Computation on Encrypted Data (Industry day)

On Friday, COSIC research group of KU Leuven organized an event arranged by Nigel Smart in Leuven about computation on encrypted data. More specifically, it was about secure multi-party computation (MPC) and fully homomorphic encryption (FHE).

I learnt a lot about the concepts, the existing and potential use cases of these practical data protection tactics. As a researcher interested in middleware, cloud computing, and applied cryptography, it was a fruitful day for me!

Continue reading

Facebooktwitterredditpinterestlinkedinmailby feather

Spring Boot application secured by self-signed HTTPS

In this article we secure our Spring Boot application with HTTPS. First of all we become familiar with TLS/SSL  briefly. Then we see how we can generate a self-signed certificate and secure a simple Spring Boot application. We call this project Spring Boot HTTPS Seed and you can grab the code from my Github. Continue reading

Facebooktwitterredditpinterestlinkedinmailby feather

OAuth 2.0 authentication of a Native Application to a Secured Web API using Azure AD

In this article we briefly explains how a Native Application client can authenticate itself against Azure AD and obtain access token in order to safely gain access to a secured Web API. Then, a very short example is given using Java and CURL. Continue reading

Facebooktwitterredditpinterestlinkedinmailby feather

A Survey on Workflow Middleware


A workflow consists of an orchestrated and repeatable pattern of business activity enabled by the systematic organization of resources into processes that transform materials, provide services, or process information[8]. The Workflow paradigm has been adopted in a wide range of software systems in order to make business logic more flexible, manageable and agile towards initial design and future changes. With the advent of Cloud Computing, enterprises have been making efforts for migration or deployment of their workflows and their middleware in the Cloud. On the way to achieve this goal, some challenges should be considered and planned, such as multi-tenancy, scalability, load balancing, hybrid Clouds, failure management, security and some other aspects. In this survey we present several leading workflow middleware with short overview of their features and we elaborate on those, which have support for deployment in a Cloud environment. Furthermore, we discuss some of the aforementioned challenges in more details.

Keyword: Workflow, Middleware, Cloud Computing


Emad Heydari Beni

Facebooktwitterredditpinterestlinkedinmailby feather