Sayed Gholam Hassan Tabatabaei
Universiti Teknologi Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sayed Gholam Hassan Tabatabaei.
grid computing | 2010
Amir Vahid Dastjerdi; Sayed Gholam Hassan Tabatabaei; Rajkumar Buyya
Cloud computing is a computing paradigm which allows access of computing elements and storages on-demand over the Internet. Virtual Appliances, pre-configured, ready-to-run applications are emerging as a breakthrough technology to solve the complexities of service deployment on Cloud infrastructure. However, an automated approach to deploy required appliances on the most suitable Cloud infrastructure is neglected by previous works which is the focus of this work. In this paper, we propose an effective architecture using ontology-based discovery to provide QoS aware deployment of appliances on Cloud service providers. In addition, we test our approach on a case study and the result shows the efficiency and effectiveness of the proposed work.
2009 Third International Conference on Advanced Engineering Computing and Applications in Sciences | 2009
Amir Vahid Dastjerdi; Kamalrulnizam Abu Bakar; Sayed Gholam Hassan Tabatabaei
Cloud Computing extends an enterprise ability to meet the computing demands of its everyday operations, while offering flexibility, mobility and scalability. However, the reason that Chief Information Officers (CIOs) and their colleagues hesitate to let their business workloads to move from private Cloud into public Cloud is security. This work tries to offer a line of defense by applying Mobile Agents technology to provide intrusion detection for Cloud applications regardless of their locations. Therefore, CIOs feel safer to use Cloud to extend their on-premise infrastructure by adding capacity on demand.
Software - Practice and Experience | 2012
Amir Vahid Dastjerdi; Sayed Gholam Hassan Tabatabaei; Rajkumar Buyya
Cloud computing offers virtualized computing elements on demand in a pay‐as‐you‐go manner. The major motivations to adopt Cloud services include no upfront investment on infrastructure and transferring responsibility of maintenance, backups, and license management to Cloud Providers. However, one of the key challenges that holds businesses from adopting Cloud computing services is that, by migrating to Cloud, they move some of their information and services out of their direct control. Their main concern is how well the Cloud providers keep their information (security) and deliver their services (performance). To cope with this challenge, several service level agreement management systems have been proposed. However, monitoring service deployment as a major responsibility of those systems have not been deeply investigated yet. Therefore, this paper shows how monitoring services have to be described, deployed (discovered and ranked), and then how they have to be executed to enforce accurate penalties by eliminating service level agreement failure cascading effects on violation detection. Copyright
international conference on software engineering advances | 2008
Sayed Gholam Hassan Tabatabaei; Wan M. N. Wan Kadir; Suhaimi Ibrahim
In todays Web environment, many enterprises decide to implement and publish their applications on the Internet using Web services technology. In many cases, a single service is not sufficient to fulfill the users request. To solve this problem, services should be combined together. Therefore, composition of Web services is one of the recent critical issues. A number of approaches have been presented, to tackle this problem. In this paper, we categorize these approaches into four categories (workflow-based, AI-planning based, syntactic-based, and semantic-based). Then, we compare these approaches based on some criteria (like QoS, scalability, and correctness). Investigation of that classification will help researchers who are working on service composition to deliver more applicable solutions.
information integration and web-based applications & services | 2010
Keyvan Mohebbi; Suhaimi Ibrahim; Mojtaba Khezrian; Kanmani Munusamy; Sayed Gholam Hassan Tabatabaei
Currently, most enterprises deploy their services on the Web. This augments the request for tools to perform discovery, selection, composition and invocation of Web services. Among them, Web service discovery should be considered more important. Along with the growing number of available Web services, there is a need for tools not only to perform discovery, but also to realize them in an efficient and effective manner. A number of approaches to Web service discovery have been proposed. In this paper, we provide a taxonomy which categorizes Web service discovery systems from different points of view. Moreover, current approaches to Semantic Web service discovery are classified and described. In addition, we compare the approaches with respect to some criteria from different aspects of view. The results of this study can help researchers in both academia and industry to implement a new or to select the most appropriate existing approach for Semantic Web service discovery with the aid of different criteria.
asia-pacific services computing conference | 2008
Sayed Gholam Hassan Tabatabaei; Wan M. N. Wan Kadir; Suhaimi Ibrahim
Web services are the preferred standards-based way to realize service oriented architecture (SOA) computing. A problem that has become one of the recent critical issues is automated composition of Web services. A number of approaches have been proposed to resolve the problem. However, discovery and composition of Web services have been neglected by majority of those approaches. In this paper, we propose an approach called AIMO, based on AI-planning and Web service modeling ontology (WSMO), which are adapted and extended to tackle the mentioned problem. Moreover, we propose a translator to provide interaction between WSMO and AI-planning. We start with presenting the AIMO architecture which shows all components of the proposed approach. Finally, a simple case study is designed to test some components of AIMO. The preliminary results of the test demonstrate that our approach provides an applicable solution.
automation of software test | 2011
Hazlifah Mohd Rusli; Mazidah Puteh; Suhaimi Ibrahim; Sayed Gholam Hassan Tabatabaei
More and more Web based systems are being developed by composing other single or even composite services. This is due to the fact that not all available services are able to satisfy the needs of a user. The process of composing Web services involves discovering the appropriate services, selecting the best services, combining those services together, and finally executing them. Although much research efforts have been dedicated to the discovery, selection, and composition of services, the process of testing the Web service composition has not been given the same attention. This paper discusses the importance of Web services composition testing, provides a classification of the most prominent approaches in that area, presents several criteria for comparison of those approaches, and conducts a comparative evaluation of the approaches. The results of the paper give an essential perspective to do research work on Web services composition testing.
International Journal of Web Information Systems | 2010
Sayed Gholam Hassan Tabatabaei; Amir Vahid Dastjerdi; Wan M. N. Wan Kadir; Suhaimi Ibrahim; Elahe Sarafian
Purpose – Automated composition of semantic web services has become one of the recent critical issues in todays web environment. Despite the importance of artificial intelligence (AI)‐planning techniques for web service composition, previous works in that area do not address security issues, which is the focus of this paper. The purpose of this paper is to propose an approach to achieve security conscious composition of semantic web services.Design/methodology/approach – The proposed approach called security conscious composition of semantic web services (SCAIMO) is based on the prior work, i.e. AIMO. The AIMO is an effective approach for web service discovery and composition based on AI‐planning, web service modeling ontology (WSMO), and description logic (DL). In this paper, definitions of secure matchmaking and web service composition are formalized based on DLs. Moreover, security capabilities and constraint types in the proposed SCAIMO framework are presented.Findings – This paper proposes a secure ...
international conference on internet and web applications and services | 2010
Sayed Gholam Hassan Tabatabaei; Wan M. N. Wan Kadir; Suhaimi Ibrahim; Amir Vahid Dastjerdi
Semantic Web service discovery and Semantic Web service composition can be considered as complementary techniques. Overcoming both those obstacles is the key to automatic generation of executable Semantic Web services process. In this paper, we propose a translator to realize the AIMO framework which is based on an AI-planning based approach called HTN-DL and Web Service Modeling Ontology (WSMO) that provides Semantic Web service discovery and composition. The AIMO Translator consists of four algorithms to translate each WSMO elements into corresponding elements of HTN-DL. Moreover, the proposed translator has been implemented and tested and the result shows that the AIMO Translator is performed and usable.
information integration and web-based applications & services | 2010
Mojtaba Khezrian; Wan M. N. Wan Kadir; Suhaimi Ibrahim; Keyvan Mohebbi; Kanmani Munusamy; Sayed Gholam Hassan Tabatabaei
Nowadays, considering Web Services has become one of the hot issues in the area of computer science that makes an ability to collect capabilities and components in a unique interface to fulfill the users requirements. Sometimes two or more services are discovered in available list of services; therefore, there should be a possibility for selecting the best services from discovered list which can satisfy the users goal. Currently, there are some approaches for sustaining Semantic Web Service Selection such as WSMO, OWL-S, and SAWSDL. In this paper a classification based on two levels is presented: QoS level and Semantic level. The QoS level includes five categories: Policy based, Trust & Reputation based, Improve protocol based, Semantic based, and Preference based. The Semantic level includes: WSMO, OWL-S, and SAWSDL. In each level, the approaches are compared based on some criteria such as Performance, Automatic, and Scalability. Finally the results of the comparative evaluation are presented in both levels.