Research

RESEARCH STATEMENT
My ambition is to pursue high impact research, development and education program in the challenging field of computer and information systems security. The benefits of the technological growth have been rapidly percolating to all levels of the UAE society, which makes it all the more gratifying to be a participant in the information security revolution. I am glad that I have the opportunity to contribute to the building of the information security systems that are so critical for securing our information based society.

My goal is to play a lead role in the efforts to advance the basic technology, applied research and development, and education.

My principal research activities lie in information systems security with particular emphasis on access control for advanced application domains such as networks and mobile systems, secure database systems and digital libraries, authorization management, and secure transaction processing. My work focuses on advancing theoretical research motivated by practical applications in these areas. Due to its high impact on local, national, and regional interest,

Despite the fact that the college of IT is considerably a new and not yet a research-oriented college, I have managed to leverage my skills from my previous academic and industrial experience to initiate and conduct research and development projects which resulted in a number of publications in local and international conferences, and in journals. My research interests include access control, wired and wireless network security, and electronic and mobile commerce security.
The following highlights my research activities through the Inter-disciplinary and individual grants and projects that I have completed during my tenure at UAEU.

JOURNAL PAPERS

    1. Wassim El-Hajj, Hazem M. Hajj, Ezedin Barka, Zaher Dawy, Omar El Hmaissy, Dima Ghaddar, and Youssef Aitour, “Optimal WiMax Planning with Security Considerations” Security and Communication Networks SI on WiMax Security and Applications, 2009, Digital Object Identifier (DOI) = 10.1002/sec.128, http://dx.doi.org/10.1002/sec.128.
    2. Ezedin Barka and Abderrahaman Lakas.  Integrating Usage Control with SIP-Based Communications. Journal of Computer Systems, Networks, and Communications
      Volume 2008 (2008), Article ID 380468, 8 pages
      doi:10.1155/2008/380468
    3. Adel Bouhoula, Zouheir Trabelsi, Ezedin Barka, Mohammed-Anis Benelbahri. FIREWALL FILTERING RULES ANALYSIS FOR ANOMALIES DETECTION. International Journal of Security and Networks (IJSN), Vo.3 No.3. 2008.
    4. Mohammed Boulmalf, Ezedin Barka, and Abderrahmane Lakas. ANALYSIS OF THE EFFECT OF SECURITY ON DATA AND VOICE TRAFFIC IN WLAN. Computer Communications “Elsevier Journal”.   Volume 30, Issue 11-12 (September 2007).  Pages 2468-2477.  
    5. Ezedin Barka and Mohammed Boulmalf. ON THE IMPACT OF SECURITY ON THE PERFORMANCE OF WLANs, Journal of Communications (JCM), Vol. 2, No. 4, Pages 10-17, June 2007.
    6. Emad Eldin Mohamed and Ezedin Barka. A NEW ACCESS CONTROL ARCHITECTURE FOR OVERLAY MULTICAST COMMUNICATIONS. Computer Communications (Elsevier Science).  Under review.

     CONFERENCE PAPERS

    1. Fikri M. Abu-Zidan, Hani O. Eid, Karl Lunsjo, Fawaz Torab, Sami Shaban, and Ezedin Barka. ESTABLISHMENT OF A ROAD TRAFFIC ACCIDENT INJURY REGISTRY IN AL –AIN CITY. In the Proceedings of the 9th Annual UAE. University conference, Al Ain, United Arab Emirates. April, 2008.
    2. Leila Ismail and Ezedin Barka. KEY DISTRIBUTION FRAMEWORK FOR A MOBILE AGNET PLATFORM. THE IEEE International Conference on NEXT GENERATION MOBILE APPLICATIONS, SERVICES and TECHNOLOGIES (NGMAST 2008), 16-19 September 2008, Cardiff, Wales, UK. 
    3. Ezedin Barka, Khaled Shuaib, and H.Chamas. IMPACT OF IPSec ON THE PERFORMANCE OF THE IEEE 802.16 “WiMax” WIRELESS NETWORKS. The Second IFIP International Conference On New Technologies, Mobility and Security (NTMS’2008), 5-7 November 2008, Tangier, Morocco. 
    4. Ezedin Barka and Ravi Sandhu. AGENT_BASED ROLE DELEGATION MODEL (ARBDM). The IEEE International Conference on Communications (ICC 2007), Glasgow, Scotland. 24-28 June 2007.
    5. Abderrahmane Lakas, Mohamed Adel Serhani, and Ezedin Barka.  A FRAMEWORK FOR INTEGRATING SIP-BASED COMMUNICATION SERVICES AND WEB SERVICES. In the Proceedings of the 8th Annual UAE.University conference, Al Ain, United Arab Emirates. April, 2007.
    6. Ezedin Barka and Mohammed Boulmalf. IMPACT OF ENCRYPTION ON THE THROUGHPUT OF INFRASTRUCTUE WLAN IEEE 802.11g. The IEEE Wireless Communications and Networking Conference (WCNC 2007), Hong Kong. 11 – 15 March 2007.
    7. Ezedin Barka and Mohammed Boulmalf, Amal Alteniji, Hanadi Al Suwaidi, Huda Khazaimy, and Meera Al Mansouri.  IMPACT OF SECURITY ON THE PERFORMANCE OF AD HOC WLANS.  Innovation in Information Technology (IIT'06), Dubai, UAE. 19-21 November 2006. 
    8. Ezedin Barka and Zuhair Trabulsi.  SECURITY THREATS, ATTACKS, AND COUNTERMEASURES WITH IN THE UAE UNIVERSITY NETWORK.  The Scientific Symposium on Social and Security Impact on the Internet, Abu-Dhabi, UAE.  6-7 November 2006.
    9. Emad Eldin Mohamed and Ezedin Barka.  PLAYING CRYPTOGRAPHY: AN E-LEARNING APPROACH.  The 9th International Conference on Interactive Computer Aided Learning ICL 2006.  Villach, Austria. 27 – 29 September, 2006
    10. Ezedin Barka, Emad Eldin Mohamed, and Kadhim Hayawi. END-TO-END SECURITY SOLUTIONS FOR WLAN: A performance Analysis of the Underlying Encryption Algorithms in the Lightweight Devices. In the Proceedings of the ACM sponsored IWCMC 2006 Conference, Vancouver, Canada, July 3-6, 2006,
    11. Ezedin Barka,  Emad Eldin Mohamed and Kadhim Hayawi. ENHANCEMENT OF END-TO-END SECURITY SOLUTIONS FOR WLAN: In the Proceedings of the 7th Annual UAEU conference, Al Ain, United Arab Emirates. April, 2006.
    12. A. Lakas, K. Shuaib, E. Barka and S. Akhtar, “AN INTEGRARTED ARCHITECTURE FOR UBIQUITOUS MILITARY COMPOUND NETWROKS”, In the Proceedings of the 9th World Multi-conference on Systemics, Cybernetics and Informatics (WMSCI 2005) Orlando, USA. 10-13 July, 2005.
    13. Alaaeldin A. Aly and Ezedin Barka. TRACKING AND TRACING SPOOFED IP PACKETS TO THEIR SOURCES. In the Proceedings of the 6th Annual UAEU conference, Al Ain, United Arab Emirates. April, 2005.
    14. Ezedin Barka, Alaa Aly, Wadhah Kudaimi, and Kadhem Hayawi. IMPLEMENTAION OF ROLE-BASED DELEGATION MODELS. In the Proceedings of the 6th Annual UAEU conference, Al Ain, United Arab Emirates. April, 2005.
    15. Ezedin Barka and Ravi Sandhu. ROLE-BASED DELEGATION MODEL/HIERACHICAL ROLES (RBDM1). In the Proceedings of 20th Annual Computer Security Application Conference, Tucson, AZ, December 6-10 2004.
    16. Ezedin Barka and Ravi Sandhu. FRAMEWORK FOR ROLE-BASED DELEGATION MODELS. In Proceedings of 16th Annual Computer Security Application Conference, New Orleans, LA, December 11-15 2000.
    17. Ezedin Barka and Ravi Sandhu. A ROLE-BASED DELEGATION MODEL AND SOME EXTENTIONS. In the Proceedings of 23rd National Information Systems Security Conference, Pages 101-114, Baltimore, Oct. 16-19, 2000 
    18. Alaaeldin A. Aly and Ezedin Barka. TRACKING AND TRACING SPOOFED IP PACKETS TO THEIR SOURCES. In the proceedings of the 6th Annual UAEU conference, Al Ain, United Arab Emirates. April, 2005.

    CITATIONS

    Author(s)

    Paper

    Year

    Journal/Conference

    Google Scholar

    E. Barka, R. Sandhu

    A role-based model and some extensions

    2000 

    23rd National Information Systems Security Conference. Pages 101-114, Baltimore,

    114

    E. Barka, R. Sandhu

    Framework for role-based delegation models

    2000

    16th Annual Computer Security Application Conference (ACSAC00). Pages

    176

    E.Barka, E Mohamed, K Hayawi

    End-to-end Security Solutions for WLAN: a performance analysis for the underlying encryption

    2006

    International Conference On Communications And Mobile Computing

    3

    E. Barka, R. Sandhu

    Role-based delegation model/hierarchical roles (RBDM1).

    2004

    20th Annual Computer Security Application Conference (ACSAC04).

    34

    E. Barka, M. Boulmalf

    Impact of encryption on the throughput of infrastructure WLAN IEEE 802.11g

    2007

    The IEEE Wireless Communications and Networking Conference (WCNC 2007).

    2

     

    RESEARCH GRANTS

    Role

    Grant Type

    Title

    Amount(AED)

    Date

    Status

    Principal
    Investigator

    Individual

    Securing Simple Network Management Protocol (SNMP) through Usage Control Model.

    18500.00

    2008/09

    Submitted

    Co-Investigator

    Inter-disciplinary

    Secure Inter-Vehicular Communication: A
    Cooperative System for Real-Time Road Traffic Management Applications

    200,000.00

    2006/07

    Ongoing

    Co-Investigator

    Inter-disciplinary

    Establishment of A Road Traffic Accident Injury Registry in Al-Ain City

    198,000.00

    04-07

    Completed

    Principal
    Investigator

    Individual

    Impact of Security on the Performance of the IEEE 802.16 "WiMax" Wireless Networks. Amount

    12,500.00

    2006/07

    Completed

    Principal
    Investigator

    Individual

    Enhancement of end -to- end wireless security solutions through the addition of more flexibility to the SSL/TLS protocol

    14,500.00

    2004/05

    Completed

    Principal
    Investigator

    Individual

    Implementation of Role-Based Delegation. Amount: 15,500.00.

    15,500.00

    2003/04

    Completed

    Co-Investigator

    Individual

    Integration of SIP-Based Communication Services and Web
    Services

    17,000.00

    2005/06

    Completed

    Co-Investigator

    Individual

    Promoting Active Learning by Applying Game Playing in Teaching

    11,900

    2005/06

    Completed

     

    RESEARCH RELATED SERVICES AND ACTIVITIES

    1. Editorial Board

    1. Served as a member of the Editorial Board for the Elsevier Editorial System
    2. Currently serving as an Associate Editor (AEs) for Wiley Security and Communication Networks (SCN) Journal.

    2. Student Supervisions

    1. Supervised  over 18 students in their Senior Exhibitions projects from Spring 2004 to Spring 2008
    2. Served as a member of a Jury evaluating several senior exhibition projects (2005,2006, 2007)

    3. Research Activities

    1. TPC Member of the IEEE Global Communications Conference (IEEE GLOBECOM 2008). 30 November- 4 December, 2008, New Orleans, LA, USA.
    2. TPC Member of  the International Computer and Communications Network Security Symposium (ICC 2008).
    3. TPC Member of the Second International Conference on New Technologies, Mobility and Security( NTMS’08). 5 to 7 November, 2008, TANGIER, MOROCCO.
    4. TPC Member of the 4th IEEE INTERNATIONAL CONFERENCE on Wireless & Mobile Computing, Networking & communication (WIMOB08). 12th-14th October, 2008, Avignon, FRANCE.
    5. TPC Member of the 3rd International Symposium on Information Security (IS'08). Nov 10 - 11, 2008, Monterrey, Mexico.
    6. TPC Member of the ICWMC 2008, July 27 - August 1, 2008, Athens - Greece.
    7. TPC Member of the IEEE Wireless Communications and Networking Conference (WCNC 2007).  11th- 15th March, 2007, Hong Kong.
    8. TPC Member of the IEEE International Conference on Communications 2007 (ICC-2007). 24-28 June 2007, Glasgow, Scotland.
    9. TPC Member of the 4th International Conference on Innovations in Information Technology (Innovations 2007), November 18-20, 2007, Dubai, United Arab Emirates.
    10. TPC Member of the 3rd International Conference on Innovations in Information Technology (IIT06), November, 2006, Dubai, United Arab Emirates.
    11. TPC Member of the 2rd International Conference on Innovations in Information Technology (IIT05), November, 2005, Dubai, United Arab Emirates.
    12. TPC Member of the 1st International Conference on Innovations in Information Technology (IIT04), November, 2004, Dubai, United Arab Emirates.
    13. Reviewer, the ICWMC 2008, July 27 - August 1, 2008, Athens - Greece.
    14. Reviewer, the IEEE Wireless Communications and Networking Conference (WCNC 2007).  11th- 15th March, 2007, Hong Kong.
    15. Reviewer, the BodyNets '09. conference, June 2007,  Florence, Italy
    16. Reviewer, COMCOM-D-06 -Elsevear, special issue in Information Security
    17. Reviewer, the 1st International Conference on Innovations in Information Technology (IIT04, IIT05, IIT06, IIT07),  Dubai, United Arab Emirates

    RESEARCH AWARDS

    Received a certificate of appreciation from the General Commander of Abu Dhabi Police for my participation in the activities of the symposium on Social and Security Impact of the Internet, which was held in Abu Dhabi during 6 -7 November 2006.