Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Basit Shafiq is active.

Publication


Featured researches published by Basit Shafiq.


IEEE Transactions on Knowledge and Data Engineering | 2005

Secure interoperation in a multidomain environment employing RBAC policies

Basit Shafiq; James B. D. Joshi; Elisa Bertino; Arif Ghafoor

Multidomain application environments where distributed multiple organizations interoperate with each other are becoming a reality as witnessed by emerging Internet-based enterprise applications. Composition of a global coherent security policy that governs information and resource accesses in such environments is a challenging problem. In this paper, we propose a policy integration framework for merging heterogeneous role-based access control (RBAC) policies of multiple domains into a global access control policy. A key challenge in composition of this policy is the resolution of conflicts that may arise among the RBAC policies of individual domains. We propose an integer programming (IP)-based approach for optimal resolution of such conflicts. The optimality criterion is to maximize interdomain role accesses without exceeding the autonomy losses beyond the acceptable limit.


IEEE Transactions on Services Computing | 2012

Semantics-Based Automated Service Discovery

Aabhas V. Paliwal; Basit Shafiq; Jaideep Vaidya; Hui Xiong; Nabil R. Adam

A vast majority of web services exist without explicit associated semantic descriptions. As a result many services that are relevant to a specific user service request may not be considered during service discovery. In this paper, we address the issue of web service discovery given nonexplicit service description semantics that match a specific service request. Our approach to semantic-based web service discovery involves semantic-based service categorization and semantic enhancement of the service request. We propose a solution for achieving functional level service categorization based on an ontology framework. Additionally, we utilize clustering for accurately classifying the web services based on service functionality. The semantic-based categorization is performed offline at the universal description discovery and integration (UDDI). The semantic enhancement of the service request achieves a better matching with relevant services. The service request enhancement involves expansion of additional terms (retrieved from ontology) that are deemed relevant for the requested functionality. An efficient matching of the enhanced service request with the retrieved service descriptions is achieved utilizing Latent Semantic Indexing (LSI). Our experimental results validate the effectiveness and feasibility of the proposed approach.


ACM Transactions on Information and System Security | 2005

X-gtrbac admin: A decentralized administration model for enterprise-wide access control

Rafae Bhatti; Basit Shafiq; Elisa Bertino; Arif Ghafoor; James B. D. Joshi

The modern enterprise spans several functional units or administrative domains with diverse authorization requirements. Access control policies in an enterprise environment typically express these requirements as authorization constraints. While desirable for access control, constraints can lead to conflicts in the overall policy in a multidomain environment. The administration problem for enterprise-wide access control, therefore, not only includes authorization management for users and resources within a single domain but also conflict resolution among heterogeneous access control policies of multiple domains to allow secure interoperation within the enterprise. This work presents design and implementation of X-GTRBAC Admin, an administration model that aims at enabling administration of role-based access control (RBAC) policies in the presence of constraints with support for conflict resolution in a multidomain environment. A key feature of the model is that it allows decentralization of policy administration tasks through the abstraction of administrative domains, which not only simplifies authorization management, but is also fundamental to the concept of decentralized conflict resolution presented. The paper also illustrates the applicability of the outlined administrative concepts in a realistic enterprise environment using an implementation prototype that facilitates policy administration in large enterprises.


symposium on access control models and technologies | 2003

Dependencies and separation of duty constraints in GTRBAC

James B. D. Joshi; Basit Shafiq; Arif Ghafoor; Elisa Bertino

A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACs language constructs allow one to specify various temporal constraints on role, user-role assignments and role-permission assignments. In this paper, we identify various time-constrained cardinality, control flow dependency and separation of duty constraints (SoDs). Such constraints allow specification of dynamically changing access control requirements that are typical in todays large systems. In addition to allowing specification of time, the constraints introduced here also allow expressing access control policies at a finer granularity. The inclusion of control flow dependency constraints allows defining much stricter dependency requirements that are typical in workflow types of applications.


workshop on object-oriented real-time dependable systems | 2005

A role-based access control policy verification framework for real-time systems

Basit Shafiq; Ammar Masood; James B. D. Joshi; Arif Ghafoor

This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The temporal and event-based semantics of these applications can be expressed using event-driven role based access control (RBAC) model. Any comprehensive access control model such as RBAC requires verification and validation mechanisms to ensure the consistency of access control specification. An inconsistent access control specification exposes the underlying system to numerous vulnerabilities and security risks. In this paper, we propose a Petri-net based framework for verifying the correctness of event-driven RBAC policies.


IEEE Transactions on Dependable and Secure Computing | 2014

A Random Decision Tree Framework for Privacy-Preserving Data Mining

Jaideep Vaidya; Basit Shafiq; Wei Fan; Danish Mehmood; David Lorenzi

Distributed data is ubiquitous in modern information driven applications. With multiple sources of data, the natural challenge is to determine how to collaborate effectively across proprietary organizational boundaries while maximizing the utility of collected information. Since using only local data gives suboptimal utility, techniques for privacy-preserving collaborative knowledge discovery must be developed. Existing cryptography-based work for privacy-preserving data mining is still too slow to be effective for large scale data sets to face todays big data challenge. Previous work on random decision trees (RDT) shows that it is possible to generate equivalent and accurate models with much smaller cost. We exploit the fact that RDTs can naturally fit into a parallel and fully distributed architecture, and develop protocols to implement privacy-preserving RDTs that enable general and efficient distributed privacy-preserving knowledge discovery.


web intelligence | 2009

Preserving Privacy in Social Networks: A Structure-Aware Approach

Xiaoyun He; Jaideep Vaidya; Basit Shafiq; Nabil R. Adam; Vijay Atluri

Graph structured data can be ubiquitously found in the real world. For example, social networks can easily be represented as graphs where the graph connotes the complex sets of relationships between members of social systems. While their analysis could be beneficial in many aspects, publishing certain types of social networks raises significant privacy concerns. This brings the problem of graph anonymization into sharp focus. Unlike relational data, the true information in graph structured data is encoded within the structure and graph properties. Motivated by this, we propose a structure aware anonymization approach that maximally preserves the structure of the original network as well as its structural properties while anonymizing it. Instead of anonymizing each node one by one independently, our approach treats each partitioned substructural component of the network as one single unit to be anonymized. This maximizes utility while enabling anonymization. We apply our method to both synthetic and real datasets and demonstrate its effectiveness and practical usefulness.


Government Information Quarterly | 2014

Enhancing the government service experience through QR codes on mobile platforms

David Lorenzi; Jaideep Vaidya; Soon Ae Chun; Basit Shafiq; Vijayalakshmi Atluri

Abstract Digital government is universally gaining acceptance as the public becomes more technologically advanced. It is critical for the government to embrace new technology for minimizing costs and maximizing utility of services to the taxpayers. While administrative services have been easily ported to the digital world, there are still many important citizen-centric services that have not yet been effectively migrated. Quick Response codes (QR codes) provide a means to effectively distribute many different varieties of information to the public. We propose to integrate QR code systems and corresponding smartphone applications into existing government services with the goal of providing a new level of interactivity for the public. We illustrate this through two case studies, examining the National Park Services and the Mobile Environmental Information Services (MENVIS). The focus is on developing a QR code waypoint system for park navigation, as well as incentivizing park use through gamification of site attractions. The system provides increased safety for park goers, disseminates information more effectively and accurately, and improves feedback.


IEEE Transactions on Multimedia | 2002

A model for secure multimedia document database system in a distributed environment

James B. D. Joshi; Zhaohui Kevin Li; Husni Fahmi; Basit Shafiq; Arif Ghafoor

The Internet provides a universal platform for large-scale distribution of information and supports inter-organizational services, system integration, and collaboration. Use of multimedia documents for dissemination and sharing of massive amounts of information is becoming a common practice for Internet-based applications and enterprises. With the rapid proliferation of multimedia data management technologies over the Internet, there is growing concern about security and privacy of information. Composing multimedia documents in a distributed heterogeneous environment involves integrating media objects from multiple security domains that may employ different access control policies for media objects. In this paper, we present a security model for distributed document management system that allows creation, storage, indexing, and presentation of secure multimedia documents. The model is based on a time augmented Petri-net and provides a flexible, multilevel access control mechanism that allows clearance-based access to different levels of information in a document. In addition, the model provides detailed multimedia synchronization requirements including deterministic and non-deterministic temporal relations and incomplete timing information among media objects.


international symposium on object component service oriented real time distributed computing | 2005

A GTRBAC based system for dynamic workflow composition and management

Basit Shafiq; Arjmand Samuel; Halima Ghafoor

In this paper, we propose an architecture for adaptive real-time workflow-based collaborative system. Such a system is needed to support real-time communication and sharing of information among predefined or ad hoc team of users collaborating with each other for the execution of their respective tasks in the workflow. A key requirement for real-time workflow system is to provide the right data to the right person at the right time. In addition, the workflow needs to be reconfigured if a subtask of a workflow cannot be executed within the due time. We use the generalized temporal role-based access control (GTRBAC) model to capture the real-time dependencies of such workflow applications. In addition, support for triggers in GTRBAC allows dynamic adaptation of workflow based on the occurrence of certain events. Such adaptations may include rescheduling of workflow tasks, reassignment of users to scheduled tasks based on their availability and skill level, and abortion of incomplete tasks.

Collaboration


Dive into the Basit Shafiq's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Soon Ae Chun

City University of New York

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge