- Service-Oriented Architecture and Web Services
- Petri Nets in System Modeling
- Software System Performance and Reliability
- Business Process Modeling and Analysis
- Privacy-Preserving Technologies in Data
- Cloud Computing and Resource Management
- Access Control and Trust
- Privacy, Security, and Data Protection
- Cloud Data Security Solutions
- Cryptography and Data Security
- Distributed systems and fault tolerance
- Flexible and Reconfigurable Manufacturing Systems
- Mobile Health and mHealth Applications
- Distributed and Parallel Computing Systems
- Information Retrieval and Search Behavior
- Real-Time Systems Scheduling
- Context-Aware Activity Recognition Systems
- Advanced Software Engineering Methodologies
- Sustainable Industrial Ecology
- Web Data Mining and Analysis
- Model-Driven Software Engineering Techniques
- Data Management and Algorithms
Qassim University
2012-2016
University of Birmingham
2008-2011
The Internet of Things (IoT) is an ecosystem comprising interrelated wireless devices. Web services developed over Service oriented Architectures (SoA) are among the most promising solution to facilitate communication things in IoT. interact with each other, irrespective features such as operating system, or programming language. One main challenges facing a platform declaration SLAs, and monitoring violations. This because IoT allows users build large, distributed, complex applications....
This paper aims to present a method of creating architectures which allow monitoring occurrence failure in Service oriented Architectures (SoA). The presented approach extends Discrete Event Systems techniques produce automated creation Diagnoser monitors interaction between the services identify if has happened and type failure. To do so, formal representation business processes is introduced, allows modeling Observable/Unobservable events, failure.The puts forward set algorithms for models...
Due to the many advantages offered by cloud computing paradigm, it is fast becoming an enabling technology for organizations, and even individual users. Flexibility availability are two of most important features that promote wide spread adoption this technology. In cloud-based data storage scenarios, where controlled a third party (i.e. service provider), owner usually does not have full control its at all stages. Consequently, poses prime security threat, major challenge development secure...
One of the key stages development a fault tolerant service oriented architecture is creation diagnosers, which monitors systempsilas behaviour to identify occurrence failure. This paper presents model driven (MDD) approach automated diagnosing services and integrating them into system. The outline method as follows. BPEL models are transformed deterministic automaton with unobservable event representations using MDD transformations. Then, relying on discrete system techniques diagnoser for...
To guarantee privacy in service oriented environments, it is essential to check for compatibility between a client's requirements and Web policies before invoking the operation. In this paper, we focus on at operation level. We present an approach that integrates k-Anonymity into management framework using Services Conversation Language (WSCL) definitions. particular, use notion of determine extent which invocation can be inferred if one knows downstream was invoked. provide both formal...
Due to the many advantages offered by cloud computing paradigm, it is fast becoming an enabling technology for organizations, and even individual users. Flexibility availability are two of most important features that promote wide spread adoption this technology. In cloud-based data storage scenarios, where controlled a third party (i.e. service provider), owner usually does not have full control its at all stages. Consequently, poses prime security threat, major challenge development secure...
Access Control Policies are one of the key challenges affecting Service oriented Architectures (SoA). This is due to nature SoA, which based on distributed invocations Web services. makes it crucial develop a method on-line assignment for and paper proposes service referred as (AC Polices), allows simulation verification information flow security access control policies. It extends an existing approach that was proposed coordinate services from performance perspective, harnesses capability...
Failure detection in partially observable model based Discrete Event Systems requires modelling failures as unobservable events within the system. Representing is not always realistic. For example, some classes of failure are form violations constraints such Service Level Agreement (SLA) and Quality (QoS). These forms do represent by themselves. They have to be modelled additional events. Modifying plant acceptable. Firstly, this may make models large, causing extra computational complexity....
Service-oriented Architecture (SoA) is a layered architecture used to organize software resources as services that can be deployed, discovered and combined produce new services. The interactions between affected in situations where destination service becomes unavailable. Herein, the Protocol introduced solution coordinate method then extended consider automatic assignment of access control policies by generation service, called Access Control Policies (AC_Policies) which linked service. In...
With the adoption of mobile healthcare applications and success cloud service models, we propose a privacy management framework for health care with support dynamic data sharing. Our solution extends XACML policy language by incorporating user access context into rule enforcement. We provide an implementation our approach that builds on top Google App Engine platform. also preliminary evaluation indicates overhead incurred is minimal.
In modern service oriented architectures (SoA) identifying the occurrences of failure is a crucial task, which can be carried out by creation diagnosers to monitor behavior system. Model driven architecture (MDA) used automatically create and integrate them into system identify if has occurred. There are different methods incorporating diagnoser group interacting services. One option modify BPEL file representing services incorporate diagnoser. Another implement as separate interacts with...
Cloud computing is an emerging model of business that can be used to maintain configurable resources such as processors, networks, storage, operating systems, databases, and servers.Service oriented Architecture (SoA) one most successful paradigms deployed over the Cloud; a layered architecture organize software services facilitate their deployment, discovery, combination produce new services.The coordination innovations carried out between these key challenge SoA, any failings in could...
Cloud computing is an emergent technology that offers a pool of configurable resources such as processors, networks, storages, operating system, database, and servers. These are offered Web services deployed on the cloud. The coordination interactions between these one key challenges cloud architecture. Any failings in could lead to lack availability, which may violate Service Level Agreements causing financial penalties, customer dissatisfaction, or energy. Therefore, it essential, from...
Network-based cloud computing is considered to be an emerging model of business computing, which maintains configurable resources such as processors, networks, storage, operating systems, database, and servers. One the most successful paradigms that can configured over Service oriented Architecture (SoA) environment, provides a layered architecture for organising software services, so they deployed, discovered combined produce new services. The coordination interactions between services one...
Search engines are the fastest way to find and retrieve information on web. Their usefulness is evident from fact that three of most visited web sites internet search engines. With advanced algorithms ability go over millions records in mere milliseconds, time consuming part searching for required not itself but it takes sort through searched results. Specially when query vague, too broad or simply ill defined. This leads user a situation where results becomes unmanageably large confusing....
The Oracle Application Development Framework (Oracle ADF) has become increasingly important as a platform/paradigm for the purpose of building current and future enterprise projects. Such projects can easily be developed by following books manuals. However, process transforming existing from traditional platforms, to ADF format requires considerable effort high levels accuracy. In fact, accuracy is key when attempting ensure that remain error-free. Therefore, devising an approach facilitates...
Identifying occurrences of failure is a major challenge in business process management. Current monitoring techniques are invaluable tool for debugging and evaluating executions. In this paper method extending existing capabilities the systems to allow real-time or near-real-time discussed. The presented draws on Model Driven Development automatically create new module called Protocol Service. created Service deployed with system monitor undesirable events failure. outline approach will be presented.