Security Optimization and Management in Composed Web Services

Introduction

The aim of this project is to propose a new framework for the dynamic enforcement of composite Web services security, which is based on a synergy between Aspect-Oriented Programming (AOP) and BPEL (Business Process Execution Language). This synergy is achieved through the elaboration of a new language called AspectBPEL, which is used to specify security policies as separate components, referred to as aspects, to be weaved systematically in a BPEL process. Then, we identified some problems related to the complexity of XACML policies and performed experimental study in this regard. Afterwards, we extended the work with model-driven approach to address context-aware requirements and developed an Eclipse plugin for AspectBPEL and integrated it in the BPEL project. Finally, we addressed many concerns related to the efficiency of real-time decision process (i.e. policy evaluation) and the correctness of complex policies. In this regard, we proposed a novel set-based scheme that provides efficient evaluation and analysis of XACML policies. Our approach constitutes of elaborating (1) set-based language that covers all the XACML components and establish an intermediate layer to which policies are automatically converted, (2) policy evaluation module that provides better performance compared to the industrial standard Sun Policy Decision Point (PDP) and its corresponding ameliorations, and (3) policy analysis module that allows to detect flaws, conflicts and redundancies in XACML policies.

Contributions

FScaler: Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions pdf

Authors: Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabab Mizouni, Jamal Bentahar

AI-based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach Deep reinforcement Learning for proactive horizontal and vertical resource scaling. pdf

Authors: Hani Sami, Hadi Otrok, Jamal Bentahar, Azzam Mourad

Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement Deep Reinforcement Learning for Service Placement pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

Reinforcement R-learning Model for Time Scheduling of On-demand Fog Placement On-demand Fog Scheduling pdf

Authors: Peter Farhat, Hani Sami, Azzam Mourad

Vehicular-OBUs-As-On-Demand-Fogs: Resource and Context Aware Deployment of Containerized Micro-Services On-demand Vehicular Fog pdf

Authors: Hani Sami, Azzam Mourad, Wassim El-Hajj

Dynamic On-Demand Fog Formation Offering On-the-Fly IoT Service Deployment On-demand Fog Formation pdf

Authors: Hani Sami, Azzam Mourad

A survey on trust and reputation models for Web services: Single, composite, and communities pdf

Authors: Omar AbdelWahab, JamalBentahar, HadiOtrok, AzzamMourad

A Stackelberg game for distributed formation of business-driven services communities pdf

Authors: Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad

Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud pdf

Authors: Omar Abdel Wahab; Jamal Bentahar; Hadi Otrok; Azzam Mourad

Towards Trustworthy Multi-Cloud Services Communities: A Trust-Based Hedonic Coalitional Game pdf

Authors: Omar Abdel Wahab; Jamal Bentahar; Hadi Otrok; Azzam Mourad

An endorsement-based trust bootstrapping approach for newcomer cloud services pdf

Authors: Omar Abdel Wahab, Robin Cohen, Jamal Bentahar, Hadi Otrok,Azzam Mourad, Gaith Rjoub

Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection pdf

Authors: Azzam Mourad; Hanine Tout; Omar Abdel Wahab; Hadi Otrok; Toufic Dbouk

AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions pdf

Authors: Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabab Mizouni, Jamal Bentahar

VANET QoS-OLSR: QoS-based Clustering Protocol for Vehicular Ad Hoc Networks pdf

Authors: Omar Abdel Wahab, Hadi Otrok, Azzam Mourad

Reputation-based cooperative detection model of selfish nodes in cluster-based QoS-OLSR protocol. pdf

Authors: Nadia Moati · Hadi Otrok · Azzam Mourad · Jean-Marc Robert

CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks pdf

Authors: Omar Abdel Wahab, Azzam Mourad, Hadi Otrok, Jamal Bentahar

Towards Trustworthy Multi-Cloud Services Communities: A Trust-Based Hedonic Coalitional Game pdf

Authors: Omar Abdel Wahab; Jamal Bentahar; Hadi Otrok; Azzam Mourad

An endorsement-based trust bootstrapping approach for newcomer cloud services pdf

Authors: Omar Abdel Wahab, Robin Cohen, Jamal Bentahar, Hadi Otrok,Azzam Mourad, Gaith Rjoub

A novel aspect-oriented BPEL framework for the dynamic enforcement of web services security pdf

Authors: Azzam Mourad, Sara Ayoubi, Hamdi Yahyaoui, Hadi Otrok

New XACML-AspectBPEL approach for composite web services security pdf

Authors: Sara Ayoubi, Azzam Mourad, Hadi Otrok, Ahmad Shahin

Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies pdf

Authors: Hussein Jebbaoui, Azzam Mourad, Hadi Otrok, Ramzi Haraty

AOMD approach for context-adaptable and conflict-free Web-services composition pdf

Authors: Hanine Tout, Azzam Mourad, Chamseddine Talhi, Hadi Otrok

From model-driven specification to design-level set-based analysis of XACML policies pdf

Authors: AzzamMourad, Hanine Tout, Chamseddine Talhi, Hadi Otrok, Hamdi Yahyaoui

Optimal Load Distribution for the Detection of VM-Based DDoS Attacks in the Cloud pdf

Authors: Omar Abdel Wahab; Jamal Bentahar; Hadi Otrok; Azzam Mourad

An endorsement-based trust bootstrapping approach for newcomer cloud services pdf

Authors: Omar Abdel Wahab, Robin Cohen, Jamal Bentahar, Hadi Otrok,Azzam Mourad, Gaith Rjoub

Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach pdf

Authors: Bahia Halawi; Azzam Mourad; Hadi Otrok; Ernesto Damiani

Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection pdf

Authors: Azzam Mourad; Hanine Tout; Omar Abdel Wahab; Hadi Otrok; Toufic Dbouk

Ad Hoc Vehicular Fog Enabling Cooperative Low-Latency Intrusion Detection pdf

Authors: Azzam Mourad; Hanine Tout; Omar Abdel Wahab; Hadi Otrok; Toufic Dbouk

FScaler: Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions pdf

Authors: Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabab Mizouni, Jamal Bentahar

AI-based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach Deep reinforcement Learning for proactive horizontal and vertical resource scaling. pdf

Authors: Hani Sami, Hadi Otrok, Jamal Bentahar, Azzam Mourad

Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement Deep Reinforcement Learning for Service Placement pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

Reinforcement R-learning Model for Time Scheduling of On-demand Fog Placement On-demand Fog Scheduling pdf

Authors: Peter Farhat, Hani Sami, Azzam Mourad

Vehicular-OBUs-As-On-Demand-Fogs: Resource and Context Aware Deployment of Containerized Micro-Services On-demand Vehicular Fog pdf

Authors: Hani Sami, Azzam Mourad, Wassim El-Hajj

Dynamic On-Demand Fog Formation Offering On-the-Fly IoT Service Deployment On-demand Fog Formation pdf

Authors: Hani Sami, Azzam Mourad

Few are as Good as Many: An Ontology-Based Tweet Spam Detection Approach pdf

Authors: Bahia Halawi; Azzam Mourad; Hadi Otrok; Ernesto Damiani

Sampling Online Social Networks with Tailored Mining Strategies Social Networks Analysis PDF

Authors: Mohamad Arafeh, Paolo Ceravolo, Azzam Mourad, Ernesto Damiani

Ontology Based Recommender System Using Social Network Data social network, data miner, big data, data analysis, data sampling, ontology, recommender system PDF

Authors: Mohamad Arafeh, Paolo Ceravolo, Azzam Mourad, Ernesto Damiani, Emanuele Bellini

Smart mobile computation offloading: Centralized selective and multi-objective approach pdf

Authors: Hanine Tout; Chamseddine Talhi; Nadjia Karaa; Azzam Mourad

Selective Mobile Cloud Offloading to Augment Multi-Persona Performance and Viability pdf

Authors: Hanine Tout; Chamseddine Talhi; Nadjia Kara; Azzam Mourad

A Stackelberg game for distributed formation of business-driven services communities pdf

Authors: Omar Abdel Wahab, Jamal Bentahar, Hadi Otrok, Azzam Mourad

Towards Trustworthy Multi-Cloud Services Communities: A Trust-Based Hedonic Coalitional Game pdf

Authors: Omar Abdel Wahab; Jamal Bentahar; Hadi Otrok; Azzam Mourad

A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond pdf

Authors: Sawsan Abdulrahman; Hanine Tout; Hakima Ould-Slimane; Azzam Mourad; Chamseddine Talhi; Mohsen Guizani

Internet of Things Intrusion Detection: Centralized, On-Device, or Federated Learning? pdf

Authors: Sawsan Abdul Rahman; Hanine Tout; Chamseddine Talhi; Azzam Mourad

FedMCCS: Multicriteria Client Selection Model for Optimal IoT Federated Learning pdf

Authors: Sawsan Abdulrahman; Hanine Tout; Azzam Mourad; Chamseddine Talhi

A Blockchain based Architecture for the Detection of Fake Sensing in Mobile Crowdsensing Crowdsensing, fake sensing, Blockchain, smart cities, citizens’ behavior monitoring PDF

Authors: Mohamad Arafeh, May El Barachi, Azzam Mourad, Fatna Belqasmi

FScaler: Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions pdf

Authors: Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabab Mizouni, Jamal Bentahar

AI-based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach Deep reinforcement Learning for proactive horizontal and vertical resource scaling. pdf

Authors: Hani Sami, Hadi Otrok, Jamal Bentahar, Azzam Mourad

Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement Deep Reinforcement Learning for Service Placement pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

Reinforcement R-learning Model for Time Scheduling of On-demand Fog Placement On-demand Fog Scheduling pdf

Authors: Peter Farhat, Hani Sami, Azzam Mourad

Vehicular-OBUs-As-On-Demand-Fogs: Resource and Context Aware Deployment of Containerized Micro-Services On-demand Vehicular Fog pdf

Authors: Hani Sami, Azzam Mourad, Wassim El-Hajj

Dynamic On-Demand Fog Formation Offering On-the-Fly IoT Service Deployment On-demand Fog Formation pdf

Authors: Hani Sami, Azzam Mourad

Stable federated fog formation: An evolutionary game theoretical approach Fog Federations

Authors: Ahmad Hammoud, Hadi Otrok, Azzam Mourad, Zbigniew Dziong

A Novel Federated Fog Architecture Embedding Intelligent Formation Fog Federations

Authors: Hala Shamseddine; Jana Nizam; Ahmad Hammoud; Azzam Mourad; Hadi Otrok; Haidar Harmanani; Zbigniew Dziong

Cloud federation formation using genetic and evolutionary game theoretical models Cloud Federations

Authors: Ahmad Hammoud, Azzam Mourad, Hadi Otrok, Omar Abdel Wahab, Haidar Harmanani

On the detection of passive malicious providers in cloud federations Cloud Federations

Authors: Ahmad Hammoud, Hadi Otrok, Azzam Mourad, Omar Abdel Wahab, Jamal Bentahar

A Blockchain based Architecture for the Detection of Fake Sensing in Mobile Crowdsensing Crowdsensing, fake sensing, Blockchain, smart cities, citizens’ behavior monitoring PDF

Authors: Mohamad Arafeh, May El Barachi, Azzam Mourad, Fatna Belqasmi

AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions pdf

Authors: Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabab Mizouni, Jamal Bentahar

FScaler: Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning Automatic Resource Scaling of Containers in Fog Clusters Using Reinforcement Learning pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions AI, Blockchain and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions pdf

Authors: Ahmad Hammoud, Hani Sami, Azzam Mourad, Hadi Otrok, Rabab Mizouni, Jamal Bentahar

AI-based Resource Provisioning of IoE Services in 6G: A Deep Reinforcement Learning Approach Deep reinforcement Learning for proactive horizontal and vertical resource scaling. pdf

Authors: Hani Sami, Hadi Otrok, Jamal Bentahar, Azzam Mourad

Demand-Driven Deep Reinforcement Learning for Scalable Fog and Service Placement Deep Reinforcement Learning for Service Placement pdf

Authors: Hani Sami, Azzam Mourad, Hadi Otrok, Jamal Bentahar

Datasets

Dataset 1
Description + link
Dataset 1
Description + link
Dataset 1
Description + link