KTH-SEECS Applied Information Security Lab

National University of Sciences and Technology (NUST)

Publications


Journals

Ayesha Kanwal, Rahat Masood, Muhammad Awais Shibli, Rafia Mumtaz, "Taxonomy for Trust Models in Cloud Computing", In: The Computer Journal, Oxford journals , 2014. [IF 0.888]

Rahat Masood, Muhammad Awais Shibli, Yumna Ghazi, Ayesha Kanwal, Arshad Ali, "Cloud Authorization: Exploring Techniques and Approach towards Effective Access Control Framework", In: Springer Journal Frontiers of Computer Science, 2014. [IF 0.405]

Umme Habiba, Rahat Masood, Muhammad Awais Shibli and Muaz A Niazi, "Cloud Identity Management Security Issues and Solutions: A Taxonomy", In: Springer Open Journal Complex Adaptive Systems Modeling, 2014.

Maxwell Anobah, Shahzad Saleem and Oliver Popov,"Testing Framework for Mobile Device Forensic Tools", In Journal of Digital Forensics, Security and Law,, vol. 9, no. 2, 2014.

Shahzad Saleem, Ibrahim Bigilli and Oliver Popov,"Quantifying relevance of mobile digital evidence as they relate to case types: A survey and a guide for best practices", In Journal of Digital Forensics, Security and Law,, vol. 9, no.3, 2014.

Muhammad Awais Shibli, Rahat Masood, Yumna Ghazi, Rahat Masood, Sead Muftic, "MagicNET: mobile agents data protection system"Transactions on Emerging Telecommunications Technologies, John Wiley & Sons, Ltd. 2013.[IF 1.354]
 

Faiza Fakher,Barkha Javed, Raihan ur Rasool,Owais Malik, Khurram Zulfiqar "Software level Green Computing for Large Scale Systems", Special Issue of SpringerOpen Journal of Cloud Computing: Advances, Systems and Applications, Volume 1, pp. 1, May, 2012.

Awais Shibli, Alessandro Giambruno and Sead Muftic, "Security Architecture and Methodology for Authorization of Mobile Agents", In , International Journal of Internet Technology and Secured Transactions 2010 - Vol. 2, No.3/4 pp. 271 - 290. November 2010.

Abdul Ghafoor, Sead Muftic, and Gernot Schmölzer, "CryptoNET: A Model of Generic Security Provider", published in International Journal of Internet Technology and Secured Transactions , Vol. 2, Nos. 3/4, pp.321–335, November 2010.

Abdul Ghafoor, Sead Muftic "CryptoNET: Software Protection and Secure Execution Environment", published in International Journal of Computer Science and Network Security (IJCSNS), pp. 19-26, Vol 10, February 2010.

Abdul Ghafoor, Sead Muftic, "CryptoNET: Integrated Secure Workstation" , published in International Journal of Advanced Science and Technology, (IJAST), SERSC, pp. 1-10, Vol 12, November 2009.

Awais Shibli, Jeffy Mwakalinga and Sead Muftic, "The Human Immune System and Network Security System", In: International Journal of Computer Science and Network Security (IJCSNS), Vol 9, No 1, pp 87-94, February 01, 2009.

Book Chapters

Hirra Anwar, M. Awais Shibli & Umme Habiba (2016) "An Extensible Identity Management Framework for Cloud-Based E-Government Systems", In: Z. Mahmood (Ed.), Cloud Computing Technologies for Connected Government (pp. 163-187). Hershey, PA: , doi:10.4018/978-1-4666-8629-8.ch007

Awais Shibli, Rahat Masood, Umme Habiba, Ayesha Kanwal, Yumna Ghazi, Rafia Mumtaz (2014), "Access Control as a Service in Cloud: Challenges, Impact and Strategies", In: Continued Rise of the Cloud: Advances and Trends in Cloud Computing, Springer.

Faria Mehak, Rahat Masood, Yumna Ghazi, Awais Shibli and Sharifullah Khan, "Security Aspects of Database as a Service (DBaaS) in Cloud Computing", Cloud Computing: Challenges, Limitations and Solutions 2014.

Umme Habiba, Rahat Masood, Muhammad Awais Shibli, "Secure Identity Management System for Federated Cloud Environment", Studies in Computational Intelligence, Springer, 2014.

Rahat Masood, Muhammad Awais Shibli, and Abdul Ghafoor. "Fine-Grained Access Control in Object-Oriented Databases." In Future Information Technology, pp. 133-138. Springer Berlin Heidelberg, 2014.

Muhammad Kazim, Rahat Masood, Muhammad Awais Shibli, and Abdul Ghafoor Abbasi. "Security Aspects of Virtualization in Cloud Computing." In Computer Information Systems and Industrial Management, pp. 229-240. Springer Berlin Heidelberg, 2013.

Rahat Masood, Muhammad Awais Shibli, and Muhammad Bilal. "Usage control model specification in XACML policy language." In Computer Information Systems and Industrial Management, pp. 68-79. Springer Berlin Heidelberg, 2012.

Shahzad Saleem, Oliver Popov, Appiah Kubi "Evaluating and Comparing Tools for Mobile Device Forensics using Quantitative Analysis", Digit. Forensics Cyber Crime, Lect. Notes Inst. Comput. Sci. Soc. Informatics Telecommun. Eng., vol. 114, pp. 264-282, 2013.

Shahzad Saleem, Oliver Popov "Formal Approach for the Selection of a Right Tool for Mobile Device Forensics", Digit. Forensics Cyber Crime, Lect. Notes Inst. Comput. Sci. Soc. Informatics Telecommun. Eng., 2013.

Hirra Anwar and Muhammad Awais Shibli. "Comparative Analysis of Group Centric Access Control Models." In Emerging Trends and Applications in Information Communication Technologies, pp. 110-121. Springer Berlin Heidelberg, 2012.

 

Shahzad Saleem, Oliver Popov, "Protecting Digital Evidence Integrity by Using Smart Cards", Digit. Forensics Cyber Crime, Lect. Notes Inst. Comput. Sci. Soc. Informatics Telecommunications Engg., vol. 53, pp. 110-119, 2011.

Conferences





Fowz Masood, Hirra Anwar, Muhammad Awais Shibli, "A Novel Authorization Scheme for Cloud Federation", In Proceedings of the 4th International Multi TopIc Conference, Springer, Feb, 2015, MUET Pakistan

Amir Ali, Umme Habiba, Muhammad Awais Shibli, "Taxonomy of Delegation Model", In 12th International Conference on Information Technology : New Generations, ITNG , April 13-15, 2015, Las Vegas, Nevada, USA



Irfan Azhar, Naveed Ahmed, Abdul Ghafor Abbasi, Adnan Kiani, and Awais Shibli, "Keeping Secret Keys Secret in Open Systems" ,In IEEE 6th Internation Conference on Open Source Systems and Technologies (ICOSST), 18-20 December, 2014.

Shahzad Saleem, Oliver Popov, Ibrahim Bagilli, "Extended Abstract Digital Forensics Model with Preservation and Protection as Umbrella Principles", In Proceedia Computer science, Knowledge-Based and Intelligent Information & Engineering Systems 18th Annual Conference, KES-2014 Gdynia, Poland, September 2014.

Tayyaba Zeb, Abdul Ghafoor, Muhammad Awais Shibli, Muhammad Yousaf, "A Secure Architecture for Inter-Cloud Virtual Machine Migration", In 10th International Conference on Security and Privacy in Communication Networks (SecureComm), Springer, Beijing China, Sept 24- 26, 2014.

Muhammad Awais Shibli, Naveed Ahmad, Ayesha Kanwal, Abdul Ghafoor, "Secure Virtual Machine Migration (SV2M) in Cloud Federation", In: International Conference on Security and Cryptography (SECRYPT), Vienna, Austria,August 28 - 30, 2014.

Shizra Sultan, Abdul Ghafoor Abbasi, Muhammad Awais Shibli, Ali Nasir,  "Secure protocol for Financial Transactions using Smartphones- SPFT Formally proved by AVISPA", In: International Conference on Security and Cryptography (SECRYPT), Vienna,  Austria, August 28 - 30, 2014.

Anam Zahid, Rahat Masood, Muhammad Awais Shibli, Security of Sharded NoSQL Databases: A Comparative Analysis, In Conference on Information Assurance and Cyber Security (CIACS), National University of Sciences and Technology, Military College of Signals, Rawalpindi, Pakistan, June 12 - 13, 2014.

Umme Habiba, Rahat Masood, Muhammad Awais Shibli, and Muaz A. Niazi. "Cloud identity management security issues & solutions: a taxonomy." Complex Adaptive Systems Modeling 2, no. 1 (2014): 1-37.

Umme Habiba, Rahat Masood , Awais Shibli, “Cross-domain Identity Management System for Cloud”, In: 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2014), IEEE, Las Vegas, U.S.A, June 30 - July 2, 2014.

Ayesha Kanwal, Rahat Masood, Muhammad Awais Shibli, “Evaluation and Establishment of Trust in Cloud Federation”, In: International Conference on Ubiquitous Information Management and Communication (IMCOM, 14’) , ACM, SIGAPP, Siem Reap, Cambodia, 9-11 January, 2014.



Naveed Ahmad, Ayesha Kanwal and Muhammad Awais Shibli, "Survey on Secure Live Virtual Machine (VM) Migration in Cloud", In: 2nd National Confrence on Information Assurance 2013 (NCIA-2013), Military College of Signals, Rawalpindi, Pakistan, 11-12 December, 2013.
 

Yasir Mehmood, Umme Habiba, Muhammad Awais Shibli and Rahat Masood, "Intrusion Detection System in Cloud Computing: Challenges and Opportunities", In: 2nd National Conference on Information Assurance 2013 (NCIA-2013), Military College of Signals, Rawalpindi, Pakistan11-12 December, 2013.

Abdul Ghafoor, Misbah Irum, Muhammad Qaisar"User Centric Access Control Policy Management Framework for Cloud Applications", In: 2nd National Confrence on Information Assurance 2013 (NCIA-2013),  Military College of Signals, Rawalpindi, Pakistan11-12 December, 2013.

Umme Habiba, Abdul Ghafoor, Rahat Masood, Muhammad Awais Shibli, “Assessment Criteria for Cloud Identity Management Systems”, In: 19th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), IEEE, Vancouver, British Columbia, Canada, 2-4 December, 2013.

      Muhammad Kazim, Rahat Masood, Muhammad Awais Shibli, Securing the Virtual Machine Images in Cloud Computing, In: 6th International Conference on Security of Information and Networks (SIN), ACM, SIGSAC, Askaray, Turkey, 26-28 November, 2013.

Muhammad Kazim, Rahat Masood, Muhammad Awais Shibli, Abdul Ghafoor Abbasi, Security Aspects of Virtualization in Cloud Computing, In: 12th International Conference on Information Systems and Industrial Management (CISIM), Springer LNCS Series, Krakow, Poland, 25-27 September 2013.

Amna Joyia, Abdul Ghafoor, Maryam Sajjad, Muhammad Qaisar Choudhary, "Secure and Privacy Enhanced Email System as a Cloud Service, In: Eighth International Conference on Digital Information Management (ICDIM), Pakistan, September 10 -12, 2013.
 

Umer Khalid, Abdul Ghafoor, Misbah Irum, Muhammad Awais Shibli, “Cloud based Secure and Privacy Enhanced Authentication & Authorization Protocol”, In: 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems (KES), Elsevier, Kitakyushu, Japan, 9 - 11 September 2013.

Rahat Masood, Muhammad Awais Shibli, "Fine Grained Access Control in Object-Oriented Databases", In:8th FTRA International Conference on Future Information Technologies (FutureTech), Springer LNEE Series, Gwangju, Korea, 4-6 September 2013.

Ayesha Kanwal, Rahat Masood, Ume E Ghazia, Muhammad Awais Shibli, Abdul Ghafoor Abbasi, “Assessment Criteria for Trust Models in Cloud Computing”, In: 9th IEEE International Conference on Green Computing and Communications (GreenCom), IEEE, Beijing, China, 20-23 August, 2013.

Faiza Fakhar, Muhammad Awais Shibli, "Comparative Analysis of Security Mechanisms in Cloud Paradigm" , In:15th International Conference on Advanced Communications Technology (ICACT), Co-sponsored by IEEE, Phoenix Park, PyeongChang, Korea, 27-30 January, 2013.

Faiza Fakhar, Muhammad Awais Shibli, "Management of Symmetric Cryptographic Keys in Cloud Based Environment" , In:15th International Conference on Advanced Communications Technology (ICACT), Co-sponsored by IEEE, Phoenix Park, PyeongChang, Korea, 27-30 January, 2013.



Muhammad Asif, Abdul Ghafoor, "Generic Lightweight Certificate Management Protocol", In: 15th International Multi Topic Conference (INMIC),IEEE Proceedings,pp. 489-495, Islamabad,Pakistan,13-15 December,2012.

Khalid Hafeez,Qasim Rajpoot, Muhammad Awais Shibli,"Interoperability among Access Control Models",In: 15th International Multi Topic Conference (INMIC),IEEE Proceedings,Islamabad,Pakistan,13-15 December,2012.

Hirra Anwar, Sarah Masood, Zahid Anwar,"Pseudorandomness Improved Solitaire Cipher",In: 15th International Multi Topic Conference (INMIC), IEEE Proceedings, Islamabad, Pakistan, 13-15 December,2012.

Faisal Karim Bhutta, Abdul Ghafoor, Shizra Sultan, "Smart Phone based Authentication & Authorization Protocol for SPACS", In:9th International Conference on High Capacity Optical Networks & Emerging Technologies (HONET), Co-sponsored by IEEE, Istanbul, Turkey, 12-14 December , 2012.

Hirra Anwar,Muhammad Awais Shibli, "Attribute based Access Control in DSpace",In: 7th International Conference on Computer Sciences and Convergence Information Technology (ICCIT),IEEE Proceedings,Seoul,Korea,3-5 December,2012.

Um e Ghazia, Rahat Masood, Muhammad Awais Shibli, Muhammad Bilal,"Usage Control Model Specification in XACML Policy Language",In: 11th International Conference on Information Systems and Industrial Management (CISIM),Springer LNCS Series,Venice,Italy,26-28 September,2012.

Imran Shamoon, Qasim Rajpoot, Muhammad Awais Shibli,"Policy Conflict Management using XACML",In: 2nd International Conference on Communication and Information Sciences,IEEE Proceedings,Gyeongju, Korea,27-29 August, 2012

Um e Ghazia, Rahat Masood, Muhammad Awais Shibli, "Comparative Analysis of Access Control Systems on Cloud" ,In: 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD),IEEE Computer Society Proceedings, Kyoto, Japan,8-10 August, 2012

Hirra Anwar, Muhammad Awais Shibli, "Comparative Analysis of Group Centric Access Control Models" ,In: International Multi-topic Conference (IMTIC), Springer- Communications in Computer and Information Science, Jamshoro, Pakistan, 28-30 March, 2012



Shahzad Saleem, Oiver Popov, R. Dahman,"Evaluation of Security Methods for Ensuring the Integrity of Digital Evidence", In International Conference on Innovations in Information Technology, pp.220-225, 25-27 April, 2011.

Appiah Kubi, Shahzad Saleem, Oliver Popov, "Evaluation of some tools for extracting e-evidence from mobile devices", In Application of Information and Communication Technologies, no. 10, pp. 603-608pp, 12-14 October, 2011.

Rahat Masood, Um e Ghaiza, Zahid Anwar, "SWAM:Stuxnet Worm Analysis in Metasploit" , In:Proceedings of the IEEE FIT 2011, 9th International Conference on Frontiers of Information Technology, Islamabad, Pakistan, December, 2011.

Abdul Ghafoor, Sead Muftic, Shahzad Ahmed Mumtaz, "Security Extensions of Windows Environment based on FIPS 201 (PIV) Smart Card" , published in the Proceeding of The World Congress of Internet Security, London, UK, pp. 100-106 February 21-23, 2011.



Abdul Ghafoor, Sead Muftic, "CryptoNET: Security Management Protocols" , published in the Proceeding of The 9th WSEAS International Conference on Data Networks, Communication, Computers (DNCOCO-2010), Faro, Portugal, pp. 15-20, November 3-5, 2010.

Abdul Ghafoor, Sead Muftic, "Web Contents Protection, Secure Execution and Authorized Distribution" , published in the Proceeding of The 5th IEEE International Multi-Conference on Computing in the Global Information Technology (ICCGI-2010), pp. 157-162, Valencia, Spain, September 20-25, 2010.

Awais Shibli, Imran Yousaf and Sead Muftic "Security System for Protection of Mobile Agents", 24th IEEE International Conference on Advanced Information Networking and Applications, Perth, Australia, 20-23 April 2010.

Awais Shibli, Imran Yousaf, Kashif Dar, and Sead Muftic, "Secure Communication Methodology for Mobile Agents" , The 12th IEEE International Conference on Advanced Communication Technology. Phoenix Park Korea, February, 2010.



Alessandro Giambruno, Awais Shibli, Sead Muftic, Antonio Lioy "XACML Authorization Policies for Mobile Agents" , Proceedings of the 4th IEEE International Conference for Internet Technology and Secured Transactions (ICITST-2009) November 9-12, 2009, London, UK.

Abdul Ghafoor, Sead Muftic, Gernot Schmölzer, "A Model and Design of a Security Provider for Java Applications" , published in the proceeding of The International Conference for Internet Technology and Secured Transactions (ICITST-2009), pp. 794-800, London, UK, November 9-12, 2009.

Adrian Baldwin, Chris Dalton, Simon Shiu, Krzysztof Kostienko, Qasim Rajpoot, "Providing secure services for a virtual infrastructure" , SIGOPS Operating Systems Review, Vol. 43, Issue 1, p.44-51, January, 2009.

Abdul Ghafoor, Sead Muftic, Gernot Schmölzer, "CryptoNET: Secure Federation Protocol and Authorization Policies for SMI" , published in the Proceeding of The International Conference on Risks and Security of Internet and Systems 2009 (CRiSIS-2009), pp. 19-26, Toulouse, France, October 19-22, 2009.

Awais Shibli, Sead Muftic, Alessandro Giambruno, Antonio Lioy, "Security System for Development, Validation and Adoption of Mobile Agents", The 3rd IEEE International Conference on Network & System Security, Gold Coast Australia, October 19-21, 2009.

Awais Shibli and Sead Muftic, "Security Architecture for Authorization of Mobile Agents" The 3rd International Conference on Internet Technologies & Applications, Wrexham, North Wales, UK, September 8-11, 2009.

Awais Shibli and Sead Muftic, "Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents" , The 11th IEEE International Conference on Advanced Communication Technology. - Phoenix Park, Korea, February 15-18, 2009.

Awais Shibli, Stirparo Pasquale and Sead Muftic, "Vulnerability Analysis and Patches Management using Secure Mobile Agents", The 11th IEEE International Conference on Advanced Communication Technology. - Phoenix Park Korea, February 15-18, 2009.



Hira Tabbasum, Salma Jabeen, H. Farooq Ahmed, Abdul Ghafoor, "Impact of Aspect-Orientation on the Reliability of Decentralized Multi-Agent System", published in the proceeding of The 4th International Conference on Emerging Technologies, IEEE ICET-2008,, Rawalpindi, Pakistan.

Awais Shibli, Sead Muftic, "Intrusion Detection and Prevention System Using Secure Mobile Agents", published in the proceeding of The The International Conference on Security and Cryptography,, (pp. 76-82),cJuly 2008, Porto Portugal.

Zeeshan Iqbal , Amjad Mehmood , Abdul Ghafoor, "Securing services in Multi Agent System", published in the proceeding of The 1st NC-SSC, May 23-12,2008, Pakistan.

Amjad Mehmood, Abdul Ghafoor, H. Farooq Ahmed, Zeeshan Iqbal, "Adaptive Transport Protocols in Multi Agent System", published in the proceeding of The 5th International Conference on Information Technology: New Generations (ITNG 2008), pp.720-725, April 2008, Las Vegas, Nevada, USA.



Zeeshan Iqbal, Amjad Mehmood, Abdul Ghafoor, H. Farooq Ahmed, Awais Shibli, " Authenticated Service Interaction Protocol for Multi-Agent Systems", published in the proceeding of The IEEE International Conference on High Capacity Optical Networks and Enabling Technologies, November 2007, Dubai, UAE: HONET-NIIT

Naveed Khan , Ammar Hassan, H. Farooq Ahmad, Hiroki Suguri, Abdul Ghafoor, "Multi-threaded Byte-Code Transformation Architecture for Strong Mobility in Java based Multi-agent System", published in the proceeding of The 2nd International Conference on Open Source Technologies (ICOSST-2007), Lahore, Pakistan.



Abdul Ghafoor, Arshad Ali, Hafiz Farooq Ahmad, Iftikhar Azim Niaz, "Interoperability: IEEE FIPA Compliant MAS with Web Services Resource Framework" , published in the Proceeding of "The 8th International Conference on Information Integration and Web-based Application and Services (iiWAS-06)", pp. 239-248, December 2006, Yogyakarta, Indonesia.

Abdul Ghafoor, "ICOST Demo: SAGE (Scalable fault tolerant Agent Grooming Environment)", Demonstrated in International Conference on Open-Source Technologies ICOST, December 2006, Lahore, Pakistan.



Abdul Ghafoor, Bilala Mustafa, H. Farooq Ahmad, Arshad Ali, Hiroki Suguri, Zaheer Abbas Khan, "Autonomous Cache Provision Management for Scalability of Directory Facilitator in MAS", published in the proceeding of The 16th International European Conference on Artificial Intelligence (ECAI 04), pp. 1145-1146, August 22-27th, 2004, Valencia, Spain.

Abdul Ghafoor, Mujahid ur Rehman, Zaheer Abbas Khan, H. Farooq Ahmad, Arshad Ali, "SAGE: Next Generation Multi-Agent System", published in the proceeding of The IEEE International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'04), pp.139-145, Vol. 1, June, 2004, Las Vegas, Nevada, USA.