Home / Publications / Reports

Reports

I have successfully defenses my PhD thesis on “Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses”

I have successfully defended my PhD thesis and ended my journey at Purdue. This would have not been possible without the help and guidance from my advisors Prof. Eugene H. Spafford (aka. Spaf) and Prof. Mikhal J. Atallah (aka. Mike). I was honored to have the opportunity to learn from such renowned scientists and …

Read More »

Privacy Preserving Access Control Framework

Mohammed H. Almeshekah and Ninghui Li I worked with Prof. Li at Purdue to provide a report on privacy preserving access control framework for project lead by Dr. Waleed Alrodhan on studying the privacy practices in the Saudi Market. Below is a description on the project and the details of the report we …

Read More »

[Report] Improving Security Using Deception

Mohammed H. Almeshekah, Eugene H. Spafford and Mikhail J. Atallah The Center for Education and Research in Information Assurance and Security: Technical Report (CERIAS TR 2013-13), November 2013 ABSTRACT: As the convergence between our physical and digital worlds continues at a rapid pace, much of our information is becoming available online. …

Read More »

Proposal for Better Revocation Model of SSL/TLS Certificates

Mohammed H. Almeshekah Mozilla Corporation, September 2013    ABSTRACT: There are multiple initiatives that have emerged in the past couple of years to address some of the inherit limitation of the CA-based trust model and SSL certificates. One of the these limitations is the current revocation models. In this document we …

Read More »

[Report] Economics of Identity Management Systems – Towards and Economically Incentived User-Centric IDMS

Mohammed H. Almeshekah Masters Thesis, Information Security Group, Royal Holloway, University of London, September 2010 ABSTRACT: The ubiquity of identity management systems in people’s online activities has lead to a significant growth in the number of identity management solutions. These systems have been designed to help users manage their digital identities …

Read More »