10 results

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

Conference Proceeding
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2022)
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. In IEEE SINCONF: 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699366
Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can...

Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems

Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. (2021)
Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. In 2021 5th Cyber Security in Networking Conference (CSNet). https://doi.org/10.1109/csnet52717.2021.9614646
The Session Initiation Protocol (SIP) is the principal signalling protocol in Voice over IP (VoIP) systems, responsible for initialising, terminating, and maintaining sessions...

A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data

Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. J. (2021)
A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data. In 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS). https://doi.org/10.1109/coins51742.2021.9524172
Recent years have seen an increase in medical big data, which can be attributed to a paradigm shift experienced in medical data sharing induced by the growth of medical techno...

PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism

Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Buchanan, W. (2020)
PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism. In ICVISP 2020: Proceedings of the 2020 4th International Conference on Vision, Image and Signal Processing. https://doi.org/10.1145/3448823.3448875
The original consensus algorithm-Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ether...

Trust-based Ecosystem to Combat Fake News

Conference Proceeding
Jaroucheh, Z., Alissa, M., & Buchanan, W. J. (2020)
Trust-based Ecosystem to Combat Fake News. https://doi.org/10.1109/icbc48266.2020.9169435
The growing spread of misinformation and dis-information has grave political, social, ethical, and privacy implications for society. Therefore, there is an ethical need to com...

Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications

Conference Proceeding
Jaroucheh, Z., Liu, X., Smith, S., & Zhao, H. (2011)
Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications. In 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (COMPSACW),, 351-355. doi:10.1109/compsacw.2011.65
Protecting user's privacy is one of the main concerns for the deployment of pervasive computing systems in the real world. In pervasive environments, the user context informat...

Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications

Conference Proceeding
Jaroucheh, Z., Liu, X., & Smith, S. (2010)
Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications. In Proceedings of IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technologies (WI-IAT 2010), 611-614. doi:10.1109/wi-iat.2010.25
Context-aware computing is widely accepted as a promising paradigm to enable seamless computing. Several middlewares and ontology-based models for describing context informati...

Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes

Conference Proceeding
Jaroucheh, Z., Liu, X., & Smith, S. (2010)
Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes. In Proceedings of The 8th IEEE International Conference on Web Services (ICWS’10), 219-226. doi:10.1109/icws.2010.16
Context-awareness and adaptability are important and desirable properties of service-based processes designed to provide personalized services. Most of the existing approaches...

CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications

Conference Proceeding
Jaroucheh, Z., Liu, X., & Smith, S. (2010)
CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications. In CICIS'10 Proceedings, (209-216). https://doi.org/10.1109/cisis.2010.21
In a pervasive environment, it is essential for computing applications to be context-aware. However, one of the major challenges is the establishment of a generic and dynamic ...

A Perspective on Middleware-Oriented Context-Aware Pervasive Systems

Conference Proceeding
Jaroucheh, Z., Liu, X., & Smith, S. (2008)
A Perspective on Middleware-Oriented Context-Aware Pervasive Systems. In Proceedings - International Computer Software and Applications Conference, 249-254. doi:10.1109/compsac.2009.142
The evolving concepts of mobile computing, context-awareness, and ambient intelligence are increasingly influencing user's experience of services. Therefore, the goal of this ...