Skip to main content

Research Repository

Advanced Search

Outputs (17)

PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks (2023)
Presentation / Conference Contribution
Ali, H., Abubakar, M., Ahmad, J., Buchanan, W. J., & Jaroucheh, Z. (2023, November). PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks. Presented at 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Edinburgh, United Kingdom

In recent years, there has been a significant proliferation of industrial Internet of Things (IoT) applications, with a wide variety of use cases being developed and put into operation. As the industrial IoT landscape expands, the establishment of se... Read More about PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks.

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform (2022)
Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., Abramson, W., & Buchanan, W. J. (2022). Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379

Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively, private blockchains are now widely used to address these issues and impro... Read More about Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform.

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers (2022)
Presentation / Conference Contribution
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2021, December). Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. Presented at IEEE SINCONF: 14th International Conference on Security of Information and Networks, Edinburgh

Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the... Read More about Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers.

Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems (2021)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. (2021, October). Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. Presented at 2021 5th Cyber Security in Networking Conference (CSNet), Abu Dhabi, United Arab Emirates

The Session Initiation Protocol (SIP) is the principal signalling protocol in Voice over IP (VoIP) systems, responsible for initialising, terminating, and maintaining sessions amongst call parties. However, the problem with the SIP protocol is that i... Read More about Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems.

A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data (2021)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. J. (2021, August). A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data. Presented at 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), Barcelona, Spain

Recent years have seen an increase in medical big data, which can be attributed to a paradigm shift experienced in medical data sharing induced by the growth of medical technology and the Internet of Things. The evidence of this potential has been pr... Read More about A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data.

PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism (2020)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Buchanan, W. (2020, December). PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism. Presented at ICVISP 2020: The 2020 4th International Conference on Vision, Image and Signal Processing, Bangkok

The original consensus algorithm-Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ethereum, among many others. Nevertheless, the concept has received criticisms o... Read More about PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism.

Trust-based Ecosystem to Combat Fake News (2020)
Presentation / Conference Contribution
Jaroucheh, Z., Alissa, M., & Buchanan, W. J. (2020, May). Trust-based Ecosystem to Combat Fake News. Presented at 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada

The growing spread of misinformation and dis-information has grave political, social, ethical, and privacy implications for society. Therefore, there is an ethical need to combat the flow of fake news. This paper attempts to resolves some of the aspe... Read More about Trust-based Ecosystem to Combat Fake News.

A unified approach for the dynamic evolution of context-aware services. (2012)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2012, January). A unified approach for the dynamic evolution of context-aware services. Presented at International Conference on Innovations in Computers, Information and Communication - ICICIC 2012

Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications (2011)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., Smith, S., & Zhao, H. (2011, July). Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications. Presented at 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops

Protecting user's privacy is one of the main concerns for the deployment of pervasive computing systems in the real world. In pervasive environments, the user context information is naturally distributed among different spatial or logical domains. Ma... Read More about Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications.

An approach to domain-based scalable context management architecture in pervasive environments (2011)
Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2012). An approach to domain-based scalable context management architecture in pervasive environments. Personal and Ubiquitous Computing, 16(6), 741-755. https://doi.org/10.1007/s00779-011-0422-0

In pervasive environments, context management systems are expected to administrate large volume of contextual information that is captured from spatial to nonspatial elements. Research in context-aware computing produced a number of middleware system... Read More about An approach to domain-based scalable context management architecture in pervasive environments.

Recognize contextual situation in pervasive environments using process mining techniques (2010)
Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2011). Recognize contextual situation in pervasive environments using process mining techniques. Journal of Ambient Intelligence and Humanized Computing, 2(1), 53-69. https://doi.org/10.1007/s12652-010-0038-7

Research in pervasive computing and ambience intelligence aims to enable users to interact with the environment in a context-aware way. To achieve this, a complex set of features describing different aspects of the environment has to be captured and... Read More about Recognize contextual situation in pervasive environments using process mining techniques.

Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications (2010)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2010, August). Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications. Presented at 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology

Context-aware computing is widely accepted as a promising paradigm to enable seamless computing. Several middlewares and ontology-based models for describing context information have been developed in order to support context-aware applications. Howe... Read More about Mapping Features to Context Information: Supporting Context Variability for Context-Aware Pervasive Applications.

Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes (2010)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2010, July). Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes. Presented at 2010 IEEE International Conference on Web Services

Context-awareness and adaptability are important and desirable properties of service-based processes designed to provide personalized services. Most of the existing approaches focus on the adaptation at the process instance level [1] which involves e... Read More about Apto: A MDD-Based Generic Framework for Context-Aware Deeply Adaptive Service-Based Processes.

CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications (2010)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2010, February). CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications. Presented at 2010 International Conference on Complex, Intelligent and Software Intensive Systems

In a pervasive environment, it is essential for computing applications to be context-aware. However, one of the major challenges is the establishment of a generic and dynamic context model. Many different approaches to modeling the context exist, but... Read More about CANDEL: Product Line Based Dynamic Context Management for Pervasive Applications.

A Perspective on Middleware-Oriented Context-Aware Pervasive Systems (2009)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., & Smith, S. (2009, July). A Perspective on Middleware-Oriented Context-Aware Pervasive Systems. Presented at 2009 33rd Annual IEEE International Computer Software and Applications Conference

The evolving concepts of mobile computing, context-awareness, and ambient intelligence are increasingly influencing user's experience of services. Therefore, the goal of this paper is to provide an overview of recent developments and implementations... Read More about A Perspective on Middleware-Oriented Context-Aware Pervasive Systems.