Author Archives: Applied Information Security (AIS) LAB

About Applied Information Security (AIS) LAB

The KTH-SEECS Applied Information Security (AIS) Lab conducts research concentrated on cyber threats and countermeasures, Cloud Computing Security, security in distributed systems, Secure Group Communications and Secure Object Oriented Databases. We welcome industry and academia to contribute in designing and developing solutions to better meet today's demanding security requirements.

Ethical Hacking: Industry’s Buzzword

Hackers have done this; hackers have done that…definitely something wrong, and so on and so forth. These are the most common news considering the current era of Information Technology (IT). Surprisingly, in modern world most of the people believe that … Continue reading

Posted in Ethical Hacking | Leave a comment

Twinkle twinkle little star, how I wonder which NoSQL database is suitable so far?

NoSQL databases have no longer become an unknown database paradigm, since it has been almost a decade or two after its introduction in the market. Some of the most popular NoSQL databases include MongoDB, CouchDB, Voldemort, Cassandra etc. The use … Continue reading

Posted in Database | Tagged | Leave a comment

Breadcrumbs leading to Quality Research !

Lately, in one of the seminars “Do’s and Don’ts of writing a good research paper”, held at CIPS-NUST and conducted by Elsevier personnel, I found many rules of thumb related to how one can productively manage his/her research article, journal … Continue reading

Posted in Research | Leave a comment

Tackle Your Abstract Head On !

One of the first things a researcher learns when starting out is the K.I.S.S. principle: “Keep it Simple, Stupid”. Unnecessary complexity, abstract notions, and ambiguity are considered bad writing practices and must be strictly avoided while writing research articles. The … Continue reading

Posted in Research | Leave a comment

What is XACML ?

XACML (Extensible Access Control Markup Language) is an open standard XML-based language designed to express security policies and access rights to information for Web services, digital rights management (DRM), and enterprise security applications. Ratified by the Organization for the Advancement of Structured … Continue reading

Posted in Access Control | Leave a comment