Ali Nasrat Haidar

According to our database1, Ali Nasrat Haidar authored at least 13 papers between 2008 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Flexible composition and execution of large scale applications on distributed e-infrastructures.
J. Comput. Sci., 2014

2013
A data infrastructure reference model with applications: towards realization of a ScienceTube vision with a data replication service.
J. Internet Serv. Appl., 2013

2012
IMENSE: An e-infrastructure environment for patient specific multiscale data integration, modelling and clinical treatment.
J. Comput. Sci., 2012

A Comparative Analysis of the Usability and Legal Implications of Different Patient Data Sharing Architectures.
Proceedings of the AMIA 2012, 2012

2011
Audited credential delegation: a usable identity management solution for grid environments.
Proceedings of the 2011 TeraGrid Conference - Extreme Digital Discovery, 2011

2010
Audited credential delegation - a user-centric identity management solution for computational grid environments.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Formal Modelling of a Usable Identity Management Solution for Virtual Organisations
Proceedings of the Proceedings Second Workshop on Formal Aspects of Virtual Organisations, 2009

Abstractions of Web Services.
Proceedings of the 14th IEEE International Conference on Engineering of Complex Computer Systems, 2009

2008
Formal Modelling of PKI Based Authentication.
Proceedings of the 4th International Workshop on Automated Specification and Verification of Web Systems, 2008

Composition and Customization of Web Services Using Wrappers: A Formal Approach Based on CSP.
Proceedings of the 32nd Annual IEEE Software Engineering Workshop, 2008

Composition of Web Services Using Wrappers.
Proceedings of the Leveraging Applications of Formal Methods, 2008

Weaving Authentication and Authorization Requirements into the Functional Model of a System Using Z Promotion.
Proceedings of the Leveraging Applications of Formal Methods, 2008

Comparison and Evaluation of Identity Management in Three Architectures for Virtual Organizations.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008


  Loading...