Papers by Abd El-Aziz Ahmed Abd El-Aziz

Novel coronavirus forecasting model using nonlinear autoregressive artificial neural network
International journal of advanced science and technology, 2020
Novel Coronavirus (COVID-19) is considered one of the most significant public health theaters on ... more Novel Coronavirus (COVID-19) is considered one of the most significant public health theaters on the global level around the world Due to the sudden nature of the outbreak and the infectious power of the virus, it causes people anxiety, depression, and other stress reactions The prevention and control of the novel coronavirus pneumonia have moved into a vital stage It is essential to early predict and forecast of virus outbreak during this disruptive time to control of its morbidity and mortality This paper uses an artificial intelligence and deep learning for prediction of coronavirus through time series using Non-Linear Regressive Network (NAR) It can be considered as an effective approach to early warning and to aid politicians The network is forecasted the coronavirus cases and deaths through nine countries namely;Egypt, Saudi Arabia, Jordan, United States of America, Spain, Italy, France, Iran, Russian Federation during the period from 23-Mar-2020 to 30-July-2020 All data is co...
Mapping XML DTDs to relational schemas
The 3rd ACS/IEEE International Conference onComputer Systems and Applications, 2005.
ABSTRACT As Extensible Markup Language (XML)[9, 1] is emerging as the data format of the internet... more ABSTRACT As Extensible Markup Language (XML)[9, 1] is emerging as the data format of the internet era. This is creating a new set of data management requirements involving XML, such as the need to store and query XML documents. One way to satisfy these requirements is using relational database by transforming XML data into relations. In this paper we propose a mapping technique that describes how the various definitions in a given XML DTD, such as elements, attributes, parent-child relationships, ID-IDREF(s) attributes can be mapped to entities and relationships, describes how to handle the Union types that are not present in relational model, and shows that XML’s ordered data model can be efficiently supported by the unordered relational data model.
A survey on XML security
2013 International Conference on Recent Trends in Information Technology (ICRTIT), 2013
In this paper, we present a survey of the state of the art in XML XML security. This survey will ... more In this paper, we present a survey of the state of the art in XML XML security. This survey will support the future research and development work as well as to raise the awareness for the presented approaches. In this survey, we present the different articles that describe the XML security standards specifically XML encryption, XML signature, and XACML, and we introduce the different approaches for access control for XML documents. This survey will support the future research and development work as well as to raise the awareness for the presented approaches.
2013 International Conference on Recent Trends in Information Technology (ICRTIT), 2013
XML has been widely adopted for information exchange across various networks due to flexibility p... more XML has been widely adopted for information exchange across various networks due to flexibility providing common syntax for messaging systems. XML documents may contain private information that cannot be shared by all user communities. Therefore, XML Security has a great importance to the overall security of the distributed systems. In this paper, we provide a comprehensive tutorial on XML security standards. The presented standards include XML signature and XML encryption. We describe how to create and verify XML signature and how to encrypt and decrypt XML data. This paper should serve as a roadmap for future research and basis for further exploration of relevant scientific literature and standard specifications.
A comprehensive presentation to XACML
Third International Conference on Computational Intelligence and Information Technology (CIIT 2013), 2013
XACML is an XML-based language for access control that has been standardized by OASIS (Organizati... more XACML is an XML-based language for access control that has been standardized by OASIS (Organization for the Advancement of Structured Information Standards). XACML describes both an access control policy language that are ABAC and an access control decisions (request/response) language. Although XACML is recognized as a precise and complete policy description method, the structure of an XACML policy is complex and users need to understand XACML well and writes down the verbose policy all by hand, which make XACML difficult to master and use. In this paper, we present a comprehensive description of XACML to support the future research and development work.
Attribute-based Encryption (ABE) provides a new cryptographic primitive for access control. This ... more Attribute-based Encryption (ABE) provides a new cryptographic primitive for access control. This paper explains how attribute-based encryption might be used to provide privacy and security for XML documents. We try to implement ABE in XML documents.

Extensible Markup Language(XML) [29], [1] is emerging as the data format of the web era. XML has ... more Extensible Markup Language(XML) [29], [1] is emerging as the data format of the web era. XML has the characteristics, such as the extensibility and self-description, which make it becomes a criterion of data exchanging between applications [9]. In recent years, XML has become the standard format of data representation and exchange in the scientific research and business application. For taking advantage of the potential of XML, effective storage of XML-format data is a technology track that must be solved [16]. This is creating a new set of data management requirements involving XML, such as the need to store and query XML documents. At present, three common technologies can be used to store and retrieve XML documents which are native XML database, Object Oriented Database (OODB), and Relational Database (RDB) [6]. Relational database is possessed of perfectly theory and technology support, and it has well market-based. Using it to store XML data is relatively simple and feasible. Building a correct structure and data mapping relational between them is an issue that needs to be resolved for XML document [16]. The wide variety of XML applications and the mismatch between XML's nested-tree structure and the flat tuples of the relational model make storing XML documents in relational databases as interesting challenges. The problem of transforming XML data from XML files into the tabular data that can be managed by relational database management system is a very interesting problem [21], [16]. In this paper, we present a survey about the recent and previous mapping approaches that map XML documents to RDB. This survey will support the future research and development work as well as to raise the awareness for the presented approaches. In this survey, we study how the various definitions in a given XML DTD, such as elements, attributes, parent-child relationships, and ID-IDREF(s) attributes can be mapped to entities and relationships. How algorithms which map DTD to relational schema and as well as content and structure preserve the functional dependencies during the mapping process in order to produce relations with less redundancy. Finally, How the recent and previous approaches translate XML query languages, such as XQuery and xpath languages into SQL.
very few research works have been done on XML security over relational databases despite that XML... more very few research works have been done on XML security over relational databases despite that XML became the de facto standard for the data representation and exchange on the internet and a lot of XML documents are stored in RDBMS. In [14], the author proposed an access control model for schema-based storage of XML documents in relational storage and translating XML access control rules to relational access control rules. However, the proposed algorithms had performance drawbacks. In this paper, we will use the same access control model of [14] and try to overcome the drawbacks of [14] by proposing an efficient technique to store the XML access control rules in a relational storage of XML DTD. The mapping of the XML DTD to relational schema is proposed in [7]. We also propose an algorithm to translate XPath queries to SQL queries based on the mapping algorithm in [7].
XACML is an XML-based language for access control that has been standardized by OASIS (Organizati... more XACML is an XML-based language for access control that has been standardized by OASIS (Organization for the Advancement of Structured Information Standards). XACML describes both an access control policy language that are ABAC and an access control decisions (request/response) language. Although XACML is recognized as a precise and complete policy description method, the structure of an XACML policy is complex and users need to understand XACML well and writes down the verbose policy all by hand, which make XACML difficult to master and use. In this paper, we present a comprehensive description of XACML to support the future research and development work.
JavaScript Object Notation (JSON) is a lightweight data-interchange format. It is easy for humans... more JavaScript Object Notation (JSON) is a lightweight data-interchange format. It is easy for humans to read and write. It has a data format that is interchangeable with a programming languages built-in data structures that eliminates translation time and reduces complexity and processing time. Moreover, JSON has the same strengths of XML. Therefore, it's better to shift form XML security to JSON security. In this paper, we will present how to shift from XML encryption to JSON encryption.
JSON (JavaScript Object Notation) is a lightweight data-interchange format. It is easy for humans... more JSON (JavaScript Object Notation) is a lightweight data-interchange format. It is easy for humans to read and write. It has a data format that is interchangeable with a programming languages built-in data structures that eliminates translation time and reduces complexity and processing time. Moreover, JSON has the same strengths of XML. Therefore, it's better to shift form XML security to JSON security. In this paper, we will present how to translate from XML signature to JSON signature.
A Comprehensive Presentation to XML Signature and Encryption
XML has been widely adopted for information
exchange across various networks due to flexibility p... more XML has been widely adopted for information
exchange across various networks due to flexibility providing
common syntax for messaging systems. XML documents may
contain private information that cannot be shared by all user
communities. Therefore, XML Security has a great importance
to the overall security of the distributed systems. In this paper,
we provide a comprehensive tutorial on XML security standards.
The presented standards include XML signature and
XML encryption. We describe how to create and verify XML
signature and how to encrypt and decrypt XML data. This paper
should serve as a roadmap for future research and basis for
further exploration of relevant scientific literature and standard
specifications.
A Survey on XML Security
In this paper, we present a survey of the state
of the art in XML XML security. This survey will... more In this paper, we present a survey of the state
of the art in XML XML security. This survey will support
the future research and development work as well as to raise
the awareness for the presented approaches. In this survey, we
present the different articles that describe the XML security
standards specifically XML encryption, XML signature, and
XACML, and we introduce the different approaches for access
control for XML documents. This survey will support the future
research and development work as well as to raise the awareness
for the presented approaches.

International Journal of Web Service Computing (IJWSC), VOLUME 3, No. 4, December 2012.
Very few research works have been done on XML security over relational databases despite that XML... more Very few research works have been done on XML security over relational databases despite that XML became the de facto standard for the data representation and exchange on the internet and a lot of XML documents are stored in RDBMS. In , the author proposed an access control model for schema-based storage of XML documents in relational storage and translating XML access control rules to relational access control rules. However, the proposed algorithms had performance drawbacks. In this paper, we will use the same access control model of and try to overcome the drawbacks of by proposing an efficient technique to store the XML access control rules in a relational storage of XML DTD. The mapping of the XML DTD to relational schema is proposed in . We also propose an algorithm to translate XPath queries to SQL queries based on the mapping algorithm in .

”. International Journal of Computer Science and Management Research IJCSMR, Vol. 2, Issue 1, 2013.
is emerging as the data format of the web era. XML has the characteristics, such as the extensibi... more is emerging as the data format of the web era. XML has the characteristics, such as the extensibility and self-description, which make it becomes a criterion of data exchanging between applications [9]. In recent years, XML has become the standard format of data representation and exchange in the scientific research and business application. For taking advantage of the potential of XML, effective storage of XML-format data is a technology track that must be solved . This is creating a new set of data management requirements involving XML, such as the need to store and query XML documents. At present, three common technologies can be used to store and retrieve XML documents which are native XML database, Object Oriented Database (OODB), and Relational Database (RDB) [6]. Relational database is possessed of perfectly theory and technology support, and it has well market-based. Using it to store XML data is relatively simple and feasible. Building a correct structure and data mapping relational between them is an issue that needs to be resolved for XML document . The wide variety of XML applications and the mismatch between XML's nestedtree structure and the flat tuples of the relational model make storing XML documents in relational databases as interesting challenges. The problem of transforming XML data from XML files into the tabular data that can be managed by relational database management system is a very interesting problem [21], . In this paper, we present a survey of the state of the art in the recent and previous mapping approaches that map XML documents to RDB. This survey will support the future research and development work as well as to raise the awareness for the presented approaches. In this survey, we study how the various definitions in a given XML DTD, such as elements, attributes, parent-child relationships, and ID-IDREF(s) attributes can be mapped to entities and relationships. How algorithms which map DTD to relational schema and as well as content and structure preserve the functional dependencies during the mapping process in order to produce relations with less redundancy. Finally, How the recent and previous approaches translate XML query languages, such as XQuery and xpath languages into SQL.

”. IAJIT, Volume 11, No. 6, Nov. 2014.
QWURGXFWLRQ ;0/ LV WKH GH IDFWR VWDQGDUG IRU WKH GDWD ZHE H[FKDQJH ,W LV EHLQJ LQFUHDVLQJO\ DGRSW... more QWURGXFWLRQ ;0/ LV WKH GH IDFWR VWDQGDUG IRU WKH GDWD ZHE H[FKDQJH ,W LV EHLQJ LQFUHDVLQJO\ DGRSWHG LQ FRPPXQLFDWLRQ QHWZRUNV ;0/ GRFXPHQWV RYHU WKH :RUOG :LGH :HE LQFOXGH FULWLFDO LQIRUPDWLRQ VXFK DV ¿QDQFLDO DQG VFLHQWL¿F GDWD ,W LV UHTXLUHG WR DSSO\ UHVWULFWLRQ WHFKQLTXH RQ WKH FRQWHQW RI ;0/ GRFXPHQWV WR SURWHFW WKHVH VHQVLWLYH GDWD 7KXV RQO\ XVHUV ZKR DUH DXWKRUL]HG WR DFFHVV IUDJPHQWV RI WKH ;0/ GRFXPHQWV VKRXOG EH JUDQWHG DFFHVV WR WKH GDWD ³$FFHVV FRQWURO IRU ;0/ GRFXPHQWV VKRXOG LGHDOO\ SURYLGH H[SUHVVLYHQHVV PRGXODULW\ LQWHURSHUDELOLW\ DQG HI¿FLHQF\ 7KH H[SUHVVLYHQHVV DVVXUHV WKDW D ZLGH UDQJH RI VHFXULW\ SROLF\ VSHFL¿FDWLRQ PD\ EH ZULWWHQ 0RGXODULW\ FRQFHUQV SROLFLHV FRPSRVLWLRQ ZKLOH LQWHURSHUDELOLW\ FRQFHUQV WKH DELOLW\ RI SROLFLHV WR LQWHUDFW )LQDOO\ HI¿FLHQF\ DVVXUHV WKH DELOLW\ WR GHWHUPLQH ZKHWKHU DQ DFFHVV WR DQ HOHPHQW LV JUDQWHG RU GHQLHG E\ WKH VHFXULW\ SROLF\´ > @ ;0/ GRFXPHQWV FDQ EH VWRUHG LQ QDWLYH ;0/ GDWDEDVH UHODWLRQDO GDWDEDVHV RU K\EULG UHODWLRQDO ;0/ GDWDEDVHV 0DQ\ WHFKQLTXHV KDYH EHHQ SURSRVHG WR VHFXUH QDWLYH ;0/ GDWDEDVHV DQG WR DFFHVV WKH FRQWURO RI ;0/ GRFXPHQW VWRUHG LQ UHODWLRQDO GDWDEDVHV H;WHQVLEOH $FFHVV &RQWURO 0DUNXS /DQJXDJH ;$&0/ LV WKH UHVXOW RI 2UJDQL]DWLRQ IRU WKH $GYDQFHPHQW RI 6WUXFWXUHG ,QIRUPDWLRQ 6WDQGDUGV 2$6,6 VWDQGDUGL]DWLRQ HIIRUW SURSRVLQJ DQ ;0/ EDVHG ODQJXDJH WR H[SUHVV DQG LQWHUFKDQJH DFFHVV FRQWURO SROLFLHV > @ 7KH VWDQGDUG GH¿QHV D GHFODUDWLYH DFFHVV FRQWURO SROLF\ ODQJXDJH LPSOHPHQWHG LQ ;0/ DQG D SURFHVVLQJ PRGHO GHVFULELQJ KRZ WR HYDOXDWH DXWKRUL]DWLRQ UHTXHVWV DFFRUGLQJ WR WKH UXOHV GH¿QHG LQ SROLFLHV 7KH ODQJXDJH RIIHUV WKH IXQFWLRQDOLWLHV RI PRVW VHFXULW\ SROLF\ ODQJXDJHV $OWKRXJK ;$&0/ LV D VWDQGDUG ODQJXDJH IRU GHVFULELQJ SROLFLHV WKH VWUXFWXUH RI ;$&0/ SROLF\ ODQJXDJH LV PRUH FRPSOH[ DQG XVHUV QHHG WR XQGHUVWDQG ;$&0/ ZHOO ZKLFK PDNH ;$&0/ GLI¿FXOW IRU XVHUV +LGLQJ WKH FRPSOH[LW\ RI WKH ;$&0/ SROLF\GH¿QLWLRQ LV D ELJ SUREOHP QHHGLQJ WR EH VROYHG 7KHUHIRUH LW LV QHFHVVDU\ WR SURSRVH D QHZ WHFKQLTXH WR VWRUH WKH UXOHV DV UHODWLRQDO UXOHV +HQFH ZH SURSRVH D WHFKQLTXH WR VWRUH ;$&0/ SROLFLHV DQG UXOHV DV UXOHV LQ D UHODWLRQDO GDWDEDVH V\VWHP WR FRQWURO WKH DFFHVV RI ;0/ GRFXPHQWV DQG PDNH LW HDV\ IRU XVHUV 2XU WHFKQLTXH ZLOO DYRLG XVHUV IURP WKH HIIRUW RI OHDUQLQJ DQG XQGHUVWDQGLQJ ;$&0/ SROLFLHV DQG UXOHV KHQFH LW ZLOO VDYH XVHUV ¶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
”. International Journal of Computer Science and Management Research, VOLUME 1, ISSUE 3, OCTOBER 2012
Attribute-based Encryption (ABE) provides a new cryptographic primitive for access control. This ... more Attribute-based Encryption (ABE) provides a new cryptographic primitive for access control. This paper explains how attribute-based encryption might be used to provide privacy and security for XML documents. We try to implement ABE in XML documents.

”. In the Proceedings of the second International Conference on Computational Science, Engineering and Information Technology (CCSEIT-2012). ACM-Proceeding Series (ACM Digital Library)
very few research works have been done on XML security over relational databases despite that XML... more very few research works have been done on XML security over relational databases despite that XML became the de facto standard for the data representation and exchange on the internet and a lot of XML documents are stored in RDBMS. In , the author proposed an access control model for schema-based storage of XML documents in relational storage and translating XML access control rules to relational access control rules. However, the proposed algorithms had performance drawbacks. In this paper, we will use the same access control model of and try to overcome the drawbacks of by proposing an efficient technique to store the XML access control rules in a relational storage of XML DTD. The mapping of the XML DTD to relational schema is proposed in . We also propose an algorithm to translate XPath queries to SQL queries based on the mapping algorithm in .

l”. In the Proceedings of the 2012 International Conference on Computer Communication and Informatics (ICCCI-2012), Jan. 10 – 12, 2012, Coimbatore, INDIA. The proceeding published in IEEEXplore
In the modern health service, data are accessed by doctors and nurses using mobile, Personal Digi... more In the modern health service, data are accessed by doctors and nurses using mobile, Personal Digital Assistants, and other electronic handheld devices. An individual's health related information is normally stored in a central health repository and it can be accessed only by authorized doctors. However, this Data is prone to be exposed to a number of mobile attacks while being accessed. This paper proposes a framework of using XACML and XML security to support secure, embedded and fine-grained access control policy to control the privacy and data access of health service data accessed through handheld devices. Also we consider one of the models, namely Spatial Role-based access control (SRBAC) and model it using XACML.
Uploads
Papers by Abd El-Aziz Ahmed Abd El-Aziz
exchange across various networks due to flexibility providing
common syntax for messaging systems. XML documents may
contain private information that cannot be shared by all user
communities. Therefore, XML Security has a great importance
to the overall security of the distributed systems. In this paper,
we provide a comprehensive tutorial on XML security standards.
The presented standards include XML signature and
XML encryption. We describe how to create and verify XML
signature and how to encrypt and decrypt XML data. This paper
should serve as a roadmap for future research and basis for
further exploration of relevant scientific literature and standard
specifications.
of the art in XML XML security. This survey will support
the future research and development work as well as to raise
the awareness for the presented approaches. In this survey, we
present the different articles that describe the XML security
standards specifically XML encryption, XML signature, and
XACML, and we introduce the different approaches for access
control for XML documents. This survey will support the future
research and development work as well as to raise the awareness
for the presented approaches.