SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Ghafoor Abdul) "

Sökning: WFRF:(Ghafoor Abdul)

  • Resultat 1-10 av 25
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Abbasi, Abdul Ghafoor, et al. (författare)
  • CryptoNET : Security Management Protocols
  • 2010
  • Ingår i: ADVANCES IN DATA NETWORKS, COMMUNICATIONS, COMPUTERS. - ATHENS : WORLD SCIENTIFIC AND ENGINEERING ACAD AND SOC. - 9789604742455 ; , s. 15-20
  • Konferensbidrag (refereegranskat)abstract
    • In this paper we describe several network security protocols used by various components of CryptoNET architecture. The protocols are based on the concept of generic security objects and on well-established security standards and technologies. Distinctive features of our security protocols are: (1) they are complete in terms of their functionality, (2) they are easy to integrate with applications, (3) they transparently handle security credentials and protocol-specific attributes using FIPS 201 (PIV) smart cards, and (4) they are based on generic security objects. These protocols are: remote user authentication protocol, single-sign-on protocol, SAML authorization protocol, and secure sessions protocol. Security protocols use our Security Provider as a collection of cryptographic engines implemented either in software or using FIPS 201 (NV) smart cards. It also manages protocols' attributes using security applets stored in Ply smart card.
  •  
2.
  • Abbasi, Abdul Ghafoor, 1977- (författare)
  • CryptoNET : Generic Security Framework for Cloud Computing Environments
  • 2011
  • Doktorsavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • The area of this research is security in distributed environment such as cloud computing and network applications. Specific focus was design and implementation of high assurance network environment, comprising various secure and security-enhanced applications. “High Assurance” means that -               our system is guaranteed to be secure, -               it is verifiable to provide the complete set of security services, -               we prove that it always functions correctly, and -               we justify our claim that it can not be compromised without user neglect and/or consent.   We do not know of any equivalent research results or even commercial security systems with such properties. Based on that, we claim several significant research and also development contributions to the state–of–art of computer networks security. In the last two decades there were many activities and contributions to protect data, messages and other resources in computer networks, to provide privacy of users, reliability, availability and integrity of resources, and to provide other security properties for network environments and applications. Governments, international organizations, private companies and individuals are investing a great deal of time, efforts and budgets to install and use various security products and solutions. However, in spite of all these needs, activities, on-going efforts, and all current solutions, it is general belief that the security in today networks and applications is not adequate. At the moment there are two general approaches to network application’s security. One approach is to enforce isolation of users, network resources, and applications. In this category we have solutions like firewalls, intrusion–detection systems, port scanners, spam filters, virus detection and elimination tools, etc. The goal is to protect resources and applications by isolation after their installation in the operational environment. The second approach is to apply methodology, tools and security solutions already in the process of creating network applications. This approach includes methodologies for secure software design, ready–made security modules and libraries, rules for software development process, and formal and strict testing procedures. The goal is to create secure applications even before their operational deployment. Current experience clearly shows that both approaches failed to provide an adequate level of security, where users would be guaranteed to deploy and use secure, reliable and trusted network applications. Therefore, in the current situation, it is obvious that a new approach and a new thinking towards creating strongly protected and guaranteed secure network environments and applications are needed. Therefore, in our research we have taken an approach completely different from the two mentioned above. Our first principle is to use cryptographic protection of all application resources. Based on this principle, in our system data in local files and database tables are encrypted, messages and control parameters are encrypted, and even software modules are encrypted. The principle is that if all resources of an application are always encrypted, i.e. “enveloped in a cryptographic shield”, then -               its software modules are not vulnerable to malware and viruses, -               its data are not vulnerable to illegal reading and theft, -               all messages exchanged in a networking environment are strongly protected, and -               all other resources of an application are also strongly protected.   Thus, we strongly protect applications and their resources before they are installed, after they are deployed, and also all the time during their use. Furthermore, our methodology to create such systems and to apply total cryptographic protection was based on the design of security components in the form of generic security objects. First, each of those objects – data object or functional object, is itself encrypted. If an object is a data object, representing a file, database table, communication message, etc., its encryption means that its data are protected all the time. If an object is a functional object, like cryptographic mechanisms, encapsulation module, etc., this principle means that its code cannot be damaged by malware. Protected functional objects are decrypted only on the fly, before being loaded into main memory for execution. Each of our objects is complete in terms of its content (data objects) and its functionality (functional objects), each supports multiple functional alternatives, they all provide transparent handling of security credentials and management of security attributes, and they are easy to integrate with individual applications. In addition, each object is designed and implemented using well-established security standards and technologies, so the complete system, created as a combination of those objects, is itself compliant with security standards and, therefore, interoperable with exiting security systems. By applying our methodology, we first designed enabling components for our security system. They are collections of simple and composite objects that also mutually interact in order to provide various security services. The enabling components of our system are:  Security Provider, Security Protocols, Generic Security Server, Security SDKs, and Secure Execution Environment. They are all mainly engine components of our security system and they provide the same set of cryptographic and network security services to all other security–enhanced applications. Furthermore, for our individual security objects and also for larger security systems, in order to prove their structural and functional correctness, we applied deductive scheme for verification and validation of security systems. We used the following principle: “if individual objects are verified and proven to be secure, if their instantiation, combination and operations are secure, and if protocols between them are secure, then the complete system, created from such objects, is also verifiably secure”. Data and attributes of each object are protected and secure, and they can only be accessed by authenticated and authorized users in a secure way. This means that structural security properties of objects, upon their installation, can be verified. In addition, each object is maintained and manipulated within our secure environment so each object is protected and secure in all its states, even after its closing state, because the original objects are encrypted and their data and states stored in a database or in files are also protected. Formal validation of our approach and our methodology is performed using Threat Model. We analyzed our generic security objects individually and identified various potential threats for their data, attributes, actions, and various states. We also evaluated behavior of each object against potential threats and established that our approach provides better protection than some alternative solutions against various threats mentioned. In addition, we applied threat model to our composite generic security objects and secure network applications and we proved that deductive approach provides better methodology for designing and developing secure network applications. We also quantitatively evaluated the performance of our generic security objects and found that the system developed using our methodology performs cryptographic functions efficiently. We have also solved some additional important aspects required for the full scope of security services for network applications and cloud environment: manipulation and management of cryptographic keys, execution of encrypted software, and even secure and controlled collaboration of our encrypted applications in cloud computing environments. During our research we have created the set of development tools and also a development methodology which can be used to create cryptographically protected applications. The same resources and tools are also used as a run–time supporting environment for execution of our secure applications. Such total cryptographic protection system for design, development and run–time of secure network applications we call CryptoNET system. CrytpoNET security system is structured in the form of components categorized in three groups: Integrated Secure Workstation, Secure Application Servers, and Security Management Infrastructure Servers. Furthermore, our enabling components provide the same set of security services to all components of the CryptoNET system. Integrated Secure Workstation is designed and implemented in the form of a collaborative secure environment for users. It protects local IT resources, messages and operations for multiple applications. It comprises four most commonly used PC applications as client components: Secure Station Manager (equivalent to Windows Explorer), Secure E-Mail Client, Secure Web Browser, and Secure Documents Manager. These four client components for their security extensions use functions and credentials of the enabling components in order to provide standard security services (authentication, confidentiality, integrity and access control) and also additional, extended security services, such as transparent handling of certificates, use of smart cards, Strong Authentication protocol, Security Assertion Markup Language (SAML) based Single-Sign-On protocol, secure sessions, and other security functions. Secure Application Servers are components of our secure network applications: Secure E-Mail Server, Secure Web Server, Secure Library Server, and Secure Software Distribution Server. These servers provide application-specific services to client components. Some of the common security services provided by Secure A
  •  
3.
  • Abbasi, Abdul Ghafoor, et al. (författare)
  • Security extensions of windows environment based on FIPS 201 (PIV) smart card
  • 2011
  • Ingår i: World Congr. Internet Secur., WorldCIS. - : IEEE. - 9780956426376 ; , s. 86-92
  • Konferensbidrag (refereegranskat)abstract
    • This paper describes security extensions of various Windows components based on usage of FIPS 201 (PIV) smart cards. Compared to some other similar solutions, this system has two significant advantages: first, smart cards are based on FIPS 201 standard and not on some proprietary technology; second, smart card security extensions represent an integrated solution, so the same card is used for security of several Microsoft products. Furthermore, our smart card system uses FIPS 201 applet and middleware with smart card APIs, so it can also be used by other developers to extend their own applications with smart card functions in a Windows environment. We support the following security features with smart cards: start-up authentication (based on PIN and/or fingerprint), certificate-based domain authentication, strong authentication, and protection of local resources. We also integrated our middleware and smart cards with MS Outlook and MS Internet Explorer.
  •  
4.
  • Abbasi, Abdul Ghafoor, et al. (författare)
  • Web contents protection, secure execution and authorized distribution
  • 2010
  • Ingår i: Proceedings - 5th International Multi-Conference on Computing in the Global Information Technology, ICCGI 2010. - 9780769541815 ; , s. 157-162
  • Konferensbidrag (refereegranskat)abstract
    • This paper describes the design and implementation of a comprehensive system for protection of Web contents. In this design, new security components and extended security features are introduced in order to protect Web contents ageist various Web attacks. Components and extended security features are: protection of Web pages using strong encryption techniques, encapsulation of Web contents and resources in PKCS#7, extended secure execution environment for Java Web Server, eXtensible Access Control Markup Language (XACML) based authorization policies, and secure Web proxy. Design and implementation of our system is based on the concepts of generic security objects and component-based architecture that makes it compatible with exiting Web infrastructures without any modification.
  •  
5.
  • Aftab, Muhammad Usman, et al. (författare)
  • Towards A Distributed Ledger Based Verifiable Trusted Protocol for VANET
  • 2021
  • Ingår i: 2021 International Conference on Digital Futures and Transformative Technologies, ICoDT2 2021. - : Institute of Electrical and Electronics Engineers Inc.. - 9781665412858
  • Konferensbidrag (refereegranskat)abstract
    • To ensure traffic safety and proper operation of vehicular networks, safety messages or beacons are periodically broadcasted in Vehicular Adhoc Networks (VANETs) to neighboring nodes and road side units (RSU). Thus, authenticity and integrity of received messages along with the trust in source nodes is crucial and highly required in applications where a failure can result in life-threatening situations. Several digital signature based approaches have been described in literature to achieve the authenticity of these messages. In these schemes, scenarios having high level of vehicle density are handled by RSU where aggregated signature verification is done. However, most of these schemes are centralized and PKI based where our goal is to develop a decentralized dynamic system. Along with authenticity and integrity, trust management plays an important role in VANETs which enables ways for secure and verified communication. A number of trust management models have been proposed but it is still an ongoing matter of interest, similarly authentication which is a vital security service to have during communication is not mostly present in the literature work related to trust management systems. This paper proposes a secure and publicly verifiable communication scheme for VANET which achieves source authentication, message authentication, non repudiation, integrity and public verifiability. All of these are achieved through digital signatures, Hash Message Authentication Code (HMAC) technique and logging mechanism which is aided by blockchain technology.
  •  
6.
  • Altmann, Peter, et al. (författare)
  • Creating a Traceable Product Story in Manufacturing Supply Chains Using IPFS
  • 2020
  • Ingår i: 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA). - Boston/New York : IEEE. ; , s. 11-18
  • Konferensbidrag (refereegranskat)abstract
    • Evolving traceability requirements increasingly challenge manufacturing supply chain actors to collect tamperproof and auditable evidence about what inputs they process, in what way these inputs are used, and what the resulting process outputs are. Traceability solutions based on blockchain technology have shown ways to satisfy the requirements of creating a tamper-proof and auditable trail of traceability data. However, the existing solutions struggle to meet the increasing storage requirements necessary to create an evidence trail using manufacturing data. In this paper, we show a way to create a tamper-proof and auditable evolving product story that uses a decentralized file system called the InterPlanetary File System (IPFS). We also show how using linked data can help auditors derive a traceable product story from such an accumulating evidence trail. The solution proposed herein can supplement existing blockchain-based traceability solutions and enable traceability in global manufacturing supply chains where forming a consortium incurs prohibitive costs and where storage requirements are high.
  •  
7.
  • André, Alann, et al. (författare)
  • Digital platform for managementof EoL windturbine blades : Rekovind 2 - WP2
  • 2023
  • Rapport (övrigt vetenskapligt/konstnärligt)abstract
    • The Rekovind2 project, financed by the Swedish Energy Agency, focuses on digitizing wind turbine blade streams for reuse and recycling. This is of the utmost importance to enable new, more circular technical solutions that can replace today’s non-sustainable recycling, i.e. landfill and incineration of wind turbine blades. In this report, the work carried out to map the wind turbine blades in service in Sweden is presented. The digital platform intended to make possible the re-use of blades reaching end-of-life is build around key features that will be required for re-use: blade database with all needed informations on the blade (age, damages, material, model, ...), map with blades geolocation, digital tool to help blade processing such as cutting, and information on what can be done with EoL blades.
  •  
8.
  • Batra, Rakhi, et al. (författare)
  • Evaluating Polarity Trend Amidst the Coronavirus Crisis in Peoples's Attitudes toward the Vaccination Drive
  • 2021
  • Ingår i: Sustainability. - : MDPI. - 2071-1050. ; 13:10
  • Tidskriftsartikel (refereegranskat)abstract
    • It has been more than a year since the coronavirus (COVID-19) engulfed the whole world, disturbing the daily routine, bringing down the economies, and killing two million people across the globe at the time of writing. The pandemic brought the world together to a joint effort to find a cure and work toward developing a vaccine. Much to the anticipation, the first batch of vaccines started rolling out by the end of 2020, and many countries began the vaccination drive early on while others still waiting in anticipation for a successful trial. Social media, meanwhile, was bombarded with all sorts of both positive and negative stories of the development and the evolving coronavirus situation. Many people were looking forward to the vaccines, while others were cautious about the side-effects and the conspiracy theories resulting in mixed emotions. This study explores users's tweets concerning the COVID-19 vaccine and the sentiments expressed on Twitter. It tries to evaluate the polarity trend and a shift since the start of the coronavirus to the vaccination drive across six countries. The findings suggest that people of neighboring countries have shown quite a similar attitude regarding the vaccination in contrast to their different reactions to the coronavirus outbreak.
  •  
9.
  • Ghafoor, Abdul, et al. (författare)
  • Fate of straw- and root-derived carbon in a Swedish agricultural soil
  • 2017
  • Ingår i: Biology and Fertility of Soils. - : Springer Science and Business Media LLC. - 0178-2762 .- 1432-0789. ; 53, s. 257-267
  • Tidskriftsartikel (refereegranskat)abstract
    • To maximise carbon (C) storage in soils, understanding the fate of C originating from aboveground and belowground residues and their interaction with fertiliser under field conditions is critically important. The use of C-13 natural abundance provides unique opportunities to separate both C sources. We investigated the effect of 16 years of C3 straw and C4 root input, with and without nitrogen (N) addition, on SOC stocks and C distribution in soil fractions in the long-term frame trial at Ultuna, Sweden. The straw C input was fixed at 1.77 Mg ha(-1) year(-1), while the root input depended on maize plant growth, enabling studies on how N fertilisation affected (i) stabilisation of residues and (ii) plant C allocation to belowground organs. Four treatments were investigated: only maize roots (Control), maize roots with N (Control + N), maize roots and straw (Straw) and maize roots, straw and N (Straw + N). After 16 years, 5.6-8.9% of the total SOC stock in the 0-20 cm soil layer was maize-derived. In all four treatments, the relatively labile SOC fractions decreased, while the proportion of more refractory fractions increased. Based on allometric calculation of root inputs, retention of maize roots was 38, 26, 36 and 18% in the Control, Control + N, Straw and Straw + N treatments, respectively. The estimated retention coefficient of C3 straw in the Straw + N treatment was higher than that in the Straw-N treatment. We interpreted these results thus (1) roots were better stabilised in the soil than straw; (2) N fertilisation caused a shift in root to shoot ratio, with relatively more roots being present in N-deficient soil; and (3) N fertilisation caused greater stabilisation of residues, presumably due to increased microbial C use efficiency.
  •  
10.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 25
Typ av publikation
konferensbidrag (13)
tidskriftsartikel (9)
doktorsavhandling (2)
rapport (1)
Typ av innehåll
refereegranskat (20)
övrigt vetenskapligt/konstnärligt (5)
Författare/redaktör
Ghafoor, Abdul (20)
Jarvis, Nicholas (6)
Stenström, John (5)
Abbasi, Abdul Ghafoo ... (4)
Sköldström, Pontus (4)
Muftic, Sead (3)
visa fler...
Imran, Ali Shariq (3)
Kastrati, Zenun, 198 ... (3)
Daudpota, Sher Muham ... (3)
Batra, Rakhi (3)
Moeys, Julien (3)
Junique, Stephane (3)
Siracusa, Domenico (3)
Marsico, Antonio (3)
Khan, Zaheer (2)
Lindgren, Anders, 19 ... (2)
Shaikh, Sarang (2)
Thierfelder, Tomas (2)
Abbasi, Abdul Ghafoo ... (1)
Muftic, Sead, Profes ... (1)
Skarmeta, Antonio F. ... (1)
Mumtaz, Shahzad Ahme ... (1)
Altmann, Peter (1)
Hotamov, I. (1)
Andersson, Karl, 197 ... (1)
Aftab, Muhammad Usma ... (1)
Hussain, Mehdi (1)
Mattsson, Cecilia (1)
André, Alann (1)
Alizadeh, Morteza, 1 ... (1)
Schelén, Olov (1)
Kätterer, Thomas (1)
Bru, Thomas (1)
Sinha, Sugandh (1)
Larsbo, Mats (1)
Koestel, Johannes (1)
Poeplau, Christopher (1)
Chamania, Mohit (1)
Santuari, Michele (1)
Lopez, Victor (1)
Soomro, Abdullah (1)
Wani, Mudasir Ahmad (1)
Abbasi, Qudus (1)
Savi, Marco (1)
Jacob, Eduardo (1)
Pervez, Zeeshan (1)
Doriguzzi-Corin, Rob ... (1)
Matrakidis, Chris (1)
Klonidis, Dimitios (1)
Matias, Jon (1)
visa färre...
Lärosäte
RISE (9)
Sveriges Lantbruksuniversitet (8)
Kungliga Tekniska Högskolan (4)
Linnéuniversitetet (3)
Luleå tekniska universitet (1)
Språk
Engelska (25)
Forskningsämne (UKÄ/SCB)
Naturvetenskap (13)
Lantbruksvetenskap (6)
Teknik (4)
Samhällsvetenskap (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy