Imad M. Abbadi

According to our database1, Imad M. Abbadi authored at least 29 papers between 2007 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Approaches for Zero Trust Adoption Based upon Organization Security Level.
Proceedings of the Ubiquitous Security - Second International Conference, 2022

Expanding DevSecOps Practices and Clarifying the Concepts within Kubernetes Ecosystem.
Proceedings of the Ninth International Conference on Software Defined Systems, 2022

Integrating Trusted Computing Mechanisms with Trust Models to Achieve Zero Trust Principles.
Proceedings of the 9th International Conference on Internet of Things: Systems, 2022

Expanding DevOps Principles and Best Practices Based on Practical View.
Proceedings of the International Arab Conference on Information Technology, 2022

2013
Towards Trustworthy Resource Scheduling in Clouds.
IEEE Trans. Inf. Forensics Secur., 2013

A framework for establishing trust in Cloud provenance.
Int. J. Inf. Sec., 2013

2012
A framework for establishing trust in the Cloud.
Comput. Electr. Eng., 2012

Clouds Trust Anchors.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Trust in the Cloud.
Inf. Secur. Tech. Rep., 2011

Defining and Analyzing Insiders and Their Threats in Organizations.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Secure Virtual Layer Management in Clouds.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Challenges for Provenance in Cloud Computing.
Proceedings of the 3rd Workshop on the Theory and Practice of Provenance, 2011

Toward Trustworthy Clouds' Internet Scale Critical Infrastructure.
Proceedings of the Information Security Practice and Experience, 2011

Operational trust in Clouds' environment.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Insiders analysis in Cloud computing focusing on home healthcare system.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Dynamics of trust in Clouds - Challenges and research agenda.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Middleware Services at Cloud Application Layer.
Proceedings of the Advances in Computing and Communications, 2011

Clouds' Infrastructure Taxonomy, Properties, and Management Services.
Proceedings of the Advances in Computing and Communications, 2011

Middleware Services at Cloud Virtual Layer.
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011

2010
Secure information sharing for grid computing.
Secur. Commun. Networks, 2010

2009
Replay Attack of Dynamic Rights within an Authorised Domain.
Proceedings of the Third International Conference on Emerging Security Information, 2009

2008
Digital Rights Management for Personal Networks.
PhD thesis, 2008

Preventing Insider Information Leakage for Enterprises.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Software Licence Protection and Management for Organisations.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Sharing but Protecting Content Against Internal Leakage for Organisations.
Proceedings of the Data and Applications Security XXII, 2008

Preventing information leakage between collaborating organisations.
Proceedings of the 10th International Conference on Electronic Commerce 2008, 2008

DRM domain authentication using electronic payment systems.
Proceedings of the 10th International Conference on Electronic Commerce 2008, 2008

2007
Digital Rights Management Using a Master Control Device.
Proceedings of the Advances in Computer Science, 2007

Digital rights management using a mobile phone.
Proceedings of the 9th International Conference on Electronic Commerce: The Wireless World of Electronic Commerce, 2007


  Loading...