Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ahmad Samer Wazan is active.

Publication


Featured researches published by Ahmad Samer Wazan.


international conference for young computer scientists | 2008

Validating X.509 Certificates Based on their Quality

Ahmad Samer Wazan; Romain Laborde; François Barrère; Abdelmalek Benzekri

The growing number of PKIs (Public Key Infrastructure) and the increasing number of situations where partners of a transaction may carry certificates signed by different CAs (Certification Authority) point out the problematic of trust between the different CAs. The degree to which a relying party can trust a CA depends upon the quality of its announced policy and its commitment to this policy. In this paper, we present an approach that helps a relying party to assess the quality of a certificate that is related to the quality of CA policy and its commitment to it.


information security conference | 2009

Which Web Browsers Process SSL Certificates in a Standardized Way

Ahmad Samer Wazan; Romain Laborde; David W. Chadwick; François Barrère; Abdelmalek Benzekri

SSL is the primary technology used to secure web communications. Before setting up an SSL connection, web browsers have to validate the SSL certificate of the web server in order to ensure that users access the expected web site. We have tested the handling of the main fields in SSL certificates and found that web browsers do not process them in a homogenous way. An SSL certificate can be accepted by some web browsers whereas a message reporting an error can be delivered to users by other web browsers for the same certifi- cate. This diversity of behavior might cause users to believe that SSL certifi- cates are unreliable or error prone, which might lead them to consider that SSL certificates are useless. In this paper, we highlight these different behaviors and we explain the reasons for them which can be either a violation of the standards or ambiguity in the standards themselves. We give our opinion of which it is in our analysis.


international symposium on networks computers and communications | 2015

G-Cloud on Openstack: Adressing access control and regulation requirements

Ibrahim Yonis Omar; Romain Laborde; Ahmad Samer Wazan; François Barrère; Abdelmalek Benzekri

It is well known that e-Government applications bring several benefits to citizens in terms of efficiency, accessibility and transparency. Today, most of governments tend to propose cloud computing based e-services to their citizens. A key component in these services is the access control management issue. In this paper, we present our research works for building an access control system for the Djiboutian e-Government project that is built using Openstack framework. Specifically, we demonstrate the limitation of the integrated access control system in Openstack for the Djiboutian e-Government access control requirements and for the compliance to the related regulation. Thus, we propose to extend the existing access control system of Openstack by integrating the features of the XACML V3 to the Openstack framework.


Security and Communication Networks | 2017

Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker

Ahmad Samer Wazan; Romain Laborde; David W. Chadwick; François Barrère; Abdelmalek Benzekri; Mustafa Kaiiali; Adib Habbal

A Public Key Infrastructure (PKI) is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988) standard and is composed of three entities: the certification authority (CA), the certificate holder (or subject), and the Relying Party (RP). The CA plays the role of a trusted third party between the certificate holder and the RP. In many use cases, this trust model has worked successfully. However, we argue that the application of this model on the Internet implies that web users need to depend on almost anyone in the world in order to use PKI technology. Thus, we believe that the current TLS system is not fit for purpose and must be revisited as a whole. In response, the latest draft edition of X.509 has proposed a new trust model by adding new entity called the Trust Broker (TB). In this paper, we present an implementation approach that a Trust Broker could follow in order to give RPs trust information about a CA by assessing the quality of its issued certificates. This is related to the quality of the CA’s policies and procedures and its commitment to them. Finally, we present our Trust Broker implementation that demonstrates how RPs can make informed decisions about certificate holders in the context of the global web, without requiring large processing resources themselves.


International Workshop on Systems and Virtualization Management | 2008

Authentication in Virtual Organizations: A Reputation Based PKI Interconnection Model

Ahmad Samer Wazan; Romain Laborde; François Barrère; Abdelmalek Benzekri

Authentication mechanism constitutes a central part of the virtual organization work. The PKI technology is used to provide the authentication in each organization involved in the virtual organization. Different trust models are proposed to interconnect the different PKIs in order to propagate the trust between them. While the existing trust models contain many drawbacks, we propose a new trust model based on the reputation of PKIs.


availability, reliability and security | 2017

Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach

Sravani Teja Bulusu; Romain Laborde; Ahmad Samer Wazan; François Barrère; Abdelmalek Benzekri

Since many decades, requirements engineering domain has seen significant enhancements towards adapting the security and risk analysis concepts. In this regard, there exist numerous security requirements engineering methodologies that support elicitation and evaluation of the security requirements. However, selecting a security requirements engineering methodology (SRE) for a given context of use often depends on a set of ad hoc criteria. In this paper, we propose a methodological evaluation methodology that helps in identifying the characteristics of a good SRE methodology.


local computer networks | 2016

How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches

Ahmad Samer Wazan; Romain Laborde; David W. Chadwick; François Barrère; Abdelmalek Benzekri

A Public Key Infrastructure (PKI) is based on a trust model defined by the original X.509 standard and is composed of three entities: the Certification Authority, the certificate holder (subject) and the Relying Party. The CA plays the role of a trusted third party between the subject and the RP. A trust evaluation problem is raised when an RP receives a certificate from an unknown subject that is signed by an unknown CA. Different approaches have been proposed to handle this trust problem. We argue that these approaches work only in the closed deployment model where RPs are also subjects, but cannot work in the open deployment model where they are not. Our objective is to identify the deficiencies in the existing trust approaches that try to help RPs to make trust decisions about certificates in the Internet, and to introduce the new X.509 approach based on a trust broker.


international conference on digital information management | 2008

The X.509 certificate quality

Ahmad Samer Wazan; Romain Laborde; François Barrère; Abdelmalek Benzekri

The growing number of PKIs (public key infrastructure) and the increasing number of situations where partners of a transaction may carry certificates signed by different CAs (certification authority) point out the problematic of trust between the different CAs. The degree to which a relying party can trust a CA depends upon the quality of its announced policy and its commitment to this policy. In this paper, we present an approach that helps a relying party to assess the quality of a certificate that is related to the quality of CA policy and its commitment to it. We integrate the role of relying party in the evaluation process.


acm symposium on applied computing | 2018

Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies

Sravani Teja Bulusu; Romain Laborde; Ahmad Samer Wazan; François Barrère; Abdelmalek Benzekri


computer software and applications conference | 2017

TLS Connection Validation by Web Browsers: Why do Web Browsers Still Not Agree?

Ahmad Samer Wazan; Romain Laborde; David W. Chadwick; François Barrère; Abdelmalek Benzekri

Collaboration


Dive into the Ahmad Samer Wazan's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mustafa Kaiiali

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar

Adib Habbal

Universiti Utara Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge