Muntaha Alawneh

According to our database1, Muntaha Alawneh authored at least 15 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Approaches for Zero Trust Adoption Based upon Organization Security Level.
Proceedings of the Ubiquitous Security - Second International Conference, 2022

Expanding DevSecOps Practices and Clarifying the Concepts within Kubernetes Ecosystem.
Proceedings of the Ninth International Conference on Software Defined Systems, 2022

Integrating Trusted Computing Mechanisms with Trust Models to Achieve Zero Trust Principles.
Proceedings of the 9th International Conference on Internet of Things: Systems, 2022

Expanding DevOps Principles and Best Practices Based on Practical View.
Proceedings of the International Arab Conference on Information Technology, 2022

2012
Mitigating the risk of insider threats when sharing credentials.
PhD thesis, 2012

A framework for establishing trust in the Cloud.
Comput. Electr. Eng., 2012

2011
Defining and Analyzing Insiders and Their Threats in Organizations.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Secure Virtual Layer Management in Clouds.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
Secure information sharing for grid computing.
Secur. Commun. Networks, 2010

2009
Replay Attack of Dynamic Rights within an Authorised Domain.
Proceedings of the Third International Conference on Emerging Security Information, 2009

2008
Preventing Insider Information Leakage for Enterprises.
Proceedings of the Second International Conference on Emerging Security Information, 2008

Software Licence Protection and Management for Organisations.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Sharing but Protecting Content Against Internal Leakage for Organisations.
Proceedings of the Data and Applications Security XXII, 2008

Preventing information leakage between collaborating organisations.
Proceedings of the 10th International Conference on Electronic Commerce 2008, 2008

DRM domain authentication using electronic payment systems.
Proceedings of the 10th International Conference on Electronic Commerce 2008, 2008


  Loading...