Research

Research and publications

Research centered on privacy, cybersecurity, distributed systems, and trustworthy digital infrastructures for modern connected environments.

Research profile

Recent work emphasizes secure self-sovereign architectures, deterministic systems-of-systems, privacy-preserving IoT frameworks, and dependable coordination mechanisms for distributed services.

Privacy-enhancing technologiesCybersecuritySystems-of-systemsDistributed ledger technologiesBlockchainInternet of Things

Selected themes

  • Privacy architectures and policy-aware information systems
  • Distributed identity, access control, and self-sovereign systems
  • Reliable and deterministic systems-of-systems
  • IoT, fog computing, and secure connected environments

Publications

Selected publications

2023

A Reliable System-of-Systems Healthcare Monitoring Framework

IEEE Access

2023

A Distributed and Secure Self-Sovereign-Based Framework for Systems of Systems

Sensors

2022

Distributed Self-Sovereign-Based Access Control System

IEEE Security & Privacy

2022

Coordination Protocol and Admission Control for Distributed Services in System-of-Systems with Real-time Requirements

IEEE Access

2021

Incremental, Distributed, and Concurrent Service Coordination for Reliable and Deterministic Systems-of-Systems

IEEE Systems Journal

2020

A Fog Computing-based Framework for Privacy Preserving IoT Environments

International Arab Journal of Information Technology

Journal papers
  1. A. Khalifeh, D. Abou-Tair, R. Obermaisser, M. Abuteir, and K. Darabkh. “A Reliable System-of-Systems Healthcare Monitoring Framework.” IEEE Access, vol. 11, pp. 145679–145691, 2023.
  2. D. Abou-Tair, R. Haddad, A. Khalifeh, S. Alouneh, and R. Obermaisser. “A Distributed and Secure Self-Sovereign-Based Framework for Systems of Systems.” Sensors, vol. 23, no. 17, 7617, 2023.
  3. D. Abou-Tair and A. Khalifeh. “Distributed Self-Sovereign-Based Access Control System.” IEEE Security & Privacy, vol. 20, no. 6, pp. 35–42, 2022.
  4. D. Abou-Tair, A. Khalifeh, S. Al-Dahidi, S. Alouneh, and R. Obermaisser. “Coordination Protocol and Admission Control for Distributed Services in System-of-Systems with Real-time Requirements.” IEEE Access, vol. 10, pp. 100194–100207, 2022.
  5. D. Abou-Tair, A. Khalifeh, S. Alouneh, and R. Obermaisser. “Incremental, Distributed, and Concurrent Service Coordination for Reliable and Deterministic Systems-of-Systems.” IEEE Systems Journal, vol. 15, no. 2, pp. 2470–2481, 2021.
  6. D. Abou-Tair, S. Büchsenstein, and A. Khalifeh. “A Fog Computing-based Framework for Privacy Preserving IoT Environments.” International Arab Journal of Information Technology, vol. 17, no. 3, pp. 306–315, 2020.
  7. S. Almajali, D. Abou-Tair, H. Bany Salameh, M. Ayyash, and H. Elgala. “A Distributed Multi-Layer MEC-Cloud Architecture for Processing Large Scale IoT-based Multimedia Applications.” Multimedia Tools and Applications.
  8. D. Abou-Tair, M. Bourimi, R. Tesoriero, D. Kesdogan, M. Heupel, and B. Ueberschaer. “An end-user tailorable generic framework for privacy-preserving location-based mobile applications.” Journal of Applied Mathematics & Information Sciences, vol. 7, no. 6, pp. 2137–2148, 2013.
  9. M. Bourimi, D. Kesdogan, M. Heupel, D. Abou-Tair, and N. Lambropoulos. “PETs at CSCL Service: Underutilised Potentials for Privacy-Enhancing Distance Education.” Journal of Universal Computer Science, vol. 19, no. 7, pp. 912–931, 2013.
  10. M. Bourimi, T. Barth, D. Kesdogan, D. Abou-Tair, F. Hermann, and S. Thiel. “Using distributed user interfaces in collaborative, secure and privacy-preserving software environments.” International Journal of Human-Computer Interaction, vol. 28, no. 11, pp. 748–753, 2012.
  11. D. Abou-Tair, I. Köster, and K. Höfke. “Security and Privacy Requirements in Interactive TV.” Multimedia Systems, vol. 17, no. 5, pp. 393–408, 2011.
Book chapters
  1. A. F. Khalifeh, A. Saleh, M. Al-Nuimat, D. Abou-Tair, and N. Alnuman. “Design and Implementation of Internet of Things and Cloud Based Platform for Remote Health Monitoring and Fall Detection.” In Communications in Computer and Information Science, vol. 1002. Springer, 2019.
  2. M. I. Daoud, R. Alazrai, A. Alhusseini, D. Shihan, E. Alhwayan, D. Abou-Tair, and T. Qadoummi. “Interactive Kinect-Based Rehabilitation Framework for Assisting Children with Upper Limb Cerebral Palsy.” In ICTs for Improving Patients Rehabilitation Research Techniques, vol. 665, pp. 126–140. Springer, 2017.
  3. R. Obermaisser, M. Abuteir, A. Khalifeh, and D. Abou-Tair. “Systems-of-Systems Framework for Providing Real-Time Patient Monitoring and Care: Challenges and Solutions.” In ICTs for Improving Patients Rehabilitation Research Techniques, vol. 515, pp. 129–142. Springer, 2015.
Conference papers
  1. A. Khalifeh and D. Abou-Tair. “Internet of Things Privacy Preserving Selected Encryption Framework.” In 2025 IEEE/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), Busan, Republic of Korea, 2025, pp. 819–823.
  2. D. Alsawalmeh, S. Al-Dahidi, and D. Abou-Tair. “Intrusion Detection System Based on Machine Learning Algorithm to Detect the DDoS Attack in the IoT Network.” In 2024 IEEE/ACIS 24th International Conference on Computer and Information Science (ICIS), Shanghai, China, 2024, pp. 13–17.
  3. R. Haddad, D. Abou-Tair, and A. Khalifeh. “A Blockchain-Based Verification Process for Smart Cities.” In 2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA), Orlando, FL, USA, 2023.
  4. S. Alouneh, A. Khalifeh, D. Abou-Tair, K. Aldahdouh, and F. Al-Hawari. “An Open Source LoRaWAN Simulator Framework for the Internet of Things Applications.” In 2021 8th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), 2021, pp. 1–5.
  5. I. Ishaq et al., including D. Abou-Tair. “Work in Progress – Establishing a Master Program in Cyber Physical Systems: Basic Findings and Future Perspectives.” In 2019 International Conference on Promising Electronic Technologies (ICPET), Gaza City, Palestine, 2019, pp. 4–9.
  6. D. Abou-Tair, S. Büchsenstein, and A. Khalifeh. “A Privacy Preserving Framework for the Internet of Things.” In 2018 IEEE/ACIS 19th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), Busan, Republic of Korea, 2018.
  7. A. Khalifeh, D. Abou-Tair, S. Alouneh, R. Obermaisser, and M. Schmidt. “Admission Control and Resource Allocation for Distributed Services in System-of-Systems: Challenges and Potential Solutions.” In 2018 IEEE 13th International Symposium on Industrial Embedded Systems (SIES), Graz, Austria, 2018.
  8. S. Almajali and D. Abou-Tair. “A Cloud-based Intelligent Extensible Shared Context Services.” In Second International Conference on Fog and Mobile Edge Computing (FMEC), Valencia, Spain, 2017, pp. 133–138.
  9. D. Abou-Tair, S. Alouneh, A. Khalifeh, and R. Obermaisser. “A Security Framework for Systems-of-Systems.” In Advances in Computer Science and Ubiquitous Computing. Springer, 2018.
  10. S. Alouneh, D. Abou-Tair, A. Khalifeh, and R. Obermaisser. “Service Identification Framework for Systems of Systems Based on MPLS Technology.” In Advances in Computer Science and Ubiquitous Computing. Springer, 2018.
  11. O. Hiari, D. Abou-Tair, and I. Abushaikha. “An IoT-Based Virtual Addressing Framework for Intelligent Delivery Logistics.” In Information Science and Applications 2017. Springer, 2017.
  12. Y. A. Mowafi, D. Abou-Tair, A. Zmily, T. Aqarbeh, M. Abilov, and V. Dmitriyev. “Exploring a Context-based Network Access Control for Mobile Devices.” In 2015 International Conference on Soft Computing and Software Engineering (SCSE), Berkeley, CA, USA, 2015.
  13. Y. Mowafi, A. Zmily, D. Abou-Tair, and D. Abu-Saymeh. “Tracking Human Mobility at Mass Gathering Events Using WISP.” In Second International Conference on Future Generation Communication Technology (FGCT), London, UK, 2013.
  14. D. Abu-Saymeh, D. Abou-Tair, and A. Zmily. “An Application Security Framework for Near Field Communication.” In 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, Australia, 2013.
  15. A. Zmily, D. Abu-Saymeh, and D. Abou-Tair. “Identity Hopping Based Security Framework for Social Media Applications.” In International Conference on Soft Computing and Software Engineering, 2013.
  16. D. Abou-Tair, M. Bourimi, R. Tesoriero, D. Kesdogan, and M. Heupel. “A Generic Location-based Mobile Application Framework Supporting Privacy-preserving End-user Tailorability.” In 2012 International Conference on Future Generation Communication Technology (FGCT), London, UK, 2012.
  17. M. Bourimi, J. Ossowski, D. Abou-Tair, S. Berlik, and D. Abu-Saymeh. “Towards Usable Client-centric Privacy Advisory for Mobile Collaborative Applications Based on BDDs.” In 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 2011.
  18. D. Abou-Tair, L. Pimenidis, J. Schomburg, and B. Westermann. “Usability Inspection of Anonymity Networks.” In 2009 World Congress on Privacy, Security, Trust and the Management of e-Business, Saint John, Canada, 2009.
  19. D. Abou-Tair, S. Berlik, and U. Kelter. “Enforcing Privacy by Means of an Ontology Driven XACML Framework.” In Third International Symposium on Information Assurance and Security, Manchester, United Kingdom, 2007, pp. 279–284.
  20. D. Abou-Tair and J. Niere. “An Architecture for Integrating Heterogeneous University Applications that Supports Monitoring.” In 2nd International Conference on Trends in Enterprise Application Architecture, Berlin, Germany, 2006, pp. 16–24.
  21. D. Abou-Tair and S. Berlik. “An Ontology-based Approach for Managing and Maintaining Privacy in Information Systems.” In 5th International Conference on Ontologies, Databases, and Applications of Semantics (ODBASE), Montpellier, France, 2006, pp. 983–994.
  22. D. Abou-Tair. “A Framework Ensuring Privacy in a Distributed Environment.” In 4th Annual Conference on Privacy, Security and Trust (PST), Markham/Toronto, Canada, 2006.
Workshop papers
  1. M. I. Daoud, T. Qadoummi, and D. Abou-Tair. “An Interactive Rehabilitation Framework for Assisting People with Cerebral Palsy.” In 3rd Workshop on ICTs for Improving Patient Rehabilitation Research Techniques (REHAB), Lisbon, Portugal, 2015.
  2. Y. A. Mowafi, D. Abou-Tair, T. Aqarbeh, M. Abilov, V. Dmitriyev, and J. Marx Gomez. “A Context-aware Adaptive Security Framework for Mobile Applications.” In 4th International Workshop on Pervasive and Context-Aware Middleware (PerCAM), Dubai, UAE, 2014.
  3. A. Khalifeh, R. Obermaisser, M. Abuteir, and D. Abou-Tair. “Systems-of-Systems Framework for Providing Real-time Patient Monitoring and Care.” In 2nd Workshop on ICTs for Improving Patient Rehabilitation Research Techniques, Oldenburg, Germany, 2014.
  4. M. Bourimi, D. Abou-Tair, D. Kesdogan, T. Barth, and K. Höfke. “Evaluating Potentials of Internet- and Web-based SocialTV in the Light of Privacy.” In SocialCom/PASSAT, IEEE Computer Society, pp. 1135–1140, 2010.
  5. M. Bourimi, F. Kühnel, J. M. Haake, D. Abou-Tair, and D. Kesdogan. “Tailoring Collaboration According Privacy Needs in Real-identity Collaborative Systems.” In 15th Collaboration Researchers’ International Workshop on Groupware (CRIWG), pp. 110–125. Springer, 2009.