Abd El-Aziz Ahmed

Abd El-Aziz Ahmed
Verified
Abd El-Aziz verified their affiliation via an institutional email.
Verified
Abd El-Aziz verified their affiliation via an institutional email.
  • Ph.D
  • Professor (Associate) at Cairo University

About

109
Publications
107,350
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
745
Citations
Introduction
I have completed my Ph.D. degree in June 2014 in Information Science & Technology from Anna University, Chennai-25, India. I have received my B.Sc., and Master of Computer Science in 1999 and 2006 respectively from Faculty of Science, Cairo University. Now, I am an Asso. Prof in the FGSSR, Cairo University, Egypt. I have 22 years’ experience in Teaching at Cairo University, Egypt. My research interests are database system, database security, Cloud computing, Big data, ML, DL and XML security.
Current institution
Cairo University
Current position
  • Professor (Associate)
Additional affiliations
November 2014 - present
Cairo University
Position
  • Professor (Assistant)
September 2000 - March 2006
Cairo University
Position
  • Assistant lecture
January 2011 - July 2014
Anna University, Chennai
Position
  • Research Scholar
Education
July 2011 - June 2014
Anna University, Chennai
Field of study
  • Information System & Technology
January 2011 - June 2011
Anna University, Chennai
Field of study
  • Computer Science
September 2005 - June 2006
ISSR, Cairo University
Field of study
  • Computer Science

Publications

Publications (109)
Article
Full-text available
Alzheimer’s disease (AD) is a neurodegenerative disorder characterized by the accumulation of amyloid plaques and neurofibrillary tangles in the brain, leading to distinctive patterns of neuronal dysfunction and the cognitive decline emblematic of dementia. Currently, over 5 million individuals aged 65 and above are living with AD in the United Sta...
Article
Full-text available
Therapists play a crucial role in a patient’s timely and accurate diagnosis of blood vessels within the skull or brain tissue rupture, which is essential for achieving the best outcomes. This paper discusses the efficacy of computed tomography imaging in the recognition and classification of different intracranial brain hemorrhage subtypes. We pres...
Article
Full-text available
This research addresses the challenges of early detection of Acute Lymphoblastic Leukemia (ALL), a life-threatening blood cancer particularly prevalent in children. Manual diagnosis of ALL is often error-prone, time-consuming, and reliant on expert interpretation, leading to delays in treatment. This study proposes an automated binary classificatio...
Article
Full-text available
This study presents KidneyNet, an innovative computer-aided diagnosis (CAD) system designed to identify chronic kidney diseases (CKDs), such as kidney stones, cysts, and tumors, in CT scans. KidneyNet utilizes a convolutional neural network (CNN) structure consisting of eight convolutional layers, three pooling layers, a flattening layer, and two f...
Article
Full-text available
Background: Tuberculosis (TB) is a bacterial disease that mainly affects the lungs, but it can also impact other parts of the body, such as the brain, bones, and kidneys. The disease is caused by a bacterium called Mycobacterium tuberculosis and spreads through the air when an infected person coughs or sneezes. TB can be inactive or active; in its...
Article
Full-text available
Peptic ulcers and stomach cancer are common conditions that impact the gastrointestinal (GI) system. Wireless capsule endoscopy (WCE) has emerged as a widely used, noninvasive technique for diagnosing these issues, providing valuable insights through the detailed imaging of the GI tract. Therefore, an early and accurate diagnosis of GI diseases is...
Article
Full-text available
Background: In recent years, the healthcare field has experienced significant advancements. New diagnostic techniques, treatments, and insights into the causes of various diseases have emerged. Despite these progressions, cancer remains a major concern. It is a widespread illness affecting individuals of all ages and leads to one out of every six d...
Article
Full-text available
The anterior cruciate ligament (ACL) is a major ligament in the knee that helps to stabilize the joint and prevent excessive forward movement of the shinbone. An ACL tear is a common injury, especially among athletes who participate in sports that involve pivoting and sudden changes in direction. This paper proposes an ensemble model, which include...
Article
Full-text available
The elevated death rate associated with colorectal cancer (CRC) continues to impact human life worldwide. It helps prevent disease and extend human life by being detected early. CRC is frequently diagnosed and detected through histopathological examination. The decision is based on clinicians' subjective perceptions and daily image analyses. Histol...
Article
Full-text available
Phishing attacks pose a significant threat in the cyber landscape, compromising the security of millions by exploiting trust in seemingly legitimate websites. These attacks deceive users into divulging sensitive information, posing substantial challenges to both individual and organizational security. The sophistication of phishing tactics, such as...
Article
Full-text available
The emergence of IIoT in vital industrial systems has heightened the demand for strong security frameworks as cyber threats become more sophisticated. However, the traditional security measures are usually inadequate, especially in real-time operational scenarios, making the industrial systems susceptible to disruptive attacks. This is the problem...
Article
Full-text available
With the increasing prevalence of Software-Defined Networking (SDN) and the growing demand for network resources, the threat of traffic diversion attacks in SDN environments poses a significant risk to network security and performance. Conventional methods for detecting these attacks often fall short of identifying sophisticated and dynamic diversi...
Article
Full-text available
The increasing reliance on digital platforms in Saudi Arabia's Information and Communication Technology (ICT) sector raises concerns about data privacy breaches. This study addresses the urgent need for robust security solutions within this context. This study investigates the application of blockchain technology and cryptographic techniques for en...
Article
Full-text available
Access control is a pivotal aspect of modern computing systems, ensuring that only authorized entities can interact with sensitive data and resources. Traditional access control methods, while effective, face challenges in terms of security, transparency, and scalability. Blockchain technology has emerged as a promising solution to enhance access c...
Article
Full-text available
The Internet of Things (IoT) has gained significance over the past several years and is currently one of the most important technologies. The capacity to link everyday objects, such as home appliances, medical equipment, autos, and baby monitors, to the internet via embedded devices with a minimum of human interaction has made continuous communicat...
Article
Full-text available
The surface electromyography (sEMG) signal is a complex interference pattern resulting from the electrical activity of contracting muscles, which directly correlates with muscle activity and exercise level. Patellofemoral osteoarthritis (PF OA) refers to the softening and destruction of the articular cartilage of the knee cap, which is important to...
Article
Full-text available
Predicting defect-prone software components can play a significant role in allocating relevant testing resources to fault-prone modules and hence increasing the business value of software projects. Most of the current software defect prediction studies utilize traditional supervised machine learning algorithms to predict defects in software applica...
Article
Full-text available
We know today that numerous factors play a significant role as causes of cancer. Because of this, a doctor’s opinion alone cannot be used to classify cancer. Intelligent algorithms providing medical assistance are therefore necessary. In addition, many researchers have adopted them for estimating the likelihood of patient survival, and others have...
Article
Full-text available
A cerebral stroke is a medical problem that occurs when the blood flowing to a section of the brain is suddenly cut off, causing damage to the brain. Brain cells gradually die because of interruptions in blood supply and other nutrients to the brain, resulting in disabilities, depending on the affected region. Early recognition and detection of sym...
Article
Full-text available
Knee osteoarthritis (KOA) sufferers have one of the highest disability-adjusted life years. The entire knee joint is affected by KOA. KOA is a condition that makes it hard for the knee to move normally. In KOA, the damage to the joints is irreversible, and the only treatment is a total knee replacement (TKR), which is expensive and only lasts a sho...
Article
Full-text available
Coronary artery disease (CAD) is one of themost authentic cardiovascular afflictions because it is an uncommonly overwhelming heart issue. The breakdown of coronary cardiovascular disease is one of the principal sources of death all over theworld.Cardiovascular deterioration is a challenge, especially in youthful and rural countries where there is...
Article
Full-text available
Due to the necessity of effective water management, the issue of water scarcity has developed into a significant global issue. One way to collect water is through the water management method. The most common source of fresh water anywhere in the world is groundwater, which has developed into a significant global issue. Our previous research used ma...
Article
Full-text available
The immune system’s overproduction of white blood cells (WBCs) results in the most common blood cancer, leukemia. It accounts for about 25% of childhood cancers and is one of the primary causes of death worldwide. The most well-known type of leukemia found in the human bone marrow is acute lymphoblastic leukemia (ALL). It is a disease that affects...
Article
Full-text available
The effective exploitation of smart technology in applications helps farmers make better decisions without increasing costs. Agricultural Research Centers (ARCs) are continually updating and producing new datasets from applied research, so the smart model should dynamically address all surrounding agricultural variables and improve its expertise fr...
Article
Full-text available
In recent decades, Intelligent home systems are popular because they improve comfort and quality of life. A growing number of homes are becoming "smarter" by incorporating Internet of Things (IoT) technology to improve comfort, energy efficiency, and safety. Increases in resource-constrained IoT devices heighten security threats and vulnerabilities...
Article
Full-text available
Designing computer-aided diagnosis (CAD) systems that can automatically detect ocular diseases (ODs) has become an active research field in the health domain. Although the human eye might have more than one OD simultaneously, most existing systems are designed to detect specific eye diseases. Therefore, it is crucial to develop new CAD systems that...
Article
Full-text available
Novel Coronavirus (COVID-19) is viewed as one of the main general wellbeing theaters on the worldwide level all over the planet. Because of the abrupt idea of the flare-up and the irresistible force of the infection, it causes individuals tension, melancholy, and other pressure responses. The avoidance and control of the novel Covid pneumonia have...
Article
Full-text available
The alignment operation between many protein sequences or DNA sequences related to the scientific bioinformatics application is very complex. There is a trade-off in the objectives in the existing techniques of Multiple Sequence Alignment (MSA). The techniques that concern with speed ignore accuracy, whereas techniques that concern with accuracy ig...
Article
Full-text available
Internet of Things is a promising technology but it also increases numerous security threats in data transmission. To secure neighboring sensing devices' communication in an IoT environment, a key agreement protocol is primordial. Various IoT data transmission mechanisms have been proposed in the literature to attain security. However, these propos...
Article
Full-text available
Objectives: To explore the area of groundwater that can assist to improve the accessibility of freshwater. Methods : We propose a machine-deep learning model based on a recommender system to manage and classify groundwater. Finding: The main goal of our proposed approach is to classify groundwater into multi-labels, which are drinking water (Excell...
Article
Full-text available
Corona Virus is a big threat to humanity. Now, the whole world is struggling to reduce the spread of Corona virus. Wearing masks is one of the practices that help to control the spread of the virus according to the world health organization. However, ensuring all people wear facemask is not an easy task. In this paper, we propose a simple and effec...
Article
Full-text available
Cloud computing has been adopted very rapidly by organizations with different businesses and sizes, the use of cloud services is rising at an unparalleled rate these days especially IaaS services as cloud providers offer more powerful resources with flexible offerings and models. This rapid adoption opens new surface attacks to the organizations th...
Article
Full-text available
Cloud computing is the provision of IT services over the Internet with the aim of offering faster innovation, flexible resources, and economies of scale. Cloud computing security is in a continuous evolving, it is the one of the main research issues in Cloud. This paper proposes a multilevel encryption technique to secure the transaction of data in...
Article
Full-text available
In new computing architectures, more and more data is outsourced to remote storage providers. When data outsourced, sensitive information becomes vulnerable to theft. Data owners want to make sure their data is safe from breaches by third parties, insider threats, and untrusted service providers. When queries are run over encrypted data, a certain...
Article
Full-text available
Cloud computing is a cutting-edge innovation for improving and developing plans of action in associations. It tends to be utilized for giving programming and framework administrations sent in data focuses. Encryption of data by its owner and saving them on the cloud causes many efficiency and secrecy issues. In Cloud computing, a client who has app...
Article
Full-text available
Cloud service providers providing users with efficient and effective storage and transmission of data. To reduce storage costs and save bandwidth, cloud service providers are attracted to use data de-duplication feature. Cloud users are interested in using the cloud safely and privately to protect the data they share on the cloud. Therefore, they e...
Article
Full-text available
The Accreditation Board for Engineering and Technology (ABET) Criteria for Computing Accreditation Commission Programs are based upon knowledge, presentation skills, communication skills, teamwork, and leadership skills that the students gain through the curriculum in a program. The student outcomes (SOs) are the procured skills and knowledge which...
Article
Full-text available
HELP International is a charitable nongovernmental organization (NGO) that is committed to fighting poverty and providing the people of backward countries with basic amenities and relief during the time of disasters and natural calamities. HELP International has been able to raise around $ 10 million. Therefore, the head of the NGO needs to decide...
Article
Full-text available
The Internet of Things (IOT) is a revolution in the technology world, and this field is continuously evolving. It has made life easier for people by providing consumers with more efficient and effective resources in faster and more convenient ways. The Internet of Things is one of the most exciting fields for the future by 2030. 90% of the planet w...
Article
Full-text available
Internet of things (IOT) is a rapidly growing technology which aims connect all devices to the existing Internet infrastructure, and the vast flow data from these devices are identified as "Big data,", The accuracy of data processing and storage remains a wide area of research due to the diversity and the wide flow of data, so this survey will supp...
Preprint
Full-text available
Social Network Analysis measures the interconnection between humans, entities or communities and the streaming of messages between them. This kind of Analysis studies the relationship between different people in a very deep way; it shows how one node (subscriber) in the network can affect the others. This research studies the connections between th...
Article
Full-text available
Social Network Analysis measures the interconnection between humans, entities or communities and the streaming of messages between them. This kind of Analysis studies the relationship between different people in a very deep way; it shows how one node (subscriber) in the network can affect the others. This research studies the connections between th...
Article
Full-text available
Tremendous measure of data's are accumulated and seen through World Wide Web by various clients. The client rehearses their perspectives by entering hypertext certifications by web with an enormous storehouse of site pages and web utilization digging process is fundamental for effective site the board, personalization, business and bolster administ...
Article
Full-text available
Novel Coronavirus (COVID-19) is considered one of the most significant public health theaters on the global level around the world. Due to the sudden nature of the outbreak and the infectious power of the virus, it causes people anxiety, depression, and other stress reactions. The prevention and control of the novel coronavirus pneumonia have moved...
Article
Full-text available
Cloud Computing is a new service that has a fast growth in IT. It can be utilized for providing software and infrastructure services deployed in data centers. Although there are several benefits of cloud computing, such as the ability to store huge amount of data and to perform a large amount of computations, there are some issues, such as data sec...
Article
Full-text available
A cloud is a definite IT environment that is designed for the aim of remotely provisioning scalableand measured IT resources. Big data is a manner of describing data issues that are unsolvable using traditional tools. Volumes of big data are starting from dozens of terabytes and petabytes. As a result,it is impossible to store them in local storage...
Article
Full-text available
Service availability is one of the most important aspects of cloud environments. The threat to availability of Distributed Denial of Service (DDoS) attacks plays an important role when designing the security architecture. A successful DDoS attack might result in service degradation or complete outage. The methods and techniques used against DDoS at...
Conference Paper
Full-text available
Social Network Analysis determines the relationships between people, organizations, groups or entities and the flow of information between them. A literature review is done for social network analysis and the prediction of links that could be done in future between the different entities within the network, many use cases are shown here for applyin...
Conference Paper
Full-text available
Topics selection for an educational material can take a lot of manual work. The manual operations can be exhaustive, especially in case of large volume of materials. In order to solve this problem, we propose an automated topic selection approach, which is able to select topics automatically for any educational material with a consideration of achi...
Conference Paper
Full-text available
The traditional way to extract topics from any educational material takes a lot of effort and time, especially when a huge amount of material was prepared. The proposed solution to extract topics from any educational material is based on n-gram and term co-occurrences, which calculates the keywords of the course specifications that appears in educa...
Article
Full-text available
Big data refers to a data sets that a large of traditional computer memory, processor and software, that’s mean when the volume, variety and velocity of the data are increased, the current techniques and technologies may not be able to handle storage and processing of data, Also a Big Data described as more functionally, as large pools of unstructu...
Article
Full-text available
With the fast growth of mobile technology, mobile devices have become an essential part of human life. But yet its hardware has faced lots of challenges due to the limitation of their resources, such as processing power, battery life, and storage. Mobile Cloud Computing (MCC) and virtualization have been introduced to integrate the cloud computing...
Article
Full-text available
Swarm intelligence is an artificial intelligence discipline, which concerned with the design of intelligent multi-agent systems by taking inspiration from the collective behaviors of social insects and other animal societies. Swarm intelligence optimization technique was introduced at 1989 by G. Beni and J. Wang in the global optimization framework...
Article
Full-text available
The number of users on Twitter has increased in the Middle East since the Arab Spring in 2011. Because Egypt has become a changing country in the last few years, it faced a number of different events; that made Twitter the most appropriate virtual environment to monitor and track those events. In this paper, we study the life cycle for each event t...
Article
Full-text available
To enhance the quality of higher education institutions (HEIs), key performance indicators (KPIs) must be explored and measured. KPIs deems as a measurable value which explains the effectiveness of an institution and how it is achieving key objectives. Institutions use KPIs for ensuring that they are going on the right way or not. Many of the indic...
Article
Full-text available
To enhance the quality of higher education institutions (HEIs), key performance indicators (KPIs) must be explored and measured. KPIs deems as a measurable value which explains the effectiveness of an institution and how it is achieving key objectives. Institutions use KPIs for ensuring that they are going on the right way or not. Many of the indic...
Article
Full-text available
To enhance the quality of higher education institutions (HEIs), key performance indicators (KPIs) must be explored and measured. KPIs deem as a measurable value which explains the effectiveness of an institution and how it is achieving key objectives. Institutions use KPIs for ensuring that they are going on the right way or not. Many of the indica...
Chapter
Full-text available
Web usage mining techniques and applications across industries is still exploratory and, despite an increase in academic research, there are challenge of analyze web which quantitatively capture web users' common interests and characterize their underlying tasks. This chapter addresses the problem of how to support web usage mining techniques and a...
Article
Full-text available
Requirements Engineering (RE) is a very critical phase in System Development Life Cycle (SDLC). There are several attempts to enhance the quality and performance of this phase and therefore enhancing the industry of producing software systems. One of the most important issues in requirements is prioritizing them. Every software system has limited b...
Article
Full-text available
XML has been widely adopted for information exchange across various networks due to flexibility providing common syntax for messaging systems. XML documents may contain private information that cannot be shared by all user communities. Therefore, XML Security has a great importance to the overall security of the distributed systems. In this paper, t...
Chapter
Full-text available
Web usage mining techniques and applications across industries is still exploratory and, despite an increase in academic research, there are challenge of analyze web which quantitatively capture web users' common interests and characterize their underlying tasks. This chapter addresses the problem of how to support web usage mining techniques and a...
Conference Paper
Full-text available
This study aimed to analyze the learning objectives of the higher education textbooks, according to verbs of intended learning outcomes (ILOs) which set by the Quality Management of the Institute of Statistical Studies and research (ISSR), Cairo University, Egypt. This study provides a set of recommendations that will help to choose the best chapte...
Chapter
Full-text available
Web usage mining techniques and applications across industries is still exploratory and, despite an increase in academic research, there are challenge of analyze web which quantitatively capture web users’ common interests and characterize their underlying tasks. This chapter addresses the problem of how to support web usage mining techniques and a...
Article
Full-text available
Requirements Engineering (RE) is a very critical phase in System Development Life Cycle (SDLC). There are several attempts to enhance the quality and performance of this phase and therefore enhancing the industry of producing software systems. Caring about the quality of software systems doesn’t mean just testing the product before deployment. Impr...
Article
Full-text available
Requirements Engineering (RE) is a very critical phase in System Development Life Cycle (SDLC). There are several attempts to enhance the quality and performance of this phase and therefore enhancing the industry of producing software systems. Caring about the quality of software systems doesn’t mean just testing the product before deployment. Impr...
Article
Full-text available
The widespread and different types of information on Twitter make it one of the most appropriate virtual environments for information monitoring and tracking. In this paper, the authors review different information analysis techniques; starting with the analysis of different hashtags, twitter's network-­‐topology, event spread over the network, ide...
Article
Full-text available
Key Performance Indicators (KPIs) allows gathering knowledge and exploring the best way to achieve organization goals. Many researchers have provided different ideas for determining KPI’s either manually, and semi-automatic, or automatic which is applied in different fields. This work concentrates on providing a survey of different approaches for e...
Article
Full-text available
: When a SOAP Web Service is receiving an encrypted XML document, it processes it as follows. First, it decrypts the key, uses the key to decrypt all the parts containing encrypted data, and finally, the data are parsed with an XML parser, and the whole document is forwarded to the next module or business process invocation. In this case, the XML Se...
Conference Paper
Full-text available
In recent years, many countries, companies, and research groups have launched their own cloud systems. Due to security issues, there is a limitation for a single-provider of a cloud to cooperate with other cloud systems to maximize the function of available resources. In addition, each cloud computing system provides a digital identity for a user....
Conference Paper
Full-text available
Outsourcing databases into cloud increases the need of data security. The user of cloud must be sure that his data will be safe and will not be stolen or reused even if the data-centers were attacked. The service provider is not trustworthy so the data must be invisible to him. Executing queries over encrypted data preserves a certain degree of co...
Conference Paper
Full-text available
Web site applications are an important part of our daily life. Hence, attacking those sites increases quick, one of these attacks is SQL injection attack (SQLIA). The SQLIA is a well known way of attack in terms of common threats and document structure nowadays, this attack is launched through specially crafted user inputs and target web applicatio...
Conference Paper
Full-text available
Outsourcing databases into cloud increases the need of data security. Executing queries over encrypted data preserves a certain degree of confidentiality. In this paper, we propose an efficient algorithm to run computations on data encrypted for different principals. The proposed algorithm allows users to run queries over encrypted columns directly...
Conference Paper
Full-text available
Today, undoubtedly cloud-computing has turned into the popular expression in the IT business. There are many features that make cloud computing attractive for users; however, it has revealed new security issues. This paper provides an insightful analysis of the current security issues of cloud-computing. Moreover, it proposes a Security Model for S...
Conference Paper
Full-text available
Abstract— Today, undoubtedly cloud-computing has turned into the popular expression in the IT business. There are many features that make cloud computing attractive for users; however, it has revealed new security issues. This paper provides an insightful analysis of the current security issues of cloud-computing. Moreover, it proposes a Security M...
Conference Paper
Full-text available
XACML (extensible Access Control Markup Language) is an open standard language based on XML. It's the de facto language designed to describe the security policy and the access permission of network service, digital rights management and enterprise security applications information. RBAC profile of XACML is used to express policies that use role bas...
Conference Paper
Full-text available
Safe of sensitive private data is critical. Various techniques have been proposed to preserve a certain degree of privacy on database outsourcing scenarios. In addition, allowing executing some SQL queries efficiently. This paper aims to present a complete survey about the various techniques that execute queries over encrypted data, while the data...
Conference Paper
Full-text available
This paper presents clustering model for progression of ocular hypertension to primary open angle glaucoma using classification approach based on rough mereology. Our model comprises two phases: Clustering and prediction. We start by Clustering that utilises a rough mereology theory for clustering into one of three obtained classes, namely low, mid,...
Conference Paper
Full-text available
Abstract: Safe of sensitive private data is critical. Various techniques have been proposed to preserve a certain degree of privacy on database outsourcing scenarios. In addition allowing to execute some SQL queries efficiently. This survey paper aims to analyze various techniques to execute queries over encrypted data however data will remain conf...
Article
Full-text available
Although eXtensible Access Control Markup Language (XACML) is recognized as a precise and a complete policy description language, the structure of the current XACML policy is complex. Hence, users need to understand XACML well and write down the securing policy all by hand, which make itdif?cult to master and use. On the other hand, RDBMS is easy a...
Article
Full-text available
XACML (extensible Access Control Markup Language) is an open standard language based on XML. It’s the de facto language designed to describe the security policy and the access permission of network service, digital rights management and enterprise security applications information. RBAC profile of XACML is used to express policies that use role bas...
Thesis
Full-text available
In recent years, the research on XML security over relational databases has become popular, due to the fact that, XML became the de facto standard for data representation and exchange on the internet. Moreover, many XML documents are stored in a Relational Data Base Management System (RDBMS), so that it can be retrieved faster. In order to secure t...
Conference Paper
Full-text available
JavaScript Object Notation (JSON) is a lightweight data-interchange format. It is easy for humans to read and write. It has a data format that is interchangeable with a programming languages built-in data structures that eliminates translation time and reduces complexity and processing time. Moreover, JSON has the same strengths of XML. Therefore,...
Article
Full-text available
In this paper, we present a literature review on XML security and access control to XML documents. It will support the future research and development work as well as to raise the awareness for the presented approaches. In this literature review, we present the different articles that describe the XML security standards specifically XML encryption...
Conference Paper
Full-text available
XACML is an XML-based language for access control that has been standardized by OASIS (Organization for the Advancement of Structured Information Standards). XACML describes both an access control policy language that are ABAC and an access control decisions (request/response) language. Although XACML is recognized as a precise and complete policy...
Conference Paper
Full-text available
JSON (JavaScript Object Notation) is a lightweight data-interchange format. It is easy for humans to read and write. It has a data format that is interchangeable with programming languages built-in data structures that eliminates translation time and reduces complexity and processing time. Moreover, JSON has the same strengths of XML. Therefore, it...
Article
Full-text available
In this paper, We explore how to support security models for XML documents by using relational databases. Our model based on the model in [6], but we use our algorithm to store the XML documents in relational databases.
Conference Paper
Full-text available
In this paper, we present a survey of the state of the art in XML XML security. This survey will support the future research and development work as well as to raise the awareness for the presented approaches. In this survey, we present the different articles that describe the XML security standards specifically XML encryption, XML signature, and XA...
Conference Paper
Full-text available
XML has been widely adopted for information exchange across various networks due to flexibility providing common syntax for messaging systems. XML documents may contain private information that cannot be shared by all user communities. Therefore, XML Security has a great importance to the overall security of the distributed systems. In this paper, w...

Questions

Questions (24)
Question
Make changes in Cloud sim
Question
What are the hot research areas in security?
Question
I want to know how to use the cloudsim
Question
The recursive technique is better than the iterative technique or not
Question
I want to use cloudsim practically.
Question
I ask about the writing of a research project
Question
ask about a tool to explain cloud virtualization

Network

Cited By