Patents by Inventor Bashar Nuseibeh

Bashar Nuseibeh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10977156
    Abstract: Concepts for linking source code with compliance requirements are presented. One example comprises analyzing a set of compliance requirements to identify one or more compliance topics. The example further comprises determining keywords for the identified one or more compliance topics. An item of source code is then analyzed to identify occurrences of the keywords in the source code. Mapping information representing a relationship between the item of source code and the compliance requirements is then generated based on the identified occurrence of the keywords.
    Type: Grant
    Filed: October 10, 2018
    Date of Patent: April 13, 2021
    Assignees: International Business Machines Corporation, University of Limerick
    Inventors: Mark McGloin, Olgierd Pieczul, Bashar Nuseibeh, Sorren Hanvey, Jesus Garcia Galan
  • Patent number: 10713355
    Abstract: Certain embodiments may generally relate to controlling access to data held in the cloud. A method for controlling access to data held in the cloud may include determining, at a cloud server, the validity of user credentials received from a user device. The method may also include receiving context data related to the user device based on the validity of the user credentials. The method may further include synchronizing the context data with the cloud server. In addition, the method may include enforcing context-sensitive security checks on requests made by the user for resources based on the sensor data collected by the user device.
    Type: Grant
    Filed: October 17, 2017
    Date of Patent: July 14, 2020
    Assignee: QATAR UNIVERSITY
    Inventors: Bashar Nuseibeh, Arosha Bandara, Khaled M. Khan, Niamul Haque Khan, Armstrong Nhlabatsi, Thein Than Tun, Yijun Yu
  • Publication number: 20200117573
    Abstract: Concepts for linking source code with compliance requirements are presented. One example comprises analyzing a set of compliance requirements to identify one or more compliance topics. The example further comprises determining keywords for the identified one or more compliance topics. An item of source code is then analyzed to identify occurrences of the keywords in the source code. Mapping information representing a relationship between the item of source code and the compliance requirements is then generated based on the identified occurrence of the keywords.
    Type: Application
    Filed: October 10, 2018
    Publication date: April 16, 2020
    Inventors: Mark McGloin, Olgierd Pieczul, Bashar Nuseibeh, Sorren Hanvey, Jesus Garcia Galan
  • Publication number: 20200117427
    Abstract: Concepts for identifying relevance of a source code change to compliance requirements are presented. One example comprises obtaining mapping information linking an item of source code with a set of compliance requirements, the mapping information representing a relationship between the item of source and the set of compliance requirements. A changed element of an item of source code is identified. The mapping information is analyzed based on the changed element to determine if the changed element relates to a compliance requirement. If it is determined that the changed element relates to a compliance requirement, an indication of th compliance requirement is generated.
    Type: Application
    Filed: October 10, 2018
    Publication date: April 16, 2020
    Inventors: Mark McGloin, Olgierd Pieczul, Bashar Nuseibeh, Sorren Hanvey, Jesus Garcia Galan
  • Publication number: 20200082072
    Abstract: Certain embodiments may generally relate to controlling access to data held in the cloud. A method for controlling access to data held in the cloud may include determining, at a cloud server, the validity of user credentials received from a user device. The method may also include receiving context data related to the user device based on the validity of the user credentials. The method may further include synchronizing the context data with the cloud server. In addition, the method may include enforcing context-sensitive security checks on requests made by the user for resources based on the sensor data collected by the user device.
    Type: Application
    Filed: November 15, 2019
    Publication date: March 12, 2020
    Inventors: Bashar NUSEIBEH, Arosha BANDARA, Khaled KHAN, Niamul Haque KHAN, Armstrong NHLABATSI, Thein Than TUN, Yijun YU
  • Publication number: 20180114015
    Abstract: Certain embodiments may generally relate to controlling access to data held in the cloud. A method for controlling access to data held in the cloud may include determining, at a cloud server, the validity of user credentials received from a user device. The method may also include receiving context data related to the user device based on the validity of the user credentials. The method may further include synchronizing the context data with the cloud server. In addition, the method may include enforcing context-sensitive security checks on requests made by the user for resources based on the sensor data collected by the user device.
    Type: Application
    Filed: October 17, 2017
    Publication date: April 26, 2018
    Inventors: BASHAR NUSEIBEH, AROSHA BANDARA, KHALED M. KHAN, NIAMUL HAQUE KHAN, ARMSTRONG NHLABATSI, THEIN THAN TUN, YIJUN YU
  • Publication number: 20170323108
    Abstract: The present invention provides a method of notifying a user of a request for data controlled by a server, the method including the steps of: monitoring, at the server, requests for data controlled by the server; and if a data request is detected which corresponds to a predetermined type of data request, notifying the user of the detected data request via a haptic feedback mechanism provided on a wearable device which is communicably coupled with the server. Embodiments of the invention relate to a wearable device and a system including the server and the wearable device. Embodiments of the invention allow users to be informed non-obtrusively of a potential privacy breach in real-time and may also allow a user to control in a non-intrusive (e.g. eyes-free) manner whether access is given to personal data.
    Type: Application
    Filed: May 5, 2017
    Publication date: November 9, 2017
    Inventors: Vikram Mehta, Arosha Bandara, Blaine Price, Bashar Nuseibeh
  • Patent number: 9330262
    Abstract: A method of adapting a security configuration of a data processing application at runtime, and a system, together with its computing architecture, are disclosed. The system stores a causal network comprising a plurality of nodes and a plurality of incoming and outgoing causal links associated therewith, wherein each node of the causal network is associated with a security concern or a requirement that can be affected by any configuration of the security controls. The current value of assets nodes, as well as those of the security concerns that can be affected by monitored contextual factors, are updated. The control nodes corresponding to the security controls is updated according to the security configuration whose utility is evaluated by the causal network. The node corresponding to the at least one variable is updated with the determined current value, which is propagated through the causal network through the causal links associated with the updated node.
    Type: Grant
    Filed: September 20, 2013
    Date of Patent: May 3, 2016
    Assignee: University of Limerick
    Inventors: Mazeiar Salehie, Liliana Pasquale, Claudio Menghi, Inah Omoronyia, Bashar Nuseibeh
  • Publication number: 20140090071
    Abstract: A method of adapting a security configuration of a data processing application at runtime, and a system, together with its computing architecture, are disclosed. The system stores a causal network comprising a plurality of nodes and a plurality of incoming and outgoing causal links associated therewith, wherein each node of the causal network is associated with a security concern or a requirement that can be affected by any configuration of the security controls. The current value of assets nodes, as well as those of the security concerns that can be affected by monitored contextual factors, are updated. The control nodes corresponding to the security controls is updated according to the security configuration whose utility is evaluated by the causal network. The node corresponding to the at least one variable is updated with the determined current value, which is propagated through the causal network through the causal links associated with the updated node.
    Type: Application
    Filed: September 20, 2013
    Publication date: March 27, 2014
    Applicant: University of Limerick
    Inventors: Mazeiar Salehie, Liliana Pasquale, Claudio Menghi, Inah Omoronyia, Bashar Nuseibeh