Artificial Intelligence Trust, risk and security management (AI trism): Frameworks, applications, challenges and future research directions

A Habbal, MK Ali, MA Abuzaraida - Expert Systems with Applications, 2024 - Elsevier
Artificial Intelligence (AI) has become pervasive, enabling transformative advancements in
various industries including smart city, smart healthcare, smart manufacturing, smart virtual …

Forwarding strategies for named data networking based IOT: requirements, taxonomy, and open research challenges

NA Askar, A Habbal, FZ Alden, X Wei… - IEEE …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) aims to efficiently connect various entities, including humans,
machines, smart devices, physical environments, and others, so they can communicate and …

Should we rush to implement password-less single factor FIDO2 based authentication?

F Alqubaisi, AS Wazan, L Ahmad… - 2020 12th annual …, 2020 - ieeexplore.ieee.org
Fast Identity Online (FIDO) Alliance and W3C have defined a set of specifications (called
FIDO2) that allows a user to replace the password based authentication system. However …

Accountable and Transparent TLS Certificate Management: An Alternate Public‐Key Infrastructure with Verifiable Trusted Parties

S Khan, Z Zhang, L Zhu, M Li… - Security and …, 2018 - Wiley Online Library
Current Transport Layer Security (TLS) Public‐Key Infrastructure (PKI) is a vast and complex
system; it consists of processes, policies, and entities that are responsible for a secure …

BPKI: A secure and scalable blockchain-based public key infrastructure system for web services

Z Zhai, S Shen, Y Mao - Journal of Information Security and Applications, 2022 - Elsevier
Frequent attacks on the certificate authority (CA) have exposed the trust problem of the
traditional public key infrastructure (PKI) for the web service. For example, malicious …

On the Validation of Web X. 509 Certificates by TLS interception products

AS Wazan, R Laborde, DW Chadwick… - … on Dependable and …, 2020 - ieeexplore.ieee.org
The Transport Layer Security (TLS) protocol aims to provide confidentiality and integrity of
data. It is based on X. 509 Certificates. Our previous research showed that popular Web …

MERCAT: A metric for the evaluation and reconsideration of certificate authority trustworthiness

MP Heinl, A Giehl, N Wiedermann, S Plaga… - Proceedings of the 2019 …, 2019 - dl.acm.org
Public key infrastructures (PKIs) build the foundation for secure communication of a vast
majority of cloud services. In the recent past, there has been a series of security incidents …

TLS connection validation by web browsers: Why do web browsers still not agree?

AS Wazan, R Laborde, DW Chadwick… - 2017 IEEE 41st …, 2017 - ieeexplore.ieee.org
The TLS protocol is the primary technology used for securing web transactions. It is based
on X. 509 certificates that are used for binding the identity of web servers' owners to their …

Caching Strategies for the Metaverse: Taxonomy, Open Challenges, and Future Research Directions.

AH Mohammed, H Alaidaros, F Salleh… - … of Interactive Mobile …, 2024 - search.ebscohost.com
The metaverse, which is considered to be the next evolutionary stage of the Internet, has
captured the attention of both academia and industry. Its primary goal is to establish a …

Article 45 of the eIDAS Directive Unveils the need to implement the X. 509 4-cornered trust model for the WebPKI

AS Wazan, R Laborde, A Benzekri, I Taj - Proceedings of the 19th …, 2024 - dl.acm.org
Article 45 of the new eIDAS Directive (eIDAS 2.0) has caused significant debate on the
Internet as it gives European governments the power to make EU-certificated web …