Learn More
The Lack of security policy enforcement in Web development languages is one of the most important challenges in Web application systems development, as there is no formal check for security policy violation that may occur during Web application system development. To check for policy compliance, the programmer must walk through all the code and check every(More)
Distributed applications typically involve many components, each with unique security and privacy requirements. Such applications require fine-grained access control mechanisms that allow dynamic delegation and revocation of access rights. Embedding such domain-specific requirements in a functional language like Haskell puts all the expressiveness of the(More)
Mycetoma is a unique neglected tropical disease which is endemic in what is known as the "mycetoma belt". The disease has many devastating impacts on patients and communities in endemic area and is characterised by massive deformity, destruction and disability. Mycetoma is commonly seen in the foot and hand and less frequent in other parts of the body.(More)
We present a model for securing Map/Reduce computation in the cloud. The model uses a language based security approach to enforce information flow policies that vary dynamically due to a restricted revocable delegation of access rights between principals. The decentralized label model (DLM) is used to express these policies. We present a scenario that shows(More)
This paper focuses on the different challenges to design a security typed web scripting language. It uses the type system approach on a simple imperative language that captures a subset of the security typed Web language constructs to express the security properties that must be held in the language with respect to its formal semantics to prevent insecure(More)
  • Doaa Hassan
  • 2015
The log files produced by Network Intrusion Detection Systems (NIDS) provide a list of alerts information about network malicious activities that have been performed. Various parameters of each alert in the log file can be revealed by a detailed analysis of such a log. Examples of those parameters include, but are not limited to time stamp information,(More)
Vaginal administration of sildenafil citrate has shown recently to develop efficiently the uterine lining with subsequent successful embryo implantation following in vitro fertilization. The aim of the present study was to develop sildenafil-loaded liposomes coated with bioadhesive polymers for enhanced vaginal retention and improved drug permeation. Three(More)
Basal cell carcinoma (BCC) is by far the most prevalent skin cancer. Eighty percent of BCC affect the facial skin. The greatest challenge is removing all tumor cells to prevent a recurrence in complicated cases , as recurrent tumor are more difficult to cure. Ten patients with basal cell carcinoma on the nose and five patients with basal cell carcinoma on(More)
  • 1