About
163
Publications
199,039
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,762
Citations
Publications
Publications (163)
The Internet of Things (IoT) is becoming the future of the Internet with a large number of connected devices that are predicted toreach about 50 billion by 2020. With proliferation of IoT devices and need to increase information sharing in IoT applications,risk-based access control model has become the best candidate for both academic and commercia...
The eGovernment initiative is aimed to improve government services to the public by improving the quality and availability of services that can be accessed regardless of time and place. Consequently, the services must always be available at any time, and any threat to the information and systems should receive attention to ensure business continuit...
Electronic government (e-Government) enables outstanding improvements to be made to services for the public by the government. This is achieved through improvements to service quality and availability for which access can be given regardless of place and time. In Indonesia, the implementation of e-Government is still not extensively comprehensive a...
Despite the effort and copious resources Saudi Arabia is investing in its transition towards e-government, it is hindered by the weakness of the information and communication technology infrastructure in its government agencies. The development of a private government cloud is a solution for improving and standardising the ICT infrastructure, but c...
Cloud computing is a new paradigm that promises to move IT a step further towards utility computing, in which computing services are delivered as a utility service. Traditionally, Cloud employs dedicated resources located in one or more data centres in order to provide services to clients. Desktop Cloud computing is a new type of Cloud computing th...
p>Electronic government (eGovernment) goals are improving the availability and quality of services that can be accessed regardless of time and place to improve government services to the public. In order to achieve this, the implementation of information assurance (IA) which its purpose is to ensure business continuity in the event of an incident i...
p>The goals of electronic government (eGovernment) services are improving the availability and quality of services to enhance government services to the citizens. One way to achieve it is with the implementation of information assurance (IA) which the purpose is to minimise risks linked to information and systems and assuring business continuity in...
The Internet of Things (IoT) has become one of the unprecedented research trends for both academic and commercial organizations. Every day, the publicity of the IoT is increased. This is because the unlimited benefits that the IoT can bring to our environment. The IoT has the ability to connect almost all objects of real-world to communicate and co...
Nanotechnology provides new solutions for numerous applications that have a significant effect on almost every aspect of our community including health monitoring, smart cities, military, agriculture, and industry. The interconnection of nanoscale devices with existing communication networks over the Internet defines a novel networking paradigm cal...
The Internet of Things (IoT) is a promising technology that can connect and communicate virtual and physical objects globally. It allows billions of devices to be connected and communicate with each other to share information that creates new application and services. These services result in improving our quality of life. On the other hand, Artifi...
With the rapid growth of Internet of Things (IoT) applications, the classic centralized cloud computing paradigm faces several challenges such as high latency, low capacity and network failure. To address these challenges, fog computing brings the cloud closer to IoT devices. The fog provides IoT data processing and storage locally at IoT devices i...
Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant...
One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an efficient access control model for the IoT require selecting an appropriate access policy language to implement access policies. After reviewing different access policy languages, th...
This article illustrates the importance of gathering and analyzing preprocessing data for unlisted but rich firms such as venture capital firms. Using datasets from three major sources, the authors demonstrate how to query and analyze data using both Datastream and SQL.
E learning is an essential approach, and one which complements the traditional teaching
approach. The use of e learning has increased due to the rapid development of Information
and Communication Technology (ICT). This growth has encouraged many institutions to
adopt e learning and use it to train, teach, and deliver learning to students. Howeve...
This paper demonstrates our proposed Multi-core architecture for a hybrid information system (HIS) with the related work, system design, theories, experiments, analysis and discussion presented. Different designs on clusters, communication between different types of chips and clusters and network queuing methods have been described. Our aim is to a...
Electronic government (eGovernment) services are aimed to improve government services to the public by improving the quality and availability of services that can be accessed regardless of time and place. Consequently, the services must always be available at any time, and any threat to the information and systems should receive attention to ensure...
In many developing countries such as Saudi Arabia the adoption of cloud computing is still at an early stage. This research aims to investigate the influencing factors in the decision to adopt cloud computing in the private sector. An integrated model is proposed incorporating critical factors derived from a literature review, along with other fact...
Saudi universities have at their disposal a huge number of low cost IT resources to aid in
teaching, research and learning. By migrating to cloud services, Saudi universities will be
moving data and programs from local servers to the internet, thereby providing users with
the ability to access and share information at any time from multiple devices...
The Internet of Things (IoT) is becoming the next Internet-related revolution. It allows billions of devices to be connected and communicate with each other to share information that improves the quality of our daily lives. On the other hand, Cloud Computing provides on-demand, convenient and scalable network access which makes it possible to share...
The Internet of Things (IoT) is creating a revolution in the number of connected devices. Cisco reported that there were 25 billion IoT devices in 2015 and modest estimation that this number will almost double by 2020. Society has become dependent on these billions of devices, devices that are connected and communicating with each other all the tim...
The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction...
The Internet of Things (IoT) represents a modern approach where boundaries between real and digital domains are progressively eliminated by changing over consistently every physical device to smart object ready to provide valuable services. These services provide a vital role in different life domains but at the same time create new challenges part...
The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction...
Cloud computing technologies can play an essential role in public organisations and companies while it reduces the cost of using information technology services. It allows users to access the service anytime and anywhere, with paying for what they use. In developing countries, such as Saudi Arabia, the cloud computing is still not extensively adopt...
Many have argued that cloud computing is one of the fastest growing and most transformative technologies in the history of computing. It has radically changed the way in which information technologies can manage, access, deliver and create services. It has also brought numerous benefits to end-users and organizations. However, this rapid growth in...
In the last few years, the cloud-computing paradigm experienced a considerable growth, making it the de-facto technology fueling almost all major online services. Nowadays, Universities have become more reliant on Information and Communication Technology (ICT) to provide educational services for their stakeholders. While most of the Universities in...
Assessing the security of data stored in cloud storage can be carried out by developing goal-based measurement items. The measurement items can be utilized to construct a security assessment model based on practical needs. The measurement items can assist in acquiring support decision making on the implementation of a security frameworks. This pape...
There are several benefits of using cloud computing in organizations and government agencies such as cost saving and flexibility in getting resources. Cloud computing plays a significant changing in organizations since it allows the users to access the service anytime and everywhere via networks, with paying for using only. In developing countries,...
Any organisation using the internet to conduct business is vulnerable to violation of security. Currently security in most organizations relates to protection of data and the management of their business information systems. Hence, security is often de?ned as the protection of information, the system, and hardware; that use, store and relocates tha...
Many have argued that cloud computing is one of the fastest growing and most transformative technologies in the history of computing. It has radically changed the way in which information technologies can manage, access, deliver and create services. It has also brought numerous benefits to end-users and organizations. However, this rapid growth in...
Enterprise security is an important area since all types of organizations require secure and robust environments, platforms and services to work with people, data and computing applications. The book provides selected papers of the Second International Workshop on Enterprise Security held in Vancouver, Canada, November 30-December 3, 2016 in conjun...
With the rapid evolution of Information Technology (IT) applications and practices across the organization, appropriate IT Governance (ITG) has become essential to an organization’s success. As IT is associated with risk and value opportunities, a comprehensive, high-level system is required in each organization to minimise the associated risks and...
In the last few years, the cloud computing paradigm experienced a considerable growth, making it the de-facto technology fuelling almost all major online services. At the same time, the concept of Internet of Things has started to gain mainstream traction with the promise to usher a new era of pervasive sensing using a weave of numerous inter-conne...
Cloud computing technologies play a substantial role in public organizations and private sector companies since it reduces the cost of using information technology services and allows users to access the service anytime and everywhere, whilst only paying for what they use. In developing countries, such as Saudi Arabia, the cloud computing is still...
Nowadays, Universities have become more reliant on Information and Communication Technology (ICT) to provide educational services for their stakeholders. While most of the Universities in Europe and North America has harnessed the capabilities of cloud services to provide large scale flexibly electronic educational services. In Saudi Arabia, Most o...
Saudi universities have at their disposal a huge number of low cost IT resources to aid in teaching, research and learning. By migrating to cloud services, Saudi universities will be moving data and programs from local servers to the internet, thereby providing users with the ability to access and share information at any time from multiple devices...
This paper investigates the history of economic bubbles and attempts to identify whether there are direct correlations between different bubbles. To support this research, literature has been consulted on historical and recent bubbles, theories surrounding speculation, the market for venture capital, and bubbles in the technology sector. By analysi...
While Data Science has become increasingly significant for business strategies, operations, performance, efficiency and prediction, there is little work on this to provide a detailed guideline. We have proposed a Business Data Science (BDS) model that focuses on the model and experimental development that allows different types of functions, proces...
Although it has been around for 11 years, it is still not clear where Web 2.0 will lead. This paper presents a general discussion of past and recent trends that may positively influence the direction of Web 2.0, including cloud computing and other emerging business models. In order to move forward, Web 3.0 is proposed for the next generation of wor...
This paper discusses the security of data in cloud computing. It is a study of data in the cloud and aspects related to it concerning security. The paper will go in to details of data protection methods and approaches used throughout the world to ensure maximum data protection by reducing risks and threats. Availability of data in the cloud is bene...
This study aims to identify key factors that organizations should consider when deciding whether to adopt cloud computing, and sets out a framework for how these factors can be weighed in order to make a decision. The study uses the Saudi Government agencies as a case study and makes several specific recommendations that pertain to the Saudi author...
There are several benefits of using cloud computing in organizations and government agencies such as cost saving and flexibility in getting resources. Cloud computing plays a significant changing in organizations since it allows the users to access the service anytime and everywhere via networks, with paying for using only. In developing countries,...
There are a variety of ways to ensure the security of data in the cloud depending on the set of anticipated concerns. Many cloud storage secure data either by encrypting data on transfer, or by encrypting data at rest. These security protections seem very different, and currently there are no common goalbased security components for comparing them....
Research associated with Big Data in the Cloud will be important topic over the next few years. The topic includes work on demonstrating architectures, applications, services, experiments and simulations in the Cloud to support the cases related to adoption of Big Data. A common approach to Big Data in the Cloud to allow better access, performance...
Open Journal of Big Data (OJBD) is an open access journal addressing aspects of Big Data, including new methodologies, processes, case studies, poofs-of-concept, scientific demonstrations, industrial applications and adoption. This editorial presents three articles in the second issue. The first paper is on Big Data in the Cloud. The second paper i...
Welcome to our second international workshop on Enterprise Security as part of CloudCom 2015, Vancouver, Canada, November 30-December 3, 2015. The first international workshop held in Singapore has been a major success since then we have achieved greater team activities, research, and international collaborations as the major and significant outcom...
Cloud computing is a new paradigm that promises to move IT a step further towards utility computing, in which computing services are delivered as a utility service. Traditionally, Cloud employs dedicated resources located in one or more data centres in order to provide services to clients. Desktop Cloud computing is a new type of Cloud computing th...
This chapter presents a selected review for Cloud Computing and explains the issues and risks of adopting Cloud Computing in a business environment. Although all the risks identified may be associated with two major Cloud adoption challenges, a framework is required to support organisations as they begin to use Cloud and minimise risks of Cloud ado...
Cloud storage is becoming an option for users in keeping their data online, but it comes with the security threats and challenges of protecting their data from threats. Many security frameworks have been suggested by existing studies, governing bodies, industry standards etc. as guidelines to be implemented by cloud service providers (CSPs) but the...
Cloud computing is an emerging technology which promises to bring with it great benefits to all types of computing activities including business support. However, the full commitment to Cloud computing necessary to gain the full benefit is a major project for any organisation, since it necessitates adoption of new business processes and attitudes t...
This paper considers the performance of interconnection networks in single-core and multi-core cluster architectures. Several parameters and system configurations are considered to optimise the performance of single-core cluster as a baseline experiment. These results have been extended to multi-core cluster architectures. The performance measureme...
Limitations imposed by the traditional practice in financial institutions of running price and risk analysis on the desktop drive analysts to use simplified models in order to obtain acceptable response times. Typically these models make assumptions about the distribution of market events like defaults. One popular model is Gaussian Copula which as...
More and more data is stored in personal cloud storage and it is expected to grow further. As cloud storage is becoming an option for user in keeping their data online, it comes with the security threats and the challenges of protecting their data from unauthorised access. Many security controls have been implemented by cloud storage providers (CSP...
The Open Journal of Big Data is a new open access journal addressing aspects of Big Data, including new
methodologies, processes, case studies, poofs-of-concept, scientific demonstrations, industrial applications and
adoption. This editorial presents the two articles in this first issue. The first paper is on An Efficient Approach
for Cost Optimiza...
Cloud storage is becoming an option for users in keeping their data online, but it comes with the security requirements and challenges of protecting their data from threats. Many security frameworks have been suggested by existing studies, governing bodies, industry standards etc. as guidelines to be implemented by cloud service providers (CSPs) bu...
There are several advantages of utilising cloud computing in organisations such as cost saving and flexibility in acquiring resources. The use of cloud computing in developing countries, such as Saudi Arabia, is still in its early stages and has not been as widely adopted there as in developed countries. In fact, moving a current system to the clou...
nformation Technology (IT) plays an important role in enabling education services be delivered to users. Most education online services in universities have been run on the cloud to provide services to support students, lecturers, researchers and administration staff. These are enabled with the emergence of cloud computing in the world of IT. Cloud...
A multi-core cluster is a cluster composed of numbers of nodes where each node has a number of processors, each with more than one core within each single chip. Cluster nodes are connected via an interconnection network. Multi-cored processors are able to achieve higher performance without driving up power consumption and heat, which is the main co...
Cloud computing is a new paradigm that promises to move IT a step further towards utility computing, in which computing services are delivered as a utility service. Traditionally, Cloud employs dedicated resources located in one or more data centres in order to provide services to clients. Desktop Cloud computing is a new type of Cloud computing th...
This special issue of Open Journal of Cloud Computing (OJCC) (www.ronpub.com/journals/ojcc) reports work in
the field of emerging software as a service and analytics, and presents innovative approaches to delivering software services in research and enterprise communities. It contains extended versions of papers selected from the international work...
Cloud computing is paradigm that has emerged to deliver IT services to consumers as a utility service over the Internet. In developing countries, particularly Saudi Arabia, cloud computing is still not widely adopted. As a result, this study seeks to investigate the most influential factors that can encourage an organisation to use the cloud or whi...
The aim of this research is to design a new architecture for large-scale clusters to improve the communication within the interconnection network to gain higher performance. The new architecture will be based on clusters built using workstations containing multi cored processors in a multi-cluster architecture in the presence of uniform traffic. Mu...
Cloud computing is a paradigm for providing and delivering IT services over the Internet. The cloud can provide several benefits for organisations including cost reduction and flexibility. However, migrating an existing system to the cloud is not an easy task because it is dependent on a number of factors. Therefore, this research aims to investiga...
The inception of e-learning technologies has led to a tremendous increase in the use of e-learning systems to support blended learning in Universities by providing a mix of face-to-face classroom teaching, live e-learning, self-paced e-learning and distance learning. Despite the existing benefits of using e-learning, some higher education instituti...
We propose a Monte Carlo simulation as a service (MCSaaS) which takes the benefits from two sides: the accuracy and reliability of typical Monte Carlo simulations and the fast performance of offering services in the Cloud. In the use of MCSaaS, we propose to remove outliers to enhance the improvement in accuracy. We propose three hypotheses and des...
Multi-core clusters have emerged as an important contribution in computing technology for provisioning additional processing power in high performance computing and communications. Multi-core architectures are proposed for their capability to provide higher performance without increasing heat and power usage, which is the main concern in a single-c...
Desktop Cloud computing is the idea of benefiting from computing resources around us to build a Cloud system in order to have better usage of these resources instead of them being idle. However, such resources are prone to failure at any given time without prior knowledge. Such failure events have a can negative impact on the outcome of a Desktop C...
There are a number of risk domains that are relevant for information privacy and security in cloud-based scenarios and alternative deployment models, which require implementation of a number of controls. However, cloud service providers often take a one-size-fits-all approach and want all their customers to accept the same standardized contract, re...
With the continuous increase of the number of users and the size of their data, data deduplication becomes a necessity for cloud storage providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. The advantages of deduplication unfortunately come with a high cost in terms of new secu...
The unveiling of e-learning technologies has led to an increase in the use of e-learning systems also known as educational technologies to support blended learning in Universities by providing a mix of face-to-face classroom teaching, live e-learning, self-paced e-learning and distance learning. Despite the existing benefits of using e-learning, so...
As cloud becomes the tool of choice for more data storage services, the number of service providers has also increased. With these choices, organisations have a wide selection of services available to move their data to the cloud. However, the responsibility to maintain the security of sensitive data stored therein remains paramount. This paper wil...
Cloud has emerged as a new computing paradigm that promises to move into computing-as-utility era. Desktop Cloud is a new type of Cloud computing. It merges two computing models: Cloud computing and volunteer computing. The aim of Desktop Cloud is to provide Cloud services out of infrastructure that is not made for this purpose in order to reduce r...