
Issam Al-AzzoniAl Ain University · Department of Software Engineering
Issam Al-Azzoni
Doctor of Philosophy
About
48
Publications
25,981
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
348
Citations
Introduction
Issam Al-Azzoni currently works at the Department of Software Engineering, Al Ain University. His research interests include the applications of formal methods in software engineering, modeling and model-to-model Transformation, and coloured Petri Nets.
Publications
Publications (48)
This paper presents an approach for the verification of access control in smart contracts written in the Digital Asset Modeling Language (DAML). The approach utilizes Colored Petri Nets (CPNs) and their analysis tool CPN Tools. It is a model-driven-based approach that employs a new meta-model for capturing access control requirements in DAML contra...
Artificial intelligence has been identified as one of the main driving forces of innovation in state-of-the-art mobile and wireless networks. It has enabled many novel usage scenarios, relying on predictive models for increasing network management efficiency. However, its adoption requires additional efforts, such as mastering the terminology, tool...
In this paper, we propose an automated workflow for enhancement of applications relying on model-driven engineering (MDE) approach using Eclipse Modeling Framework (EMF) and its Ecore (meta-)models. ChatGPT is leveraged for purpose of code generation in order to cover the following MDE scenarios: 1) meta-model construction based on textual data 2)...
Access controls are principles and policies that are deployed on a system to ensure privileged access to system resources. Role-based access controls are a type of access controls which ensure access to resources based on users' roles. There has been a recent interest in generating smart contracts for the design of access controls. Smart contracts...
We propose a simple modelling language extending iContractML 2.0 for access control policies on smart contracts. The language supports multi-party authorisation and dynamic role-based access control (RBAC) where role members can be added or removed at runtime. Models in this language can be mapped to both Solidity and DAML in a model-driven approac...
The trending large language model-based ChatGPT service, originally meant to be used as conversational agent, has been adopted in many areas - from programming to entertainment. On the other side, development of smart contracts for various blockchain platforms represents a time and effort demanding task due to their special characteristics. In this...
In this paper, we propose an automated workflow for enhancement of applications relying on model-driven engineering (MDE) approach using Eclipse Modeling Framework (EMF) and its Ecore (meta-)models. ChatGPT is leveraged for purpose of code generation in order to cover the following MDE scenarios: 1) meta-model construction based on textual data 2)...
In recent years, blockchains have been exploited in areas way beyond finance, enabling numerous innovative usage scenarios and applications. However, the extension of the existing systems and applications in order to support data persistence on a blockchain is time-consuming. Therefore, this paper proposes a model-driven based approach leveraging s...
In recent years, blockchain technology in synergy with smart contracts has opened new horizons within almost any field from entertainment to healthcare. However, in order to enable innovative usage scenarios, significant efforts are needed to adapt the existing systems and solutions, so the full potential of blockchain-based tools can be leveraged....
Efficient resource planning is recognized as one of the key enablers making the large-scale deployment of next-generation wireless networks available for mass usage. Modelling, planning, and software simulation tools reduce both the time needed and costs of their tuning and realization. In this paper, we propose a model-driven framework for proacti...
Vaccination is recognized as one of crucial measures in battle against COVID-19, contributing to both the reduction of its negative impact on infected person and overall spread reduction. In this paper, we focus on adoption of model-driven approach to proactive and cost-effective vaccine distribution, relying on deep-learning (for vaccine-demand pr...
Stability is of utmost importance when it comes to smart grid infrastructures. Dramatic parameter variations and fluctuations can lead to wrong decisions, which could lead to fatal consequences. In this paper, we propose a model-driven methodology for highly automated machine learning approach to smart grid stability prediction. Stability predictio...
The underlying infrastructure paradigms behind the novel usage scenarios and services are becoming increasingly complex—from everyday life in smart cities to industrial environments. Both the number of devices involved and their heterogeneity make the allocation of software components quite challenging. Despite the enormous flexibility enabled by c...
The application of model transformations is a critical component in Model-Driven Engineering (MDE). To ensure the correctness of the generated models, these model transformations need to be extensively tested. However, during the regression testing of these model transformations, it becomes too costly to frequently run a large number of test cases....
Background: Model transformations play a key role in Model-Driven Engineering (MDE). Testing model transformation is an important activity to ensure the quality and correctness of the generated models. However, during the evolution and maintenance of these model transformation programs, frequently testing them by running a large number of test case...
The software component allocation problem is concerned with mapping a set of software components to the computational units available in a heterogeneous computing system while maximizing a certain objective function. This problem is important in the domain of component-based software engineering, and solving it is not a trivial task. In this paper,...
Background: The comprehensive representation of functional requirements is a crucial activity in the analysis phase of the software development life cycle. Representation of a complete set of functional requirements helps in tracing business goals effectively throughout the development life cycle. Use case modelling is one of the most widely-used m...
We extend an approach to component allocation on heterogeneous embedded systems using Coloured Petri Nets (CPNs). We improve the CPN model for the embedded systems and outline a technique that exploits CPN Tools, a well-known CPN tool, to efficiently analyze embedded system's state space and find optimal allocations. The approach is model-based and...
In this paper, we present a new approach to server consolidation in heterogeneous computer clusters using Colored Petri Nets (CPNs). Server consolidation aims to reduce energy costs and improve resource utilization by reducing the number of servers necessary to run the existing virtual machines in the cluster. It exploits the emerging technology of...
The provision of service enabled connectivity is the significant art of clouds. The long-held dream of computing as a utility has become reality in the era of cloud computing. Cloud users are now able to run and access their applications from anywhere in the world on demand. The proposed research considers dynamic capacity planning for cloud system...
In this paper, we present a new approach to server consolidation in heterogeneous clusters using Coloured Petri Nets (CPNs). We explore the use of CPN Tools in analyzing the state spaces of the CPNs. Our approach is shown to reduce the number of servers in the consolidated environment while minimizing the migration overhead. Several techniques are...
Typical web applications employ a multi-tier architecture. Traditionally, a pool of physical servers is used to host web applications. To handle the dynamic workloads which characterize today’s web applications, several authors have proposed schemes for dynamic resource provisioning. Such schemes add more servers during peak loads and remove server...
Advances in technology and economical pressure have forced many organizations to consider the migration of their legacy systems to newer platforms. Legacy systems typically provide mission critical services vital for an organization's business needs. These systems are usually very large and highly complex with little or no documentation. Furthermor...
Advances in technology and economical pressure have forced many organizations to consider the migration of their legacy systems to newer platforms. Legacy systems typically provide mission critical services vital for an organization's business needs. These systems are usually very large and highly complex with little or no documentation. Furthermor...
Advances in technology and economical pressure have forced many organizations to consider the migration of their legacy systems to newer platforms.
Legacy systems typically provide mission critical services vital for an organization's business needs. These systems are usually very large and highly complex with little or no documentation. Furthermor...
Desktop Grids have emerged as an important methodology to harness the idle cycles of millions of participant desktop PCs over the Internet. However, to effectively utilize the resources of a Desktop Grid, it is necessary to use scheduling policies suitable for such systems. In this paper, we analyze the performance of a policy which is shown to per...
In the past few years, scheduling for computer clusters has become a hot topic. The main focus has been towards achieving better performance. It is true that this goal has been attained to a certain extent, but on the other hand, it has been at the expense of increased energy consumption and consequent economic and environmental costs. As these clu...
Several decentralized load balancing policies have been proposed to address the issue of scalability in grids.However, the communication overhead incurred in exchanging state information remains a burden. In this paper, we propose a dynamic, decentralized load balancing policy which performs very competitively in heterogeneous grids. The policy use...
Desktop Grids are rapidly gaining popularity as a cost- effective computing platform for the execution of applications with extensive computing needs. As opposed to grids and clus- ters, these systems are characterized by having a non-dedicated infrastructure. These unique characteristics need to be consid- ered in developing resource management st...
Resource management systems (RMS) are an important component in heterogeneous computing (HC) systems. One of the jobs of an RMS is the mapping of arriving tasks onto the machines of the HC system. Many different mapping heuristics have been proposed in recent years. However, most of these heuristics suffer from several limitations. One of these lim...
Desktop grids have emerged as an important methodology to harness the idle cycles of millions of participant desktop PCs over the Internet. However, to effectively utilize the resources of a desktop grid, it is necessary to use scheduling policies suitable for such systems. A scheduling policy must be applicable to large-scale systems involving lar...
Resource management systems (RMS) are an important component in heterogeneous computing (HC) systems. One of the jobs of an RMS is the mapping of arriving tasks onto the machines of the HC system. Many different mapping heuristics have been proposed in recent years. However, most of these heuristics suffer from several limitations. One of these lim...
This paper deals with designing effective resource management strategies for systems of heterogeneous computers. Each computer is represented as an abstract server, capable of serving different task demands at different rates. We consider a system with I types of independent Poisson task demand arrival streams and J parallel servers with independen...
In this paper, we present a technique to model and analyse cryptographic protocols using coloured Petri nets. A model of the protocol is constructed in a top-down manner: first the protocol is modeled without an intruder, then a generic intruder model is added. The technique is illustrated on the TMN protocol, with several mechanisms introduced to...
We present a technique to model and analyse cryptographic protocols using coloured Petri nets. A model of the protocol is constructed in a top-down manner: first the protocol is modeled without an intruder, then a generic intruder model is added. The technique is illustrated on the TMN protocol, with several mechanisms introduced to reduce the size...
An emerging trend in computing is to use distributed heterogeneous computing (HC) systems to execute a set of tasks. Cluster computer systems, grids, and Desktop Grids are three popular kinds of HC systems. An important component of an HC system is its resource management system (RMS). The main responsibility of an RMS is assigning resources to tas...
Transactional Web applications are becoming more popular and hence more complex. A typical web application consists of one (or more) database server(s) and Web/application server(s). There are several deployment strategies for these components, one of which is to deploy both Web/application and database servers on a single machine. In this configur...