Tarek S. Sobh

Work place: Information Systems Department, Egyptian Armed Forces, Egypt

E-mail: tarekbox2000@yahoo.com

Website: https://www.researchgate.net/profile/Tarek-Sobh

Research Interests: Knowledge Discovery, Distributed Systems, Data Mining, Intelligent Systems, Software Engineering


Tarek Salah Sobh received his B.Sc. degree in computer engineering from Military Technical College, Cairo, Egypt in 1987. Both M.Sc. and Ph.D. degrees from Computer and System Engineering Department, Faculty of Engineering, AlAzhar University, Cairo, Egypt. He has managed, designed and developed several packages for business applications and security systems. He has authored/coauthored of many refereed journal/conference papers and booklet. Some of the articles are available in the ScienceDirect Top 25 hottest articles. His research of interest includes distributed systems, knowledge discovery, database system design and development, data mining, information fusion, software engineering, intelligent systems, networks and computer security, and network management.

Author Articles
Identity Management: Lightweight SAML for Less Processing Power

By Mohammed Ali Tarek S. Sobh Salwa El-Gamal

DOI: https://doi.org/10.5815/ijitcs.2015.04.04, Pub. Date: 8 Mar. 2015

Identity management has emerged as important issue for reducing complexity and improving user experience when accessing services. In addition to, recently authentication services added SAML to the range of authentication options to be available to cloud subscriber. This work mainly focused on SAML representation in the existing identity management frameworks and its suitability.
We introduced a new representation of SAML that makes it light in weight and easier in parsing and dealing with. This representation is demonstrated using JSON.
In our new SAML representation, we enhanced the performance of marshalling the SAML by 28.99%.
In this paper, we will go into these challenges to introduce a new representation for the identity and access management markup language. Our proposed representation is designed to match the small processing power devices for faster generation, parsing and communication.

[...] Read more.
Evaluating Web Services Functionality and Performance

By Tarek S. Sobh Medhat Fakhry

DOI: https://doi.org/10.5815/ijitcs.2014.05.03, Pub. Date: 8 Apr. 2014

Traditional distributed database transaction applications within large organizations often involve a large number of resources. In this case, people and DDBMSs distributed over a wide geographic area, may introduce conflict between heterogeneous systems. Web services (WS) provide solution for this problem since WS have an independent platform, independent language, and independent object model. This work presents WS application to access heterogeneous and distributed database via horizontal data fragments that is designed to be reliable, flexible and scalable. It describes the setup of SOAP server and applications based on the SOAP for end user client. In addition, it allows the publishing of WS descriptions to submit user requests (goal) to retrieve the required information. Here we evaluate the functional, behavior and performance of WS among possible different alternatives with real-time and execution parameters. Implementation details and case study experiments are presented along with the corresponding results.

[...] Read more.
Wi-Fi Networks Security and Accessing Control

By Tarek S. Sobh

DOI: https://doi.org/10.5815/ijcnis.2013.07.02, Pub. Date: 8 Jun. 2013

As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP) problem has raised more attention and resulted in obtaining wireless access without subscriber permission.
This work assumes Wi-Fi AP under attack specially rogue AP and/or ad-hoc client. It provides a solution for detecting and preventing this attack. In addition, it provides the required user permissions to allow/block access of the files on the user of ad-hoc client. The experiments include the rogue AP attack are maintained and the effectiveness of the proposed solution are tested.

[...] Read more.
Information Leakage Prevention Using Virtual Disk Drive

By Tarek S. Sobh

DOI: https://doi.org/10.5815/ijcnis.2013.08.03, Pub. Date: 8 Jun. 2013

The worst news for information technology people are computer has been stolen or lost. The actual problem is the loss of the data stored on the hard drive that can fall into the wrong hands. However, users of information system and laptops computers are facing real problems with due to intruders using attack techniques when they are connected to the network and lost or stolen computers. In order to protect your organization against information leakage you should encrypt this data by only allowing the user with access to the encryption key to view the data, authorized application usage, and control who gets access to specific types of data.
This work focuses on confidentiality of secure information storage. In addition, it presents the model to create of a Virtual Disk Drive (VDD) on MS Windows, that appear to the user (after the mounting process) as hard disks, but that are really stored as ciphered files on a file system. The proposed VDD prevents dictionary attacks and brute force attacks by incorporating a CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) in the login mechanism. The authentication method for the VDD login is based upon a 3-D image CAPTCHA. All components of this work are integrated in one security VDD tool called "SecDisk".

[...] Read more.
Other Articles