Doaa Hassan

Learn More
We present a model for securing Map/Reduce computation in the cloud. The model uses a language based security approach to enforce information flow policies that vary dynamically due to a restricted revocable delegation of access rights between principals. The decentralized label model (DLM) is used to express these policies. We present a scenario that shows(More)
Distributed applications typically involve many components, each with unique security and privacy requirements. Such applications require fine-grained access control mechanisms that allow dynamic delegation and revocation of access rights. Embedding such domain-specific requirements in a functional language like Haskell puts all the expressiveness of the(More)
Mycetoma is a unique neglected tropical disease which is endemic in what is known as the "mycetoma belt". The disease has many devastating impacts on patients and communities in endemic area and is characterised by massive deformity, destruction and disability. Mycetoma is commonly seen in the foot and hand and less frequent in other parts of the body.(More)
The Lack of security policy enforcement in Web development languages is one of the most important challenges in Web application systems development, as there is no formal check for security policy violation that may occur during Web application system development. To check for policy compliance, the programmer must walk through all the code and check every(More)
  • Doaa Hassan
  • 2015 11th International Conference on Information…
  • 2015
The log files produced by Network Intrusion Detection Systems (NIDS) provide a list of alerts information about network malicious activities that have been performed. Various parameters of each alert in the log file can be revealed by a detailed analysis of such a log. Examples of those parameters include, but are not limited to time stamp information,(More)
SBA-15 is used to enhance the bioavailability of poorly soluble ketoprofen (KP) through stabilization of its amorphous state. Additionally, the current work provides a complete in vitro and in vivo study on preformulated KP-SBA-15 sample and formulated KP-SBA-15 in hard gelatin capsule. Loading of KP was done by a novel method called immersion-rotavapor(More)
Phishing websites are a form of mimicking the legitimate ones for the purpose of stealing user 's confidential information such as usernames, passwords and credit card information. Recently machine learning and data mining techniques have been a promising approach for detection of phishing websites by distinguishing between phishing and legitimate(More)
Vaginal administration of sildenafil citrate has shown recently to develop efficiently the uterine lining with subsequent successful embryo implantation following in vitro fertilization. The aim of the present study was to develop sildenafil-loaded liposomes coated with bioadhesive polymers for enhanced vaginal retention and improved drug permeation. Three(More)