
Dhiah el Diehn I. Abou-TairGerman Jordanian University · Department of Computer Science
Dhiah el Diehn I. Abou-Tair
Associate Professor
About
37
Publications
3,931
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
177
Citations
Citations since 2017
Introduction
Publications
Publications (37)
Distributed ledger technology has paved the way for new innovative approaches in the field of security and privacy. Self-sovereign identity contributed to empowering individuals to have control over their digital identifiers. The presented self-sovereign-based access control system utilizes both technologies.
System-of-Systems (SoS) offer unprecedented potential for new types of emerging services, which significantly exceed the capabilities of the constituting systems. SoS in safety-critical domains (e.g., medical applications, smart grid, disaster recovery, defense) are prominent examples, but they have stringent real-time and reliability requirements....
Systems-of-systems (SoS) are gaining increasing at- tention for the realization of safety-relevant applications with re- liability and real-time requirements, by coordinating autonomous constituent systems from different application areas. For a given application that is initiated at a constituent system, the provision and use of services between c...
Privacy is becoming an indispensable component in the emerging Internet of Things (IoT) context. However, the IoT based devices and tools are exposed to several security and privacy threats, especially that these devices are mainly used to gather data about users’ habits, vital signs, surround environment, etc., which makes them a lucrative target...
The enormous growth of the Internet of Things (IoT) devices gave governments, businesses, and individual users new means
to accomplish their missions. Several IoT applications require deployment at a large scale such as smart cities. Large-scale IoT
applications help achieve better monitoring services and more efficient cities. IoT multimedia (IoTM...
Abstract. With the proliferation of the Internet of Things (IoT) and cloud computing technologies in various fields, remote health monitoring and fall detection are two vital applications that are expected to adopt these technologies. This is due to the fact that it not only provides efficient way for logging the patients’ health information, thus...
Systems of Systems (SoS) are collections of autonomous systems that share their resources in order to form a new larger system with more capabilities and enhanced performance. A fundamental challenge of service identification in SoS arises when constituent systems are dynamically composed. This paper proposes a new framework for SoS service identif...
Systems of systems have been used recently in many complex scenarios to simplify network communication, resources allocation and management. Given the dynamic and heterogeneous nature of systems of systems, providing security in such an environment is challenging and requires significant management and processing resources. In this paper, a securit...
The use of computer games as adjunct to conventional cerebral palsy (CP) rehabilitation provides a promising approach to actively engage CP children in physical therapy exercises. This chapter provides a summary of previous studies that incorporated computer games for CP rehabilitation. Moreover, a comprehensive game-based rehabilitation framework...
Developing applications with intelligent context access capabilities is challenged by the difficulty of obtaining advanced context information. The complexity of the logic required for processing context information adds another barrier for developing advanced context-aware applications. In this research paper, we propose a solution that allows con...
The Internet of Things (IoT) has been one of the influential paradigms in the development of logistics transport functions. The introduction of IoT in logistics has impacted application areas such as capacity sensing, planning, route optimization, and energy management. However, most works presented so far assume the existence of physical addresses...
The aim of this paper is to design and implement an open source e-health monitoring and fall detection system to monitor senior patients. The architecture of the system is based on a set of medical sensors and a microcontroller that communicates with a cloud. The sensors' data are collected and processed using a microcontroller, then, the data will...
Systems-of-Systems (SoS) enable new emerging services in many application domains such as healthcare systems, transportation systems and the smart grid. However, satisfying real-time and reliability requirements is a prerequisite for the deployment of SoS in safety-relevant applications with stringent timing constraints. This book chapter describes...
Active participation in physical rehabilitation exercises is crucial for cerebral palsy (CP) patients to maintain and improve their muscles. However, limited percentage of CP patients participates regularly in rehabilitation exercises, mainly due to the lack of motivation. In this study, a comprehensive framework is proposed to actively engage CP p...
Significant advancement in mobile devices coupled with high speed networks have shifted personal computing towards pervasive environments. Mobile devices currently offer many value-added applications and services such as emailing, messaging, navigation, social networking, finance, and entertainment. Typically, such value-added applications have acc...
Mobile devices currently offer many value-added applications and
services such as messaging, navigation, social networking, finance,
and entertainment. As these mobile applications have access to
users’ personal information and are capable of gathering and
transmitting trust sensitive information, posing security and
privacy risks. In this paper, w...
While the importance of System-of-Systems (SoS) is widely recognized, today's missing support for real-time and reliability requirements limits the realization of SoS in safetyrelevant real-time applications. Today's reliable embedded real-time architectures are not suited to deal with the openness, dynamic nature and lack of global control in SoS....
Mass gathering events, where thousands of People meet in a confined area for a defined period of time, pose a severe strain on the safety and security of the gathering crowds. The process of managing and controlling crowd movements has been a challenge. Lack of good management and planning of high crowd density with restricted points of access may...
Intoday’s mobile applications and services,location is a key context information, which is being progressively used to stimulate collaboration in different ways. For instance, location-aware applications experienced a widespread usage by mobile communities interested in defining community-specific points of interest (POI). However, existing applica...
Smart phones equipped with Near Field Communication (NFC) provide a simple way to initiate contactless transactions and data exchange without having the needto carry additional items such as credit cards, personal IDs and access keys. To prevent unauthorized NFC transactions in the case of lost or stolen devices, the user needs to be authenticated...
Computer Supported Collaborative Learning (CSCL) support is currently widely accepted to provide reliable and valid formal and informal educational practices as proven to benefit students in onsite as well as distant educational settings. However, some results from case studies indicate that privacy problems could negatively affect CSCL implementat...
Actually, location is increasingly used to stimulate collaboration in various ways and location-aware applications experienced a wide-spread usage. However, existing mobile services, even those which are Web enabled, do not support end-user tailorability, for example at the level of defining community-specific points of interests of any type on bot...
In complex, ad hoc constituted situations, people with different intentions, experiences, and expertise need or want to cooperate to cope with the domain-specific challenges they face. These situations can occur in both a professional and a leisure-life context. Cooperative systems providing enhanced interaction facilities in the user interface (e....
The paper focuses on security measures in the context of interactive TV (iTV), leaving out the field of social TV and concentrating on all two-way communication between user/viewer and infrastructure or content providers. It aims at introducing architecture for regulating all kinds of interactions and data streams within an iTV environment, includi...
Considering privacy advisory for collaborative settings on mobile devices, this paper presents an innovative approach to simultaneously support dynamically reconfigurable privacy advisory and the usability of providing it. Regarded are interaction design requirements such as user-friendless and non-intrusive advisory as well as restrictions of toda...
In the current information technology age, the demand of tools that meet social interaction needs, e.g. SocialTV and Internet-based media advertisement, is gaining in importance. Thus privacy becomes a matter of concern in this respect. Social interactions comprises privacy risks and threats that may enable abuse, e.g., man-in-the-middle attacks ba...
Today, to be monitored while surfing the web seems to be a natural act and thus tools and applications to achieve online anonymity are more important than ever. The usability of such a tool plays not only a prominent role for each single user; in the area of anonymization networks it usually holds that the protection for every single user is higher...
Nowadays, collaboration and social interaction among people become everyday activities in our evolving information age. In many learning platforms, collaborative platforms in the educational and industrial field or social networks like LinkedIn or Xing, users have to disclose private information and reveal their identities. Working with those syste...
Nowadays enforcing privacy in enterprises is recognized as an issue of impact. Actually, it is a big challenge to adapt normative laws and regulations in a software system. It is a challenging task to include the formalized laws and rules in enterprises since e.g. more than one regulation may affect the terms of privacy concerning one situation. Tr...
Within a company or a university different organization units need their own information system to perform their business tasks. There is also a massive need of integration in order to optimize the processes. Integration usually means to wrap the applications or couple them via technologies such as CORBA. Especially when applications are coupled, i...
The use of ontologies in the fields of information retrieval and semantic web is well-known Since long time researcher are trying to find ontological representations of the diverse laws to have a mechanism to retrieve fine granular legal information about diverse legal cases However, one of the common problems software systems are faced with in con...
In the age of Internet and loosely coupled applications, privacy has become a matter of concern. Individuals lose track of their personal data and have no control over databases and information systems containing their personal data. In the field of distributed systems, resarchers focus mainly on how to integrate a variety of systems in a way so th...