Ali Ahmed

Ali Ahmed profile picture

Research Assistant School of Engineering and Computer Science

PhD in Computer Science (University of Manchester)

Teaching

I teach/taught the following course:

COMP102, COMP103, NWEN243, NWEN438, SWEN439 

Research Interests

Trust and Access Control in Smart Environments.

Literature-based discovery

Usable Security

Publication Sample

  • [Journal 2017] Reinhard Behrens, Ali Ahmed “A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS" KSII Transactions on Internet & Information Systems, Volume 11, No. 12. pp. 6092-6115.
  • [Conference 2017] Reinhard Behrens, Ali Ahmed “Internet of Things: An End-to-End Security Layer”, In Innovations in Clouds, Internet and Networks (ICIN), 2017 20th Conference on (pp. 146-149). IEEE.
  • [Journal 2016] Ali Ahmed, “Literature-Based Discovery: Critical Analysis and Future Directions”, The International Journal of Computer Science and Network Security (IJCSNS), Volume 16, No. 07, July 2016, pp 11-26.
  • [Journal 2016] Ali Ahmed and David Booth, “Harmonisation of Digital Privacy Law and Practice: The Jersey Workplace Case Study”, The International Journal of Computer Science and Network Security (IJCSNS), Volume 16, No. 06, June 2016, pp 101-118.
  • [Conference 2016] Ali Ahmed and David Booth, “The Digital Privacy Laws and Practices in the Jersey Island”, The 7thInternational Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2016), September 19-22, 2016, London, United Kingdom.
  • [Conference 2015] Ali Ahmed and Saadat AlHashmi, “A Metric for Literature-Based Discovery Methodology Evaluation”, The 12thACS/IEEE International Conference on Computer Systems and Applications AICCSA 2015, November 17-20, 2015, Marrakech, Morocco.
  • [Conference 2015] Noha Ragab, Ali Ahmed, and Saadat AlHashmi, “Software Engineering for Security as a Non-Functional Requirement”, The proceedings of the Second Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2015, volume 370, Springer International Publishing, pp 347-357
  • [Conference 2015] Ali Ahmed, Ahmed Abed, and Saadat AlHashmi, “IPv6 Adoption in the Kingdom of Saudi Arabia: A Case Study”, The proceedings of the Second Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2015, volume 370, Springer International Publishing, pp 335-346
  • [Conference 2015] Ali Ahmed, and Saadat AlHashmi, “The School Absenteeism Contributing Factors: Oman as a Case Study”, The proceedings of the Second Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2015, volume 370, Springer International Publishing, pp 215-224
  • [Conference 2014] Ali Ahmed, and Saadat AlHashmi, “A Critical Survey on Current Literature-Based Discovery Models”, The 24thIBIMA Conference, Milan, Italy 6-7 November 2014
  • [Conference 2012] Ali Ahmed and Abdullah Alnajem, “Trust-Aware Access Control: How Recent is Your Transaction History?”, The Second International Conference on Digital Information and Communication Technology and its Applications, May 16-18, 2012, Thailand.
  • [Conference 2010] Ali Ahmed, and Ning Zhang, “An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation”, the Fourth International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2010, July 18 - 25, 2010 - Venice/Mestre, Italy, pp 251-260.
  • [Journal 2009] Ali Ahmed, and Ning Zhang, “Towards the Realisation of Context-Risk-Aware Access Control in Pervasive Computing”, The Journal of Telecommunication Systems, December 2009.
  • [Conference 2008] Ali Ahmed, and Ning Zhang, “A Context-Risk-Aware Access Control Model for Ubiquitous Environments”, in the Proceedings of the 3rd International Workshop on Secure Information Systems (SIS'08), IEEE CS Press - 20-22 October 2008, Wisla, Poland, pp. 775 - 782.
Google Scholar Profile