Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Xiaoqi Ma is active.

Publication


Featured researches published by Xiaoqi Ma.


international conference on computational and information sciences | 2012

Security Concerns in Cloud Computing

Xiaoqi Ma

In cloud computing environment, security becomes a more and more critical issue as users are sharing computing resources remotely. It is important to analyse the potential security challenges and risks clouds may face. In this paper, a number of security challenges, concerns and issues are discussed, including three major aspects of security, namely confidentiality, integrity and availability.


International Journal of Security and Networks | 2008

Verifying security protocols by knowledge analysis

Xiaoqi Ma; Xiaochun Cheng

This paper describes a new interactive method to analyse knowledge of participants involved in security protocols and further to verify the correctness of the protocols. The method can detect attacks and flaws involving interleaving sessions besides normal attacks. The implementation of the method in a generic theorem proving environment, namely Isabelle, makes the verification of protocols mechanical and efficient; it can verify a medium-sized security protocol in less than ten seconds. As an example, the paper finds the flaw in the Needham-Schroeder public key authentication protocol and proves the secure properties and guarantees of the protocol with Lowes fix to show the effectiveness of this method.


software engineering, artificial intelligence, networking and parallel/distributed computing | 2006

Verifying and Fixing Password Authentication Protocol

Xiaoqi Ma; Rachel McCrindle; Xiaochun Cheng

Password authentication protocol (PAP) is widely used in the wireless fidelity point-to-point protocol to authenticate an identity and password for a peer. This paper uses a new knowledge-based framework to verify the PAP protocol and a fixed version. Flaws are found in both the original and the fixed versions. A new enhanced protocol is provided and the security of it is proved. The whole process is implemented in a mechanical reasoning platform, Isabelle. It only takes a few seconds to find flaws in the original and the fixed protocol and to verify that the enhanced version of the PAP protocol is secure


International Journal of Advanced Research in Artificial Intelligence | 2014

Modelling and simulation of a biometric identity-based cryptography

Dania Aljeaid; Xiaoqi Ma; Caroline S. Langensiepen

Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tends to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. This paper also demonstrates the feasibility of using finite-state machines as a formal method to analyse the proposed protocols. Finally we showed how Petri Nets could be used to simulate the communication patterns between the server and client as well as to validate the protocol functionality.


BioMed Research International | 2015

Construction of Pancreatic Cancer Classifier Based on SVM Optimized by Improved FOA

Huiyan Jiang; Di Zhao; Ruiping Zheng; Xiaoqi Ma

A novel method is proposed to establish the pancreatic cancer classifier. Firstly, the concept of quantum and fruit fly optimal algorithm (FOA) are introduced, respectively. Then FOA is improved by quantum coding and quantum operation, and a new smell concentration determination function is defined. Finally, the improved FOA is used to optimize the parameters of support vector machine (SVM) and the classifier is established by optimized SVM. In order to verify the effectiveness of the proposed method, SVM and other classification methods have been chosen as the comparing methods. The experimental results show that the proposed method can improve the classifier performance and cost less time.


international conference for internet technology and secured transactions | 2013

Analysing and attacking the 4-way handshake of IEEE 802.11i standard

Abdullah Alabdulatif; Xiaoqi Ma; Lars Nolle

The IEEE 802.11i standard has been designed to enhance security in wireless networks. In the 4-way handshake the supplicant and the authenticator use the pairwise master key (PMK) to derive a fresh pairwise transient key (PTK). The PMK is not used directly for security while assuming the supplicant and authenticator have the same PMK before running 4-way handshake. In this paper, the 4-way handshake phase has been analysed using Isabelle tool to identify a new Denial-of-Service (DoS) attack. The attack prevents the authenticator from receiving message 4 after the supplicant sends it out. This attack forces the authenticator to re-send the message 3 until time out and subsequently to de-authenticate supplicant. This paper has proposed improvements to the 4-way handshake to avoid the Denial-of-Service attack.


international conference on information technology: new generations | 2009

On the Secure Sharing of Legacy Data

Douglas Russell; David J. Power; Mark Slaymaker; Ghita Kouadri Mostefaoui; Xiaoqi Ma; Andrew Simpson

We describe a framework for the secure sharing and aggregation of legacy data. The framework, emph{sif} (for service-oriented interoperability framework), has two key principles at its core: that it should be possible to expose data from any legacy data source, irrespective of the underlying technologies or data models, and that data owners should be afforded the opportunity for expressive access control policies. sif abstracts issues such as secure transport and heterogeneous federation from application developers via a Java API. Our particular focus in this paper is sifs plug-in mechanism, which gives rise to a simple and elegant means of facilitating interoperability.


international conference on information science and control engineering | 2015

Managing Identities in Cloud Computing Environments

Xiaoqi Ma

As cloud computing becomes a hot spot of research, the security issues of clouds raise concerns and attention from academic research community. A key area of cloud security is managing users identities, which is fundamental and important to other aspects of cloud computing. A number of identity management frameworks and systems are introduced and analysed. Issues remaining in them are discussed and potential solutions and countermeasures are proposed.


International Journal of Advanced Research in Artificial Intelligence | 2015

Analysis of Security Protocols using Finite-State Machines

Dania Aljeaid; Xiaoqi Ma; Caroline S. Langensiepen

This paper demonstrates a comprehensive analysis method using formal methods such as finite-state machine. First, we describe the modified version of our new protocol and briefly explain the encrypt-then-authenticate mechanism, which is regarded as more a secure mechanism than the one used in our protocol. Then, we use a finite-state verification to study the behaviour of each machine created for each phase of the protocol and examine their behaviour s together. Modelling with finite-state machines shows that the modified protocol can function correctly and behave properly even with invalid input or time delay.


computational intelligence and security | 2005

A mobile agent based spam filter system

Xiaochun Cheng; Xiaoqi Ma; Long Wang; Shaochun Zhong

A new distributed spam filter system based on mobile agent is proposed in this paper. We introduce the application of mobile agent technology to the spam filter system. The system architecture, the work process, the pivotal technology of the distributed spam filter system based on mobile agent, and the Naive Bayesian filter method are described in detail. The experiment results indicate that the system can prevent spam emails effectively.

Collaboration


Dive into the Xiaoqi Ma's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shaochun Zhong

Northeast Normal University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dania Aljeaid

Nottingham Trent University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge