Search filters

List of works by Ragib Hasan

A Cloud You Can Wear: Towards a Mobile and Wearable Personal Cloud

A Comparative Study on I/O Performance between Compute and Storage Optimized Instances of Amazon EC2

scholarly article published June 2014

A Straightforward Author Profiling Approach in MapReduce

A TRUSTWORTHY CLOUD FORENSICS ENVIRONMENT

A statistical analysis of disclosed storage security breaches

article

A trust based Information sharing model (TRUISM) in MANET in the presence of uncertainty

scholarly article published July 2014

Accountable proof of ownership for data using timing element in cloud services

Analyzing NASPInet data flows

Aura: An IoT Based Cloud Infrastructure for Localized Mobile Computation Outsourcing

Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading

article published in 2018

CACROS: A Context-Aware Cloud Content Roaming Service

CATComp: A Compression-Aware Authorization Protocol for Resource-Efficient Communications in IoT Networks

scientific article published on 24 June 2021

CURLA: Cloud-Based Spam URL Analyzer for Very Large Datasets

CellCloud: A Novel Cost Effective Formation of Mobile Cloud Based on Bidding Incentives

Chronos: Towards Securing System Time in the Cloud for Reliable Forensics Investigation

Cloud Based Content Fetching: Using Cloud Infrastructure to Obfuscate Phishing Scam Analysis

D-CLOC: A Delay Tolerant Cloud Formation Using Context-Aware Mobile Crowdsourcing

Database Issues in Trust Management and Trust Negotiation

article

Developing Hands-on Labware for Emerging Database Security

Digital Forensics in the Age of Big Data: Challenges, Approaches, and Opportunities

Efficient audit-based compliance for relational data retention

FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things

conference paper published in 2015

FAPA: flooding attack protection architecture in a cloud system

Fuzzy Authentication Using Interaction Provenance in Service Oriented Computing

High-Performance Classification of Phishing URLs Using a Multi-modal Approach with MapReduce

Hot Zone Identification: Analyzing Effects of Data Sampling On Spam Clustering

How Much Does Storage Really Cost? Towards a Full Cost Accounting Model for Data Storage

How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis

article

I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics

Improving multi-tier security using redundant authentication

Interaction provenance model for unified authentication factors in service oriented computing

Introducing secure provenance

LINCS: Towards building a trustworthy litigation hold enabled cloud storage system

Litigo: A Cost-Driven Model for Opaque Cloud Services

MANTICORE: Masking All Network Traffic via IP Concealment with OpenVPN Relaying to EC2

scholarly article published June 2012

MIDEP: Multiparty Identity Establishment Protocol for Decentralized Collaborative Services

Modeling a secure supply chain integrity preservation system

scholarly article published November 2013

OCF: An Open Cloud Forensics Model for Reliable Digital Forensics

article

OTIT

PLAG: Practical Landmark Allocation for Cloud Geolocation

Phish-Net: Investigating phish clusters using drop email addresses

Please Permit Me: Stateless Delegated Authorization in Mashups

Preventing history forgery with secure provenance

Privacy in the Cloud

Requirements of Secure Storage Systems for Healthcare Records

article

SASCloud: Ad Hoc Cloud as Secure Storage

SECAP: Towards Securing Application Provenance in the Cloud

SEPIA: Secure-PIN-Authentication-as-a-Service for ATM Using Mobile and Wearable Devices

SecLaaS

article

Secure techniques and methods for authenticating visually impaired mobile phone users

Security in Big Data and Cloud Computing: Challenges, Solutions, and Open Problems

scholarly article published 12 June 2014

Sensing-enabled channels for hard-to-detect command and control of mobile devices

StuxMob: A situational-aware malware for targeted attack on smart mobile devices

article published in 2016

Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework

article by Ragib Hasan & Marianne Winslett published 2006 in Lecture Notes in Computer Science

The Story of Naive Alice: Behavioral Analysis of Susceptible Internet Users

The evolution of storage service providers

article

The life and death of unwanted bits: Towards proactive waste data management in digital ecosystems

The techniques and challenges of immutable storage with applications in multimedia

article

Toward a threat model for storage systems

article

Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service

Towards a Systematic Analysis of Challenges and Issues in Secure Mobile Cloud Forensics

article published in 2015

Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things

conference paper published in 2015

Towards building a forensics aware language for secure logging

Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions

Trustworthy Digital Forensics in the Cloud

Trustworthy Records Retention

Trustworthy vacuuming and litigation holds in long-term high-integrity records retention

UDaaS: A Cloud-Based URL-Deduplication-as-a-Service for Big Datasets

Unified authentication factors and fuzzy service access using interaction provenance

Verifiable Data Redundancy in the Cloud

WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices

e-ESAS: Evolution of a participatory design-based solution for breast cancer (BC) patients in rural Bangladesh

‘Who, When, and Where?’ Location Proof Assertion for Mobile Devices

article by Rasib Khan et al published 2014 in Lecture Notes in Computer Science