13 results

Footsteps in the fog: Certificateless fog-based access control

Journal Article
Frimpong, E., Michalas, A., & Ullah, A. (2022)
Footsteps in the fog: Certificateless fog-based access control. Computers and Security, 121, Article 102866. https://doi.org/10.1016/j.cose.2022.102866
The proliferating adoption of the Internet of Things (IoT) paradigm has fuelled the need for more efficient and resilient access control solutions that aim to prevent unauthor...

Toward a reference architecture based science gateway framework with embedded e‐learning support

Journal Article
Pierantoni, G., Kiss, T., Bolotov, A., Kagialis, D., DesLauriers, J., Ullah, A., …Gesing, S. (in press)
Toward a reference architecture based science gateway framework with embedded e‐learning support. Concurrency and Computation: Practice and Experience, https://doi.org/10.1002/cpe.6872
Science gateways have been widely utilized by a large number of user communities to simplify access to complex distributed computing infrastructures. While science gateways ar...

MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum

Journal Article
Ullah, A., Dagdeviren, H., Ariyattu, R. C., DesLauriers, J., Kiss, T., & Bowden, J. (2021)
MiCADO-Edge: Towards an Application-level Orchestrator for the Cloud-to-Edge Computing Continuum. Journal of Grid Computing, 19(4), Article 47. https://doi.org/10.1007/s10723-021-09589-5
Automated deployment and run-time management of microservices-based applications in cloud computing environments is relatively well studied with several mature solutions. Howe...

(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption

Conference Proceeding
Bakas, A., Michalas, A., & Ullah, A. (2021)
(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption. In Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event, November 23--24, 2020, Proceedings 25 (111-126). https://doi.org/10.1007/978-3-030-70852-8_7
Functional Encryption (FE) allows users who hold a specific secret key (known as the functional key) to learn a specific function of encrypted data whilst learning nothing abo...

Cloud apps to‐go: Cloud portability with TOSCA and MiCADO

Journal Article
DesLauriers, J., Kiss, T., Ariyattu, R. C., Dang, H., Ullah, A., Bowden, J., …Terstyanszky, G. (2021)
Cloud apps to‐go: Cloud portability with TOSCA and MiCADO. Concurrency and Computation: Practice and Experience, 33(19), https://doi.org/10.1002/cpe.6093
As cloud adoption increases, so do the number of available cloud service providers. Moving complex applications between clouds can be beneficial—or other times necessary—but a...

Attribute-Based Symmetric Searchable Encryption

Conference Proceeding
Dang, H., Ullah, A., Bakas, A., & Michalas, A. (2020)
Attribute-Based Symmetric Searchable Encryption. In Applied Cryptography and Network Security Workshops (318-336). https://doi.org/10.1007/978-3-030-61638-0_18
Symmetric Searchable Encryption (SSE) is an encryption technique that allows users to search directly on their outsourced encrypted data while preserving the privacy of both t...

Design and evaluation of a biologically-inspired cloud elasticity framework

Journal Article
Ullah, A., Li, J., & Hussain, A. (2020)
Design and evaluation of a biologically-inspired cloud elasticity framework. Cluster Computing, 23, 3095-3117. https://doi.org/10.1007/s10586-020-03073-7
The elasticity in cloud is essential to the effective management of computational resources as it enables readjustment at runtime to meet application demands. Over the years, ...

Towards workload-aware cloud resource provisioning using a multi-controller fuzzy switching approach

Journal Article
Ullah, A., Li, J., & Hussain, A. (2018)
Towards workload-aware cloud resource provisioning using a multi-controller fuzzy switching approach. International Journal of High Performance Computing and Networking, 12(1), 13-25. https://doi.org/10.1504/IJHPCN.2018.093838
Elasticity enables cloud customers to enrich their applications to dynamically adjust underlying cloud resources. Over the past, a plethora of techniques have been introduced ...

A control theoretical view of cloud elasticity: taxonomy, survey and challenges

Journal Article
Ullah, A., Li, J., Shen, Y., & Hussain, A. (2018)
A control theoretical view of cloud elasticity: taxonomy, survey and challenges. Cluster Computing, 21(4), 1735-1764. https://doi.org/10.1007/s10586-018-2807-6
The lucrative features of cloud computing such as pay-as-you-go pricing model and dynamic resource provisioning (elasticity) attract clients to host their applications over th...

Genetic optimization of fuzzy membership functions for cloud resource provisioning

Conference Proceeding
Ullah, A., Li, J., Hussain, A., & Shen, Y. (2017)
Genetic optimization of fuzzy membership functions for cloud resource provisioning. https://doi.org/10.1109/SSCI.2016.7850088
The successful usage of fuzzy systems can be seen in many application domains owing to their capabilities to model complex systems by exploiting knowledge of domain experts. T...

Date


Date


Date


Date