Work place: Information Systems Department, Faculty of computers and information, Menoufia University, Egypt
E-mail: emadqap@gmail.com
Website: https://scholar.google.com/citations?user=49fnxi0AAAAJ&hl=en
Research Interests: Web Technologies, Semantic Web, Semantic Networks, Information Retrieval
Biography
Dr. Emad ELABD: is working Assistant Professor, Dept. of Information Systems, Menoufia University, Egypt. He got his Ph.D. in the field of Web services compliance over high-level specifications at LIRIS, University Lyon1, France, July 2011. He received bachelor´s degrees in Electronic Engineering from Menoufia University, Egypt where he did his master´s studies in computer science also. His research interests include Web services modeling and analysis with access control and time aspects, Web services (specification, composition), Semantic Web, and Information retrieval.
By A. Meligy Emad Elabd Sahar Kotb
DOI: https://doi.org/10.5815/ijmecs.2016.10.07, Pub. Date: 8 Oct. 2016
Nowadays, Web services are the leading solution for solving the problem of information systems’ integration. Web services are based on the service oriented architecture (SOA). Preserving privacy of web services is one of the main challenges during their interaction. Therefore, minimizing the number of the disclosed credentials that are required for accessing the web services resources during the interaction is a desirable behavior. Credentials generalization and substitution and credentials encryption can be used for privacy preserving. To the best of our knowledge, in the current privacy preserving approaches for web services, there is no technique that uses the negotiation for credential generalization and substitution between the consumer and the provider in conjunction with the credentials encryption using certificate authority as a third party. In this paper, a proposed approach for web services privacy preserving is proposed. This approach is based on the negotiation, encryption, and certificate authorities as third parties. The proposed approach is implemented and tested. The results show that the number of disclosed sensitive credential is the minimum number of credentials that can be disclosed to guarantee the accessing of the service.
[...] Read more.By Emad Elabd Hatem Abdulkader Ahmed Mubark
DOI: https://doi.org/10.5815/ijitcs.2015.10.01, Pub. Date: 8 Sep. 2015
Nowadays, publishing data publically is an important for many purposes especially for scientific research. Publishing this data in its raw form make it vulnerable to privacy attacks. Therefore, there is a need to apply suitable privacy preserving techniques on the published data. K-anonymity and L-diversity are well known techniques for data privacy preserving. These techniques cannot face the similarity attack on the data privacy because they did consider the semantic relation between the sensitive attributes of the data. In this paper, a semantic anonymization approach is proposed. This approach is based on the Domain based of semantic rules and the data owner rules to overcome the similarity attacks. The approach is enhanced privacy preserving techniques to prevent similarity attack and have been implemented and tested. The results shows that the semantic anonymization increase the privacy level and decreases the data utility.
[...] Read more.By Emad Elabd
DOI: https://doi.org/10.5815/ijitcs.2015.08.05, Pub. Date: 8 Jul. 2015
Web services discovery is a crucial process in the service-oriented architecture (SOA). This process depends on the functional and non-functional (Quality of services (QoS)) properties of the published services. Functional properties present the objectives of the service and the quality of the service indicates the performance of the service. Reputation of the services is one of the important QoS properties. Assigning robust and precise reputation values for the service affects positively in the output of the web services discovery process by returning the most relevant services for the consumer. In this paper, we propose an approach for updating reputation of the Web services based on the trust factors of the consumers and two pre-defined thresholds, reputation threshold, and agreement threshold. The proposed approach is implemented and tested on a set of services. The results show that the proposed reputation updating approach is powerful and gives robust and precise results in a dynamic way. As a consequence, the web service discovery process which is based on the proposed approach gives a robust and precise results in a dynamic way.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals