Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking

MB Muzammil, M Bilal, S Ajmal, SC Shongwe… - IEEE …, 2024 - ieeexplore.ieee.org
The current era extensively utilizes the Internet, which uses data. Due to the apparent open-
access Internet service, this data is highly vulnerable to attacks. Data privacy is affected by …

Survey on delegated and self-contained authorization techniques in CPS and IoT

SV Sudarsan, O Schelén, U Bodin - IEEE Access, 2021 - ieeexplore.ieee.org
Authentication, authorization, and digital identity management are core features required by
secure digital systems. In this, authorization is a key component for regulating the detailed …

Enhancing the access privacy of IDaaS system using SAML protocol in fog computing

C Rupa, R Patan, F Al-Turjman, L Mostarda - IEEE Access, 2020 - ieeexplore.ieee.org
Fog environment adoption rate is increasing day by day in the industry. Unauthorized
accessing of data occurs due to the preservation of Identity and information of the users …

Towards reliable and trustful personal health record systems: a case of cloud-dew architecture based provenance framework

FA Khan, S Shaheen, M Asif, AU Rahman… - Journal of ambient …, 2019 - Springer
Personal health records (PHR) system serves not just as static repositories for data but it
also combines knowledge and software tools with patients' data that results in empowering …

An analytic study of architecture, security, privacy, query processing, and performance evaluation of database‐as‐a‐service

FA Khan, M Jamjoom, A Ahmad… - Transactions on …, 2022 - Wiley Online Library
In the present era of technology, the pace of data generation is very high, and the biggest
challenge is the manageability of data with efficient and secure storage options as well as at …

Evaluation of secure OpenID-based RAAA user authentication protocol for preventing specific Web attacks in Web apps

M Bilal, C Wang, Z Yu, A Bashir - 2020 IEEE 11th International …, 2020 - ieeexplore.ieee.org
Identity management (IdM) plays a significant role in managing user identities (IDs).
However, IdM is challenging to handle the rapidly rising numerous kinds of Web-based …

[PDF][PDF] Assessing Secure OpenID-Based EAAA Protocol to Prevent MITM and Phishing Attacks in Web Apps.

M Bilal, SC Showngwe, A Bashir… - Computers, Materials & …, 2023 - researchgate.net
To secure web applications from Man-In-The-Middle (MITM) and phishing attacks is a
challenging task nowadays. For this purpose, authentication protocol plays a vital role in …

Design of web security penetration test system based on attack and defense game

B Song, L Sun, Z Qin - Scientific Programming, 2022 - Wiley Online Library
Some sensitive data in the network will be leaked due to the loopholes or weaknesses of the
web system itself, which will bring potential harm to the society or the public. Aiming at this …

[PDF][PDF] Defining cloud identity security and privacy issues: A Delphi method

B Cusack, E Ghazizadeh - 2019 - scholar.archive.org
The purpose of this study is to identify the potential security and privacy issues for the
entities providing cloud identity services known as cloud identity providers. We document …

Application of data science for controlling energy crises: a case study of Pakistan

S Ullah, M Asif, S Ahmad, U Imdad… - Proceedings of the 2019 …, 2019 - dl.acm.org
Today Pakistan is facing numerous challenges for the interconnection of local energy
resources and for balanced energy policies. Data Science, Big Data, Artificial Intelligence …