Master Control Device | B