Ahmad Samer Wazan

Orcid: 0000-0002-1611-2870

According to our database1, Ahmad Samer Wazan authored at least 29 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Cybersecurity in networking: adaptations, investigation, attacks, and countermeasures.
Ann. des Télécommunications, April, 2023

How to Design and Deliver Courses for Higher Education in the AI Era: Insights from Exam Data Analysis.
CoRR, 2023

2022
On the Validation of Web X.509 Certificates by TLS Interception Products.
IEEE Trans. Dependable Secur. Comput., 2022

2021
A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context.
J. Cybersecur. Priv., July, 2021

RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

Which Virtualization Technology is Right for My Online IT Educational Labs?
Proceedings of the IEEE Global Engineering Education Conference, 2021

2020
A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

Know Your Customer: Opening a new bank account online using UAAF.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
A cloud-based architecture for mitigating privacy issues in online social networks.
Int. Arab J. Inf. Technol., 2019

Improved Identity Management with Verifiable Credentials and FIDO.
IEEE Commun. Stand. Mag., 2019

A situation-driven framework for dynamic security management.
Ann. des Télécommunications, 2019

Logic-based methodology to help security architects in eliciting high-level network security requirements.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

2018
Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

2017
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker.
Secur. Commun. Networks, 2017

Describing advanced persistent threats using a multi-agent system approach.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

TLS Connection Validation by Web Browsers: Why do Web Browsers Still Not Agree?
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Towards the Weaving of the Characteristics of Good Security Requirements.
Proceedings of the Risks and Security of Internet and Systems, 2016

2015
G-Cloud on Openstack: Adressing access control and regulation requirements.
Proceedings of the International Symposium on Networks, Computers and Communications, 2015

2013
Attribute-Based Mining Process for the Organization-Based Access Control Model.
Proceedings of the 12th IEEE International Conference on Trust, 2013

PKI Interoperability: Still an Issue? A Solution in the X.509 Realm.
Proceedings of the Information Assurance and Security Education and Training, 2013

2012
The X.509 trust model needs a technical and legal expert.
Proceedings of IEEE International Conference on Communications, 2012

2011
A formal model of trust for calculating the quality of X.509 certificate.
Secur. Commun. Networks, 2011

2009
A secure collaborative web-based environment for virtual organisations.
Int. J. Web Based Communities, 2009

Which Web Browsers Process SSL Certificates in a Standardized Way?
Proceedings of the Emerging Challenges for Security, 2009

2008
Authentication in Virtual Organizations: A Reputation Based PKI Interconnection Model.
Proceedings of the Systems and Virtualization Management. Standards and New Technologies, 2008

Validating X.509 Certificates Based on their Quality.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

The X.509 certificate quality.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008


  Loading...