Shadi Aljawarneh

Shadi Aljawarneh is a researcher and an associate professor, Software Engineering, at Isra University. He holds a BSc degree in Computer Science from Jordan Yarmouk University, a MSc degree in Information Technology from Western Sydney University and a PhD in Software Engineering from Northumbria University-England. He is currently an associate professor in faculty of IT in Isra University, Jordan, where he has worked since 2008. His research is centered in web and network security, e-learning, bioinformatics, Cloud Computing and ICT fields. Aljawarneh has presented at and been on the organizing committees for a number of international conferences and is a board member of the International Community for ACM, Jordan ACM Chapter, ACS, and others. A number of his papers have been selected as "Best Papers" in conferences and journals.

Publications

Preface
Shadi A. Aljawarneh, Manisha Malhotra. © 2018. 5 pages.
This Preface is included in the book Critical Research on Scalability and Security Issues in Virtual Cloud Environments.
Integration of Wireless Technologies in Smart University Campus Environment: Framework Architecture
Yaser Khamayseh, Wail Mardini, Shadi Aljawarneh, Muneer Bani Yassein. © 2018. 12 pages.
In this paper, the authors are particularly interested in enhancing the education process by integrating new tools to the teaching environments. This enhancement is part of an...
Analysis of Data Validation Techniques for Online Banking Services
Shadi A. Aljawarneh. © 2018. 10 pages.
The insufficient preparation for the information and communication technologies revolution led to few offering online transaction platforms, information security features, and...
The Rise of Big Data, Cloud, and Internet of Things: Three Trends to Watch
Reema Abdulraziq, Muneer Bani Yassein, Shadi Aljawarneh. © 2018. 22 pages.
Big data refers to the huge amount of data that is being used in commercial, industrial and economic environments. There are three types of big data; structured, unstructured and...
Cloud Security Engineering Concept and Vision: Concept and Vision
Shadi Aljawarneh. © 2018. 9 pages.
The research community found that a software system should be evolved once every few months to ensure it is adapted to the real-world environment. The system evolution requires...
A Conceptual Security Framework for Cloud Computing Issues
Shadi Aljawarneh, Muneer Bani Yassein. © 2018. 14 pages.
In this article, perspectives from Cloud computing practitioners are shown in order to address clients concerns and bring about awareness of the measures that put in place to...
Emerging Challenges, Security Issues, and Technologies in Online Banking Systems
Shadi A. Aljawarneh. © 2017. 23 pages.
Online banking security is a critical issue over request-response model. But the traditional protection mechanisms are not sufficient to secure the online banking systems that...
Analysis of Data Validation Techniques for Online Banking Services
Shadi A. Aljawarneh. © 2017. 13 pages.
The insufficient preparation for the information and communication technologies revolution led to few offering online transaction platforms, information security features, and...
An Algorithm for Securing Hybrid Cloud Outsourced Data in the Banking Sector
Abdullah Alhaj, Shadi A. Aljawarneh. © 2017. 15 pages.
The Cloud has become a significant topic in the banking computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the...
Integration of Wireless Technologies in Smart University Campus Environment: Framework Architecture
Yaser Khamayseh, Wail Mardini, Shadi Aljawarneh, Muneer Bani Yassein. © 2015. 15 pages.
In this paper, the authors are particularly interested in enhancing the education process by integrating new tools to the teaching environments. This enhancement is part of an...
Advanced Research on Cloud Computing Design and Applications
Shadi Aljawarneh. © 2015. 388 pages.
Modern society requires a specialized, persistent approach to IT service delivery. Cloud computing offers the most logical answer through a highly dynamic and virtualized...
Using Cloud Computing for E-Government: A New Dawn
Thamer Al-Rousan, Shadi Aljawarneh. © 2015. 9 pages.
For the last two decades, e-government has attracted government around the world to itself. Today almost every country in the world has developed and implemented e-government...
A Mechanism for Securing Hybrid Cloud Outsourced Data: Securing Hybrid Cloud
Abdullah El-Haj, Shadi Aljawarneh. © 2015. 11 pages.
The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the...
Cloud Security Engineering Concept and Vision: Concept and Vision
Shadi Aljawarneh. © 2015. 8 pages.
The research community found that a software system should be evolved once every few months to ensure it is adapted to the real-world environment. The system evolution requires...
Cloud Computing Advancements in Design, Implementation, and Technologies
Shadi Aljawarneh. © 2013. 338 pages.
Cloud computing has revolutionized computer systems, providing greater dynamism and flexibility to a variety of operations. It can help businesses quickly and effectively adapt...
Cloud Security Engineering: Avoiding Security Threats the Right Way
Shadi Aljawarneh. © 2013. 7 pages.
Information security is a key challenge in the Cloud because the data will be virtualized across different host machines, hosted on the Web. Cloud provides a channel to the...
Searching and Generating Authoring Information: A Hybrid Approach
Faisal Alkhateeb, Amal Alzubi, Iyad Abu Doush, Shadi Aljawarneh, Eslam Al Maghayreh. © 2013. 16 pages.
In this paper, the authors propose a novel approach to search and retrieve authoring information from online authoring databases. The proposed approach combines keywords and...
A Secure Data Transmission Mechanism for Cloud Outsourced Data
Abdullah Alhaj, Shadi Aljawarneh, Shadi Masadeh, Evon Abu-Taieh. © 2013. 10 pages.
The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and...
Secure Communication: A Proposed Public Key Watermark System
Shadi R. Masadeh, Shadi Aljawarneh, Ashraf Odeh, Abdullah Alhaj. © 2013. 10 pages.
The idea of e-Commerce is to take advantage of all the possibilities offered by information technology (such as digital communications, multimedia, internet, cell phones...
International Journal of Cloud Applications and Computing (IJCAC)
B. B. Gupta, Dharma P. Agrawal. Est. 2011.
The International Journal of Cloud Applications and Computing (IJCAC) is a peer-reviewed journal that focuses on and publishes research on all aspects of Cloud Computing...
Cloud Security Engineering: Avoiding Security Threats the Right Way
Shadi Aljawarneh. © 2011. 7 pages.
Information security is a key challenge in the Cloud because the data will be virtualized across different host machines, hosted on the Web. Cloud provides a channel to the...
Searching and Generating Authoring Information: A Hybrid Approach
Faisal Alkhateeb, Amal Alzubi, Iyad Abu Doush, Shadi Aljawarneh, Eslam Al Maghayreh. © 2011. 14 pages.
In this paper, the authors propose a novel approach to search and retrieve authoring information from online authoring databases. The proposed approach combines keywords and...