KTH-SEECS Applied Information Security Lab

National University of Sciences and Technology (NUST)

Book Chapters


Hirra Anwar, M. Awais Shibli & Umme Habiba (2016) "An Extensible Identity Management Framework for Cloud-Based E-Government Systems", In: Z. Mahmood (Ed.), Cloud Computing Technologies for Connected Government (pp. 163-187). Hershey, PA: , doi:10.4018/978-1-4666-8629-8.ch007

Awais Shibli, Rahat Masood, Umme Habiba, Ayesha Kanwal, Yumna Ghazi, Rafia Mumtaz (2014), "Access Control as a Service in Cloud: Challenges, Impact and Strategies", In: Continued Rise of the Cloud: Advances and Trends in Cloud Computing, Springer.

Faria Mehak, Rahat Masood, Yumna Ghazi, Awais Shibli and Sharifullah Khan, "Security Aspects of Database as a Service (DBaaS) in Cloud Computing", Cloud Computing: Challenges, Limitations and Solutions 2014.

Umme Habiba, Rahat Masood, Muhammad Awais Shibli, "Secure Identity Management System for Federated Cloud Environment", Studies in Computational Intelligence, Springer, 2014.

Rahat Masood, Muhammad Awais Shibli, and Abdul Ghafoor. "Fine-Grained Access Control in Object-Oriented Databases." In Future Information Technology, pp. 133-138. Springer Berlin Heidelberg, 2014.

Muhammad Kazim, Rahat Masood, Muhammad Awais Shibli, and Abdul Ghafoor Abbasi. "Security Aspects of Virtualization in Cloud Computing." In Computer Information Systems and Industrial Management, pp. 229-240. Springer Berlin Heidelberg, 2013.

Rahat Masood, Muhammad Awais Shibli, and Muhammad Bilal. "Usage control model specification in XACML policy language." In Computer Information Systems and Industrial Management, pp. 68-79. Springer Berlin Heidelberg, 2012.

Shahzad Saleem, Oliver Popov, Appiah Kubi "Evaluating and Comparing Tools for Mobile Device Forensics using Quantitative Analysis", Digit. Forensics Cyber Crime, Lect. Notes Inst. Comput. Sci. Soc. Informatics Telecommun. Eng., vol. 114, pp. 264-282, 2013.

Shahzad Saleem, Oliver Popov "Formal Approach for the Selection of a Right Tool for Mobile Device Forensics", Digit. Forensics Cyber Crime, Lect. Notes Inst. Comput. Sci. Soc. Informatics Telecommun. Eng., 2013.

Hirra Anwar and Muhammad Awais Shibli. "Comparative Analysis of Group Centric Access Control Models." In Emerging Trends and Applications in Information Communication Technologies, pp. 110-121. Springer Berlin Heidelberg, 2012.

 

Shahzad Saleem, Oliver Popov, "Protecting Digital Evidence Integrity by Using Smart Cards", Digit. Forensics Cyber Crime, Lect. Notes Inst. Comput. Sci. Soc. Informatics Telecommunications Engg., vol. 53, pp. 110-119, 2011.