Skip to main content

Research Repository

Advanced Search

All Outputs (5)

YASF: A Vendor-Agnostic Framework for Serverless Computing (2023)
Conference Proceeding
Giacomini, M., & Ullah, A. (2023). YASF: A Vendor-Agnostic Framework for Serverless Computing. In M. van Steen, & C. Pahl (Eds.), Proceedings of the 13th International Conference on Cloud Computing and Services Science (46-56). https://doi.org/10.5220/0011847700003488

The serverless execution model allows application developers to deploy their software using tiny functions with zero administration, no handling of resource provisioning, monitoring and scaling. Due to such advantages, the serverless model emerged as... Read More about YASF: A Vendor-Agnostic Framework for Serverless Computing.

(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption (2021)
Conference Proceeding
Bakas, A., Michalas, A., & Ullah, A. (2021). (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption. In Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event, November 23--24, 2020, Proceedings 25 (111-126). https://doi.org/10.1007/978-3-030-70852-8_7

Functional Encryption (FE) allows users who hold a specific secret key (known as the functional key) to learn a specific function of encrypted data whilst learning nothing about the content of the underlying data. Considering this functionality and t... Read More about (F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption.

Attribute-Based Symmetric Searchable Encryption (2020)
Conference Proceeding
Dang, H., Ullah, A., Bakas, A., & Michalas, A. (2020). Attribute-Based Symmetric Searchable Encryption. In Applied Cryptography and Network Security Workshops (318-336). https://doi.org/10.1007/978-3-030-61638-0_18

Symmetric Searchable Encryption (SSE) is an encryption technique that allows users to search directly on their outsourced encrypted data while preserving the privacy of both the files and the queries. Unfortunately, majority of the SSE schemes allows... Read More about Attribute-Based Symmetric Searchable Encryption.

Genetic optimization of fuzzy membership functions for cloud resource provisioning (2017)
Conference Proceeding
Ullah, A., Li, J., Hussain, A., & Shen, Y. (2017). Genetic optimization of fuzzy membership functions for cloud resource provisioning. . https://doi.org/10.1109/SSCI.2016.7850088

The successful usage of fuzzy systems can be seen in many application domains owing to their capabilities to model complex systems by exploiting knowledge of domain experts. Their accuracy and performance are, however, primarily dependent on the desi... Read More about Genetic optimization of fuzzy membership functions for cloud resource provisioning.

Survival vs. revenue: modelling and reasoning on population dynamics (WIP) (2013)
Conference Proceeding
Bracciali, A., Caravagna, G., & Ullah, A. (2013). Survival vs. revenue: modelling and reasoning on population dynamics (WIP). In DEVS 13: Proceedings of the Symposium on Theory of Modeling & Simulation - DEVS Integrative M&S Symposium

We report on modelling a population dynamics problem by means of stochastic quantitative analysis. We are interested in the tension between survival of the population and revenue that can be obtained by its exploitation, and in showing how the chosen... Read More about Survival vs. revenue: modelling and reasoning on population dynamics (WIP).