Publications


[Journal] [Book Chapters] [Conference/Workshop] [Poster/Demo]

Journal Publications

    1. Mahmud Hossain, SM Riazul Islam, Kyung-Sup Kwak, and Ragib Hasan, “An Internet of Things-Based Health Prescription Assistant and Its Security System Design”, in Future Generation Computer Systems, Elsevier, vol. 82, pp. 422-439, 2018. (Impact factor 3.99)
    2. Ragib Hasan, Mahmud Hossain, and Rasib Khan, “Aura: An Incentive-Driven Ad-Hoc IoT Cloud Framework for Proximal Mobile Computation Offloading”, Elsevier, in Future Generation Computer Systems, Elsevier, 2018. (Impact factor 3.99)
    3. Shams Zawoad, Amit Dutta, and Ragib Hasan, “Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service”, IEEE Transactions on Dependable and Secure Computing (TDSC), SI-Cyber Crime, vol. 13, no. 2, pp. 148-162, 2016. (Impact factor 1.351) [pdf]
    4. Ragib Hasan, Rasib Khan, Shams Zawoad, Md Haque, “WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices”, IEEE Transactions on Emerging Topics in Computing (TETC) SI on Cyber Security, vol. 4, no. 1, pp. 128-141, 2016. [pdf].
    5. Shams Zawoad, Ragib Hasan, and John W Grimes, “LINCS: Towards Building a Trustworthy Litigation Hold Enabled Cloud Storage System”, Digital Investigation, Elsevier, vol 14, pp. S55 – S67, 2015. (Impact factor 1.648) [pdf]
    6. Rasib Khan, Md Munirul Haque, Ragib Hasan, “Towards Supply Chain Information Integrity Preservation”, CrossTalk Journal of Defense Software Engineering, Sept 2015 [pdf]
    7. Lirim Osmani, Salman Toor, Miika Komu, Matti J. Kortelainen, Tomas Lindén, John White, Rasib Khan, Paula Eerola, Sasu Tarkoma, ” Secure Cloud Connectivity for Scientific Applications”, to appear in IEEE Transactions on Service Computing, 2015 [pdf]
    8. Shahid Al Noor, Ragib Hasan, and Md Munirul Haque, “CellCloud: Towards A Cost Effective Formation of Mobile Cloud Based on Bidding Incentives“, Services Transactions on Cloud Computing (STCC), vol. 3 no. 1, pp. 13-27. 2015. [pdf]
    9. Shams Zawoad, Ragib Hasan, Gary Warner, and Md Munirul Haque, “Towards a Cloud-based Approach for Spam URL Deduplication for Big Datasets“, International Journal of Cloud Computing (IJCC), Vol 2, No 3, pp. 1-14, 2014 [pdf]
    10. Rasib Khan, Mainul Mizan, Ragib Hasan, and Alan Sprague, “Hot Zone Identification: Analyzing Effects of Data Sampling on Spam Clustering“, Journal of Digital Forensics, Security and Law (JDFSL), 9(1): 67-82, 2014. Note: This paper supersedes the conference version from ADFSL 2014 below. [pdf]
    11. Md Haque, Ferdaus Kawsar, Md Adibuzzaman, Sheikh Iqbal Ahamed, Md Uddin, Richard Love, Ragib Hasan, Rumana Dowla, Tahmina Ferdousy and Reza Salim, “e-ESAS: Evolution of a Participatory Design based Solution for Breast Cancer (BC) Patients in Rural Bangladesh”, Springer Personal and Ubiquitous Computing Journal, Behaviour and Health 2014.(Impact Factor 1.616) [pdf]
    12. Shams Zawoad, Marjan Mernik, and Ragib Hasan. “Towards Building A Forensics Aware Language For Secure Logging“, Journal of Computer Science and Information Systems (ComSIS), 2014, Vol. 11, No. 4, pp.1291-1314. [pdf]
    13. Kazi Zunnurhain, Susan Vrbsky, and Ragib Hasan, “FAPA: Flooding Attack Protection Architecture in a Cloud System“, Accepted for publication, International Journal of Cloud Computing, 2014. [pdf]
    14. Shams Zawoad and Ragib Hasan, “Digital Forensics in the Cloud“, CrossTalk Journal of Defense Software Engineering, Sept 2013, Vol. 26, No 5, pp. 17-20 [pdf]
    15. Shams Zawoad and Ragib Hasan, “Towards Building Proofs of Past Data Possession in Cloud Forensics”, Academy of Science and Engineering Journal 2012, Vol. 1, Issue 4, pp. 195-207 (Acceptance rate: 3%). [pdf]
    16. Ragib Hasan, Radu Sion, and Marianne Winslett, “Preventing History forgery with Secure Provenance”, ACM Transactions on Storage, Vol. 5, Issue 4, pp. 12:1-12:43, December, 2009, ACM Press. [pdf]
    17. Athol J. Kemball, Richard M. Crutcher, and Ragib Hasan, “A component-based framework for radio-astronomical imaging software systems”, Software: Practice and Experience (SP&E), John Wiley & Sons, Ltd, June 2007. [web link]

Book Chapters

    1. Ragib Hasan and Shams Zawoad “Privacy in the Cloud” in “Privacy in a Digital, Networked World“, Springer, 2015. [Amazon]
    2. Shams Zawoad and Ragib Hasan, “Cloud Forensics” in “Encyclopedia of Cloud Computing “, WILEY-IEEE, 2014. [Amazon]
    3. Ragib Hasan, “Security and Privacy in Big Data and Cloud Computing: Challenges, Solutions, and Open Problems” in “Advances in data processing techniques in the era of Big Data“, CRC Press, 2013.
    4. Ragib Hasan, Marianne Winslett, Windsor Hsu, and Radu Sion, “Trustworthy Record Retention”,
      in “The Handbook of Database Security: Applications and Trends”, M. Gertz and S. Jajodia (editors), Springer Verlag 2007 [Amazon]
    5. Dongyi Li, Will Winsborough, Ragib Hasan, and Marianne Winslett, “Trust Management”,
      in “The Handbook of Database Security: Applications and Trends”, M. Gertz and S. Jajodia (editors), Springer Verlag 2007. [Amazon]

Magazine Articles

    1. Shams Zawoad and Ragib Hasan, “Trustworthy Digital Forensics in the Cloud” in IEEE Computer (Cloud Cover), March 2016. (Impact factor 1.443) [pdf]

Recent Conference/Workshop Publications

  • 2019
  •  2018
    1.  Mahmud Hossain, Ragib Hasan, Shams Zawoad, “Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for IoT”, in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Honolulu, HI, USA, 2018.
    2. Shams Zawoad, Ragib Hasan, “SECProv: Trustworthy and Efficient Provenance Management in the Cloud”, in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Honolulu, HI, USA, 2018.
    3. Mahmud Hossain, Yasser Karim, and Ragib Hasan, “SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN”, in Proceedings of the 8th ACM Conference on Data and Application Security and Privacy (CODASPY), Tempe, AZ, USA, 2018.
    4. S. M. Riazul Islam, Mahmud Hossain, and Ragib Hasan, “A Conceptual Framework for an IoT-Based Health Assistant and Its Authorization Model”, in Proceedings of the 8th IEEE Annual Computing and Communication Workshop and Conference (IEEE CCWC), Las Vegas, NV, USA, 2018.
    5. Jayun Patel and Ragib Hasan, “Smart Bracelets: Towards Automating Personal Safety using Wearable Smart Jewelry”, in Proceedings of the 15th Annual IEEE Consumer Communications & Networking Conference (CCNC), Las Vegas, USA, January 2018. [pdf]
  • 2017
    • Shahid Al Noor, Ragib Hasan, and Arsh Arora, ”ParkBid: An Incentive Based Crowdsourced Bidding Service for Parking Reservation”, in Proceedings of the 14th IEEE International Conference on Services Computing (SCC), Honolulu, Hawaii, 2017. (Acceptance Rate 20%). [pdf]
    • Mahmud Hossain, Ragib Hasan, and Anthony Skjellum, “Securing the Internet of Things: A Meta-Study of Challenges, Approaches, and Open Problems”, IEEE International Workshop on the Internet of Things Computing and Applications (IoTCA), Atlanta, GA, USA, 2017.
    • Mahmud Hossain, Shahid Al Noor, Yasser Karim, and Ragib Hasan, ”IoTbed: A Generic Architecture for Testbed as a Service for Internet of Things-based Systems”, in Proceedings of the 2nd IEEE International Congress on Internet of Things (ICIoT), Honolulu, Hawaii, 2017. [pdf]
    • Mahmud Hossain and Ragib Hasan, “Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes”, in Proceedings of the 2nd IEEE International Congress on Internet of Things (ICIoT), Honolulu, Hawaii, 2017.
    • Mahmud Hossain, Ragib Hasan, and Shams Zawoad, ”Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of Vehicles (IoV)”, in Proceedings of the 2nd IEEE International Congress on Internet of Things (ICIoT), Honolulu, Hawaii, 2017.
    • Arsh Arora, Thomas Stallings, Ragib Hasan, and Gary Warrner,, “Malware Secrets: De-obfuscating in the cloud”, in the 10th IEEE International Conference on Cloud Computing (CLOUD), Honolulu, Hawaii, USA, 2017. [pdf]
    • Md. Mahmud Hossain, Shahid Al Noor, and Ragib Hasan, “HSC-IoT: A Hardware and Software Co- Verification based Authentication Scheme for Internet of Things”, in Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud 2017), San Francisco, CA. [pdf]
    • Shahid Al Noor and Ragib Hasan, “ROSAC: A Round-Wise Fair Scheduling Approach for Mobile Cloud Based on Task Asymptotic Complexity”, in Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (IEEE Mobile Cloud 2017), San Francisco, CA. [pdf]
    • Rasib Khan and Ragib Hasan, “DExaS: Delegated Experience as a Service for Mobile and Wearable Devices’‘, In Proceedings of the 14th Annual IEEE Consumer Communications \& Networking Conference (CCNC), Las Vegas, USA, January 2017.
    • Maya Guru, Ragib Hasan, and Rasib Khan, “Towards Non-intrusive Continuous Healthcare Monitoring with the Smart Hospital Gown”, In Proceedings of the 14th Annual IEEE Consumer Communications & Networking Conference (CCNC), Las Vegas, USA, January 2017.
  • 2016
    • Ragib Hasan, Shams Zawoad, and Md. Munirul Haque, “StuxMob: A Situational-Aware Malware for Targeted Attack on Smart Mobile Devices”, in Proceedings of the 35th IEEE international Conference for Military Communications (IEEE MILCOM), Baltimore, MD, November 2016.
    • Md. Mahmud Hossain, Shahid Al Noor, Dibya Mukhopadhyay, Ragib Hasan, and Lei Li, “CACROS: A Context-Aware Cloud Content Roaming Service”, in Proceedings of the IEEE International Conference on Smart Cloud (SmartCloud 2016), New York, USA, Nob 2016. (Acceptance Rate 29%) (Best Paper Award). [pdf]
    • Mohammad Kamrul Islam, and Ragib Hasan, “Verifiable Data Redundancy in the Cloud“, in Proceedings of the 6th IEEE International Conference on Big Data and Cloud Computing (BDCloud 2016), Atlanta, GA, USA, Oct 2016..
    • Shahid Al Noor, Md. Mahmud Hossain, and Ragib Hasan, “SASCloud: Ad hoc Cloud as Secure Storage“, in Proceedings of the 6th IEEE International Conference on Big Data and Cloud Computing (BDCloud 2016), Atlanta, GA, USA, Oct 2016. [pdf]
    • Lei Li, Kai Qian, and Ragib Hasan, “SThe Art of War: Developing Role-based Hands-on Labware for Emerging Database Security“, in Proceedings of SIGITE/RIIT, September, 2016.. [pdf]
    • Shahid Al Noor, Rasib Khan, Md. Mahmud Hossain,and Ragib Hasan, “Litigo: A Cost-Driven Model for Opaque Cloud Services“, In Proceedings of the 9th IEEE International Conference on Cloud Computing (IEEE CLOUD), San Francisco, CA, July 2016. (Acceptance Rate 15%). [pdf]
    • Md. Mahmud Hossain, Rasib Khan, Shahid Al Noor, and Ragib Hasan, “Jugo: A Generic Architecture for Composite Cloud as a Service“, In Proceedings of the 9th IEEE International Conference on Cloud Computing (IEEE CLOUD), San Francisco, CA, July 2016. [pdf]
    • Shams Zawoad and Ragib Hasan, “SECAP: Towards Securing Application Provenance in the Cloud“, In Proceedings of the 9th IEEE International Conference on Cloud Computing (IEEE CLOUD), San Francisco, CA, July 2016.
    • Shams Zawoad and Ragib Hasan “Chronos: Towards Securing System Time in the Cloud for Reliable Forensics Investigation“, In Proceedings of the 40th IEEE Computer Society International Conference on Computers, Software & Applications (IEEE COMPSAC), Atlanta, Georgia, June 2016. (Acceptance rate 18%) [pdf]
    • Ragib Hasan, Shams Zawoad, Shahid Noor, Md Munirul Haque, and Darrell Burke “How Secure is the Healthcare Network from Insider Attacks? An Audit Guideline for Vulnerability Analysis“, In Proceedings of the 40th IEEE Computer Society International Conference on Computers, Software & Applications (IEEE COMPSAC), Atlanta, Georgia, June 2016. (Acceptance rate 20%) [pdf]
    • Rasib Khan and Ragib Hasan, “The Story of Naive Alice: Behavioral Analysis of Susceptible Users on the Internet“, In Proceedings of the 40th IEEE Computer Society International Conference on Computers, Software & Applications (IEEE COMPSAC), Atlanta, Georgia, June 2016. (Acceptance rate 20%) [pdf]
    • Rasib Khan and Ragib Hasan, “A Cloud You can Wear: Towards a Mobile and Wearable Personal Cloud“, In Proceedings of the 40th IEEE Computer Society International Conference on Computers, Software & Applications (IEEE COMPSAC), Atlanta, Georgia, June 2016. (Acceptance rate 20%) [pdf]
  • 2015
    • Shahid Noor and Ragib Hasan, “D-CLOC: A Delay Tolerant Cloud Formation Using Context-Aware Mobile Crowdsourcing“, In Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, Vancouver, Canada, November 2015. (Acceptance rate 48/189=25.4%) [pdf]
    • Shams Zawoad and Ragib Hasan, “Digital Forensics in the Age of Big Data:Challenges, Approaches, and Opportunities“, IEEE International Symposium on Big Data Security on Cloud (BigDataSecurity 2015), New York, USA, August 2015.
    • Md. Mahmud Hossain,  Maziar Fotouhi, Ragib Hasan, “Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things“, IEEE Services Visionary Track on Internet of Things, New York, USA, June 2015 [pdf].
    • Shams Zawoad and Ragib Hasan, “FAIoT : Towards Building a Forensics Aware Eco System for the Internet of Thing”, In Proceedings of the 12th IEEE International Conference on Services Computing (SCC), IoT Research Track, New York, USA, June 2015. [pdf]
    • Niju Shrestha, Rajan Kharel, Jason Britt, Ragib Hasan, “High-performance Classification of Phishing URLs Using a Multi-modal Approach with MapReduce”, IEEE Services Visionary Track on Security and Privacy Engineering (SPE2015), New York, USA, June 2015.
    • Shams Zawoad, Ragib Hasan, Anthony Skjellum, “OCF: An Open Cloud Forensics Model for Reliable Digital Forensics”, the 8th IEEE International Conference on Cloud Computing, New York, USA, June 2015 (Acceptance rate: 14%). [pdf]
    • Maziar Foutohi, Abhishek Anand, Ragib Hasan, “PLAG: Practical Landmark Allocation for Cloud Geolocation”, the 8th IEEE International Conference on Cloud Computing, New York, USA, June 2015.
    • Rasib Khan, Ragib Hasan, “Fuzzy Authentication using Interaction Provenance in Service Oriented Computing”, the 12th IEEE International Conference on Services Computing (SCC), New York, USA, June 2015 [pdf].
    • Rasib Khan, Ragib Hasan, “MIDEP: Multiparty Identity Establishment Protocol for Decentralized Collaborative Services”, the 12th IEEE International Conference on Services Computing (SCC), New York, USA, June 2015 [pdf].
    • Rasib Khan, Ragib Hasan, Jinfang Xu, “SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices”, the 3rd International Conference on Mobile Cloud Computing, Services, and Engineering, San Francisco (IEEE Mobile Cloud), March 2015 [pdf].
    • Ragib Hasan, Md. Mahmud Hossain, Rasib Khan, “Aura: An IoT based Cloud Infrastructure for Localized Mobile Computation Outsourcing”, short paper in the 3rd International Conference on Mobile Cloud Computing, Services, and Engineering, San Francisco (IEEE Mobile Cloud), March 2015 [pdf].
    • Shams Zawoad and Ragib Hasan, “Towards a Systematic Analysis of Challenges and Issues in Secure Mobile Cloud Forensics”, poster paper in the 3rd International Conference on Mobile Cloud Computing, Services, and Engineering, San Francisco (IEEE Mobile Cloud), March 2015. [pdf]
    • Shams Zawoad and Ragib Hasan, “FECloud: A Trustworthy Forensics-Enabled Cloud Architecture”, 11th Annual IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, January 2015. [pdf]
  • 2014
    • Shams Zawoad, Ragib Hasan, Gary Warner, and Anthony Skjellum, “UDaaS: A Cloud-based URL-Deduplication-as-a-Service for Big Datasets”, 4th IEEE International Conference on Big Data and Cloud Computing (BDCloud 2014), Sydney, Australia, December 2014. [pdf] [poster]
    • Abu Awal Md Shoeb, Dibya Mukhopadhyay, Shahid Al Noor, Alan Sprague, and Gary Warner, “Spam Campaign Cluster Detection Using Redirected URLs and Randomized Sub-Domains”, Third ASE International Conference on Social Informatics 2 0 1 4 , December 14-16, 2014, Cambridge, MA, USA (Acceptance Rate 11.5%) (Best Paper Award).[pdf]
    • Suraj Maharjan, Prasha Shrestha, Thamar Solorio, and Ragib Hasan, “A Straightforward Author Profiling Approach in MapReduce”, In Proceedings of the 14th edition of the Ibero-American Conference on Artificial Intelligence, Santiago, Chile, November, 2014. [pdf]
    • Khalid Bijon, Md Munirul Haque, and Ragib Hasan, “A TRUst based Information Sharing Model (TRUISM) in MANET in the Presence of Uncertainty“, In Proceedings of the 12th International Conference on Privacy, Security and Trust (PST), Toronto, Canada, July 2014. [pdf]
    • Rasib Khan, Shams Zawoad, Md Munirul Haque and Ragib Hasan, “Who, When, and Where? Location Proof Assertion for Mobile Devices“, DBSEC 2014 Vienna, Austria, July 14-16, 2014. [pdf]
    • Rasib Khan and Ragib Hasan, “SecP2PSIP: A Distributed Overlay Architecture for Secure P2PSIP”, The 3rd ASE International Conference on Cyber Security 2014, Stanford. CA, USA, May  27-31, 2014. [pdf]
    • Abu Awal Md Shoeb, Ragib Hasan, Md. Haque, and Meng Hu,  “A Comparative Study on I/O Performance between Compute and Storage Optimized Instances of Amazon EC2“. In Proceedings of the 7th IEEE International Conference on Cloud Computing (IEEE Cloud), June 27 – July 2, 2014, Alaska, USA. [pdf]
    • Md Munirul Haque, Sheikh Iqbal Ahamed, Ferdaus Kawsar, Md Adibuzzaman, Md Miftah Uddin, Richard Love, Ragib Hasan, Rumana Dowla, and Reza Salim, “Barriers for Breast Cancer (BC) Patients in Rural Bangladesh: Design and Deployment of a Mobile based Solution”, In Proceedings of the 20th Americas Conference on Information Systems (AMCIS 2014), August 7 – 10, 2014, Savannah, Georgia. [pdf]
    • Shams Zawoad, Ragib Hasan, Md Munirul Haque, and Gary Warner, “CURLA: Cloud-Based Spam URL Analyzer for Very Large Datasets“, In Proceedings of the 7th IEEE International Conference on Cloud Computing June 27 – July 2, 2014, Alaska, USA. [pdf]
    • Shahid Noor, Md. Haque, and Ragib Hasan, “CellCloud: A Novel Cost Effective Formation of Mobile Cloud Based on Bidding Incentives”, In Proceedings of the 7th IEEE International Conference on Cloud Computing June 27 – July 2, 2014, Alaska, USA. (Acceptance Rate 20%). [pdf]
    • Rasib Khan, Mainul Mizan, Ragib Hasan, and Alan Sprague, “Hot Zone Identification: Analyzing Effects of Data Sampling on Spam Clustering“, ADFSL Conference on Digital Forensics, Security and Law Richmond, VA, USA, May 2014. Note: This paper is superseded by the journal version. [pdf]
    • Ragib Hasan and Rasib Khan, “Interaction Provenance Model for Unified Authentication Factors in Service Oriented Computing”, short paper in 4th ACM Conference on Data and Application Security and Privacy (CODASPY), March 2014. [pdf]
    • Rasib Khan, Shams Zawoad, Md. Haque, and Ragib Hasan, “OTIT: Towards Secure Provenance Modeling for Location Proofs“, in Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Kyoto, Japan, June 2014. [pdf]
    • Thamar Solorio, Ragib Hasan, and Mainul Mizan, “Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities”, In Proceedings of the 9th International Conference on Language Resources and Evaluation (LREC), Reykjavik, Iceland, May 2014 [pdf]
    • Kari Visala, Andrew Keating and Rasib Khan, “Models and Tools for the High-Level Simulation of a Name-Based Interdomain Routing Architecture”, Global Internet Symposium, IEEE Infocom, Toronto, Canada, April 2014. [pdf]
  • 2013
    1. Shams Zawoad, Amit Dutta, Alan Sprague, Ragib Hasan, Jason Britt and Gary Warner, “Phish-Net: Investigating Phish Clusters Using Drop Email Addresses”, In Proceedings of the 2013 APWG eCrime Researchers Summit, San Francisco, CA, September 17-18, 2013. [pdf]
    2. Rasib Khan, Md Munirul Haque, and Ragib Hasan, “Modeling a Secure Supply Chain Integrity Preservation System”, In Proceedings of IEEE International Conference on Technologies for Homeland Security, Waltham, MA, November, 2013. [pdf]
    3. Md Munirul Haque, Shams Zawoad, and Ragib Hasan,“Secure Techniques and Methods for Authenticating Visually Impaired Mobile Phone Users”, In the Proceedings of IEEE International Conference on Technologies for Homeland Security, Waltham, MA, November, 2013. [pdf]
    4. Amit K. Dutta and Ragib Hasan, “How Much Does Storage Really Cost? Towards a Full Cost Accounting Model for Data Storage“, In Proceedings of the 10th International Conference on Economics of Grids, Clouds, Systems, and Services (GECON),  Spain, September, 2013. [pdf]
    5. Ragib Hasan and Randal Burns, “The Life and Death of Unwanted Bits: Towards Proactive Waste Data Management in Digital Ecosystems“, In Proceedings of the 3rd International Conference on Innovative Computing Technology (INTECH), London, August 2013. [pdf]
    6. Shams Zawoad, Marjan Mernik , and Ragib Hasan “FAL: A Forensics Aware Language for Secure Logging”, In Proceedings of the 4th Workshop on Advances in Programming Languages (WAPL), 2013. [pdf]
    7. Mainul Mizan, Md Lutfor Rahman, Rasib Khan, Munirul Haque, and Ragib Hasan “Accountable Proof of Ownership for Data using Timing Element in Cloud Services”, In Proceedings of the International Symposium on Cloud Computing and Services for High Performance Computing Systems (InterCloud-HPC 2013). [pdf]
    8. Thamar Solorio, Ragib Hasan, and Mainul Mizan “A Case Study of Sockpuppet Detection in Wikipedia”, In Proceedings of the NAACL/HLT Workshop on Language Analysis in Social Media (LASM 2013). [pdf]
    9. Ragib Hasan, Nitesh Saxena, Tzipora Halevi, Shams Zawoad, and Dustin Rinehart, “Sensing-Enabled Channels for Hard-to-Detect Command and Control of Mobile Devices”, In Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2013. (Acceptance rate: 16.2%). [pdf]
    10. Shams Zawoad, Amit Dutta, and Ragib Hasan, “SecLaaS: Secure Logging-as-a-Service for Cloud Forensics”, In Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2013. (Acceptance rate: 16.2%). [pdf]
  • 2012
    1. Shams Zawoad and Ragib Hasan, “I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics”, In Proceedings of the ASE International Conference on Cyber Security, December 2012. (Acceptance rate: 9.4%). [pdf]
    2. Shams Zawoad and Ragib Hasan, “The Enemy Within: The Emerging Threats to Healthcare from Malicious Mobile Devices”, In Proceedings of the 3rd International Conference on Wireless Mobile Communication and Healthcare (MobiHealth), November 2012. [pdf]
    3. Patrick Butler, Adam Rhodes, and Ragib Hasan, “MANTICORE: Masking All Network Traffic via IP Concealment with OpenVPN Relaying to EC2“, In Proceedings of the 5th IEEE International Conference on Cloud Computing(IEEE Cloud), June 2012. [pdf]
    4. Edward Ferguson, Joseph Weber, and Ragib Hasan, “Cloud-based Content Fetching: Using Cloud Infrastructure to Obfuscate Phishing Scam Analysis“, In Proceedings the IEEE 2012 SERVICES Workshop on the Future of Software Engineering for/in the Cloud (FoSEC 2012). [pdf]
  • 2011
    1. Ragib Hasan and Marianne Winslett, “Efficient Audit-based Compliance for Relational Data Retention”, In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2011. (acceptance rate 35/217 = 16.12%). [pdf]
  • 2010
    1. Ragib Hasan and Marianne Winslett, “Trustworthy Vacuuming and Litigation Holds in Long-term, High-integrity Records Retention”, In Proceedings of the 13th International Conference on Extending Database Technology (EDBT), 2010. (acceptance 54/307= 18%). [pdf]
  • 2009
    1. Ragib Hasan, “Protecting the Past and Present of Data, with Applications in Secure Provenance and Regulatory Compliant Databases”, In Proceedings of the 3rd SIGMOD PhD Workshop on Innovative Database Research, 2009. [pdf]
    2. Ragib Hasan, Radu Sion, and Marianne Winslett “Remembrance: The Unbearable Sentience of Being Digital, In Proceedings of the 4th Biennial Conference on Innovative Data Systems Research CIDR 2009 (Perspectives Track) [pdf]
    3. Ragib Hasan, Radu Sion, and Marianne Winslett, “The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance”, In Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST 2009), (acceptance 23/102=22.5%). [pdf]
    4. Ragib Hasan, Rakesh Bobba, and Himanshu Khurana, “Analyzing NASPINet Dataflows”, In Proceeding of IEEE Power System Conference and Expo (PSCE), Seattle, Washington, March 15-19, 2009. [pdf]
  • 2008
    1. Ragib Hasan, Richard Conlan, Brian Slesinsky, Nandu Ramani, and Marianne Winslett, “Please Permit Me: Stateless Delegated Authorization in Mashups”, In Proceedings of Annual Computer Security Applications Conference (ACSAC), Anaheim, CA, December 2008. (acceptance 42/173=24.2%). [pdf]
  • 2007
    1. Jodie P. Boyer, Lars E. Olson, Ragib Hasan, Nikita Borisov, Carl A. Gunter, and David Raila, “Improving Multi-Tier Security Using Redundant Authentication”, In Proceedings of the First Computer Security Architecture Workshop (CSAW), in conjunction with ACM CCS, Alexandria, VA, November 2007.[pdf]
    2. Ragib Hasan, Radu Sion, and Marianne Winslett, Introducing Secure Provenance: Problems and Challenges, In Proceedings of the Workshop on Storage Security and Survivability (StorageSS 2007), in conjunction with ACM CCS 2007, Alexandria, VA, October 2007. [pdf]
    3. Ragib Hasan, Radu Sion, and Marianne Winslett, “Requirements of Secure Storage Systems for Health-care Records“, In Proceedings of the 4th VLDB Workshop on Secure Data Management (SDM), in conjunction with 33rd International Conference on Very Large Data Bases (VLDB), University of Vienna, Austria, September 2007. [pdf]
  • 2006
    1. Ragib Hasan and William Yurcik, “Beyond Media Hype: Empirical Analysis of Disclosed Privacy Breaches 2005-2006 and a DataSet/Database Foundation for Future Work“, In Proceedings of the Workshop on the Economics of Securing the Information Infrastructure, October 23-24, 2006. [pdf]
    2. William Yurcik, Ragib Hasan, Toward One Strong National Breach Disclosure Law – Justification and Requirements, In Proceedings of the Workshop on the Economics of Securing the Information Infrastructure, October 23-24, 2006.
    3. Ragib Hasan and William Yurcik, A Statistical Analysis of Disclosed Storage Security Breaches“, In Proceedings of the International Workshop on Storage Security and Survivability (StorageSS) in conjunction with 12th ACM Conference on Computer and Communications Security (CCS 2006) , October, 2006.
    4. Ragib Hasan, Marianne Winslett, “Synergy: A Trust-aware, Policy-driven Information Dissemination Framework”, In Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI 2006), San Diego, USA, May 23-24, 2006.
  • 2005
    1. Ragib Hasan, Suvda Myagmar, Adam J. Lee, and William Yurcik, Toward a Threat Model for Storage Systems, In Proceedings of the International Workshop on Storage Security and Survivability (StorageSS) in conjunction with 12th ACM Conference on Computer and Communications Security (CCS 2005) , November 11, 2005 .
    2. Ragib Hasan, William Yurcik, and Suvda Myagmar, The Evolution of Storage Service Providers: Techniques and Challenges to Outsourcing Storage, In Proceedings of the International Workshop on Storage Security and Survivability (StorageSS) in conjunction with 12th ACM Conference on Computer and Communications Security (CCS 2005), November 11, 2005.
    3. Ragib Hasan, Zahid Anwar, William Yurcik, Roy Campbell, A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems, In Proceedings of the IEEE International Conference on Information Technology (ITCC), Las Vegas, NV, April 2005.
    4. Joseph Tucek, Paul Stanton, Elizabeth Haubert, Ragib Hasan, Larry Brumbaugh, and William Yurcik “Trade-offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions”, In Proceedings of the 22nd IEEE – 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST) , Monterey CA USA, April 2005.
    5. Ragib Hasan, Joseph Tucek, Paul Stanton, William Yurcik, Larry Brumbaugh, Jeff Rosendale, and Roelof Boonstra,“The Techniques and Challenges of Immutable Storage for Applications in Multimedia”, In Proceedings of the IS&T/SPIE International Symposium Electronic Imaging / Storage and Retrieval Methods and Applications for Multimedia (EI121) , San Jose CA USA, January 2005.

Posters and Demo Papers

    1. Rasib Khan and Ragib HAsan, “A Distributed Security Architecture for P2PSIP”,
      IEEE Symposium on Security & Privacy, May, 2013. [pdf]
    2. Shams Zawoad, Ragib Hasan and Munir Haque, “StuxMob: A Situational-Aware Malware for Targeted Attack on Smart Mobile Devices”IEEE Symposium on Security & Privacy, May, 2013. [pdf]
UAB the University of Alabama at Birmingham home
UAB is an Equal Employment/Equal Educational Opportunity Institution dedicated to providing equal opportunities and equal access to all individuals regardless of race, color, religion, ethnic or national origin, sex (including pregnancy), genetic information, age, disability, religion, sexual orientation, gender identity, gender expression, and veteran’s status. As required by Title IX, UAB prohibits sex discrimination in any education program or activity that it operates. Individuals may report concerns or questions to UAB’s Assistant Vice President and Senior Title IX Coordinator. The Title IX notice of nondiscrimination is located at uab.edu/titleix.