[PDF][PDF] Web data amalgamation for security engineering: Digital forensic investigation of open source cloud.

A Imran, SA Aljawarneh, K Sakib - J. Univers. Comput. Sci., 2016 - researchgate.net
The largely distributed nature and growing demand for open source Cloud makes the
infrastructure an ideal target for malicious attacks that grants unauthorized access to its data …

CLBS-3: A three-tier load balancer for ensuring fault-tolerance of software running in open-source cloud

M Shamsuddoha, MS Alam, SA Asif… - Proceedings of the The …, 2015 - dl.acm.org
High availability and low service expenditure has enabled cloud computing to become
popular to be used in providing large number of software services. However, supporting a …

Surface integrity comparison in drilling AA8011 and novel AA8011+ x% BN composites

P Khan, N Senthilkumar - AIP Conference Proceedings, 2024 - pubs.aip.org
The objective of this study is to evaluate and assess the surface roughness that is created by
drilling AA8011 composite utilising carbide drill bits. The Components and Procedures: For …

Investigate how developers and managers view security design in software

A Imran - arXiv preprint arXiv:2310.14433, 2023 - arxiv.org
Software security requirements have been traditionally considered as a non-functional
attribute of the software. However, as more software started to provide services online …

Secure provenance-based communication using visual encryption

KP Kumar, RC Cherukuri - International Journal of …, 2019 - inderscienceonline.com
Explicit specification of the historical record of an instance or a data item is called data
provenance. It has many applications in various fields with regards to its importance on …

A case-based framework for self-healing paralysed components in Distributed Software applications

T Hasan, A Imran, K Sakib - The 8th International Conference …, 2014 - ieeexplore.ieee.org
Self-healing is the ability of the software to detect faulty modules at execution time and
replace or recover those without affecting other components. This paper proposes a …

Time-Waved Monitoring and Emergent Self Adaption of Software Components in Open Source Cloud

L Rawshan, K Sakib, A Imran - … of the The International Conference on …, 2015 - dl.acm.org
Optimized resource utilization and low cost of service has enabled the cloud to become a
popular service in today's world. However, rapid scaling, continuous attacks from hackers …

Watchword-oriented and time-stamped algorithms for tamper-proof cloud provenance cognition

A Imran, N Nahar, K Sakib - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
Provenance is derivative journal information about the origin and activities of system data
and processes. For a highly dynamic system like the cloud, provenance can be accurately …

A scalable resource provisioning scheme for the cloud using peer to peer resource discovery and multi-attribute utility theory

MR Rahman, K Sakib - International Journal of Cloud …, 2017 - inderscienceonline.com
Serving large number of users without compromising service availability and performance is
key to the success of the cloud. A fundamental challenge in building such services is …

[PDF][PDF] CLBS-3: A Three-Tier Load Balancer for ensuring Fault-Tolerance of Software running in Open-Source Cloud

A Imran, S Aljawarneh, K Sakib, K Salatuzzaman - 2015 - academia.edu
High availability and low service expenditure has enabled cloud computing to become
popular to be used in providing large number of software services. However, supporting a …