SlideShare a Scribd company logo
Dr. Waleed A. Alrodhan
(Biographical Sketch)
Waleed was born in the Kingdom of Saudi Arabia in 1981. He has received his
B.Sc. degree in Computer Sciences from King Saud University (2002), his M.Sc.
degree (with distinction) in Information Security from Royal Holloway, University
of London (2005), and his Ph.D. degree in Information Security from Royal
Holloway, University of London (2011). Currently, he is a Vice-Dean of the
Deanship of Information Technology at Imam Muhammed Ibn Saud University.
His research interests include privacy, identity management, federated identity,
single sign-on, and secure web-based protocols.
After receiving his B.Sc. degree in Computer Sciences from King Saud
University in 2002, Waleed joined the Saudi Arabian Monetary Agency
(SAMA) as a System Integration Engineer. In the same year, he joined Al-
Elm Information Security Company as an Information Security Engineer
(for one year). As a part of his job duties at Al-Elm, Waleed was assigned to
IRIS Corporation in Malaysia to work as a Smart-card Application
Developer in 2002.
Waleed has switched to academia in 2003. He has joined Imam Muhammed
Ibn Saud University as a Teaching Assistant. In addition to his teaching
duties at the university, Waleed was designated as the Computer
Applications Diploma Programme Director, and as the Secretary of the
Computer Science Department.
In 2004, Waleed has been granted a scholarship from Imam Muhammed Ibn
Saud University to continue his postgraduate studies at the Information
Security Group (ISG) in Royal Holloway, University of London. He has
received a M.Sc. degree (with distinction) in 2005 and a Ph.D. degree in
2010. During his Ph.D. studies, Waleed has worked as an Academic
Supervisor at Royal Holloway, University of London for the academic year
2009.
Currently, Waleed is a Vice-Dean of the Deanship of Information
Technology at Imam Muhammed Ibn Saud University. In addition, he is an
Assistant Professor at the Computer Sciences department in the College of
Computer and Information Sciences, the Network Security (CS 432) and the
Operating Systems Security (CS 466) courses coordinator, the Head of the
Research Unit, and the Chairman of the Research Council. Waleed was
the Vice Dean for Development and Quality of the college in the period
between September 2011 and January 2014.
Moreover, Waleed is a member the Strategic Planning Steering
Committee at Imam Muhammed Ibn Saud University. He have attended
many international training courses on strategic planning and academic
quality assurance.
Finally, Waleed is the Head of the Information Security Interest Group
(ISIG) at the Saudi Computer Society (SAC), and a part-time consultant at a
number of organisations.
Two of Waleed’s research papers (Addressing privacy issues in CardSpace
and Improving the Security of CardSpace) have been chosen to be taught as
an integral part of the (CS 590) M.Sc. course on Cloud Systems for Blind
and Hearing Impaired, held by Purdue University, USA, 2010.
Moreover, many of Waleed’s research papers have been used and cited in a
number of identity management related reports (e.g. reports by the Future of
Identity in the Information Society (FIDIS) consortium; funded by the
European Union), books (e.g. The Future of Identity in the Information
Society by Kai Rannenberg), M.Sc. dissertations and postgraduate courses
taught by highly ranked academic institutions (e.g. IY5601: Application and
Business Security Developments, by the ISG, RHUL).
Waleed is a reviewer for a number of well-known journals (e.g. The
Computer Journal, Oxford Journals, Oxford University, UK and Security
and Communication Networks, Wiley, USA).
He also reviewed many papers for a number of well-known international
conferences (e.g. NordSec and EuroPKI), and books (e.g. Digital Identity
and Access Management: Technologies and Framework and Fundamentals
of Digital Forensics).
List of publications:
- Books:
 W. A. Alrodhan, ‘Privacy and Practicality of Identity
Management Systems: Academic Overview’, VDM Verlag Dr.
Müller GmbH, Germany. ISBN 978-3639380255, 2011.
- Chapters in Books:
 W. A. Alrodhan, ‘Identity Management’, chapter in the ‘Digital
Identity and Access Management: Technologies and
Framework’, IGI Global. State University of New York, NY,
USA. ISBN 9781613504987, 2011.
 W. A. Alrodhan, ‘Identity Management Systems’, chapter in the
‘Digital Identity and Access Management: Technologies and
Framework’, IGI Global. State University of New York, NY,
USA. ISBN 9781613504987, 2011.
- Papers in Journals:
 W. A. Alrodhan and C. J. Mitchell, ‘Improving the Security of
CardSpace’, EURASIP Journal on Information Security, Volume
2009 (2009), Article ID 167216, 8 pages, oi:10.1155/2009/167216.
 W. A. Alrodhan, ‘Enhancing User Privacy in Information
Card-Based Identity Management Systems’ (invited paper),
IJEI: International Journal of Engineering and Industries, Vol. 2,
No. 3, pp. 76 - 85, 2011.
 L. A. Alsulaiman and W. A. Alrodhan, ‘Information Privacy
Status in Saudi Arabia’, The Computer and Information Science
Journal, Vol. 7, No. 3, pp. 102, 2014.
- Papers in Refereed Conferences:
 W. A. Alrodhan and C. J. Mitchell, ‘Addressing privacy issues in
CardSpace’, in: Proceedings of IAS’07, Third International
Symposium on Information Assurance and Security, Manchester,
UK, August 2007, IEEE Computer Society (2007), pp.285-291.
 W. A. Alrodhan and C. J. Mitchell, ‘A Client-side CardSpace-
Liberty Integration Architecture’, in: Proceedings of
IDTrust’08, the 7th symposium on Identity and trust on the
Internet , NIST, Gaithersburg, Maryland, USA, March 2008, ACM
International Conference Proceeding Series; Vol. 283 , pages 1-7.
 W. A. Alrodhan and C. J. Mitchell, ‘A Delegation Framework
for Liberty’, in: Proceedings of the 3rd Conference on Advances
in Computer Security and Forensics (ACSF’08), Liverpool John
Moores University, Liverpool, UK, 10 - 11 July, 2008; pages 67-
73.
 W. A. Alrodhan and C. J. Mitchell, ‘Enhancing User
Authentication in Claim-Based Identity Management’, in:
Proceedings of the 2010 International Symposium on
Collaborative Technologies and Systems, CTS 2010, Chicago,
Illinois, USA, pages 75-83. IEEE, 2010.
 H. Al-Sinani, W. A. Alrodhan, and C. J. Mitchell, ‘Liberty-
CardSpace Integration for CardSpace Users’, in: Proceedings
of the ninth symposium on Identity and Trust on the Internet ,
IDTrust 2010, NIST, Gaithersburg, USA, pages12-25. ACM,
2010.
 M. H. Almeshekah and W. A. Alrodhan, ‘Why did Microsoft
Passport fail, and how good is the CardSpace solution?’, in:
Proceedings of the 4th Saudi International Conference (SIC’10),
Manchester, UK, 2010.
 W. A. Alrodhan, A. Alturbaq and S. Aldahlawi, ‘A Mobile
Biometric-Based E-voting Scheme’, in: Proceedings of the 2014
World Symposium on Computer Applications and Research,
WSCAR 2014, Sousse, Tunisia. IEEE, 2014.
 W. A. Alrodhan and L. Alsulaiman, ‘Information Privacy in
Saudi: A Country-Wide Project’, in: Proceedings of the 2014
World Symposium on Computer Applications and Research,
WSCAR 2014, Sousse, Tunisia. IEEE, 2014.
- Other Publications:
 W. A. Alrodhan, ‘Privacy and Practicality of Identity
Management Systems’, Technical Report. Department of
Mathematics, Royal Holloway University of London. Ph.D.
Thesis. RHUL–MA–2010–14, 2010.
 Recognitions & Rewards:
 An appreciation letter (with a monetary reward) from the principle
of Royal Holloway, University of London, 2005.
 An appreciation letter (with a monetary reward) from the Saudi
Arabian cultural attaché, 2006.
 An appreciation letter (with a monetary reward) from the Saudi
Arabian cultural attaché, 2009.
 An appreciation letter (with a monetary reward) from the
Principle of Imam Muhammed Ibn Saud University for the
outstanding research achievements, 2012.
 Memberships & Affiliations:
 Associate Member of the Institute of Information Security Professionals
(IISP), UK.
 Certified Information Systems Security Professional (CISSP), ISC2, USA.
 Member of the Information Systems Security Association (ISSA), USA.
 Member of the Centre of Excellence in Information Assurance (COEIA),
KSA.
 Member of the Saudi Computer Society.
 Contacts:
 Email: waleed@waleed-security.com

More Related Content

Viewers also liked

New media bubbles oct5
New media bubbles oct5New media bubbles oct5
New media bubbles oct5
Andrew Thompson Landerghini
 
Writing Institute Day 7 Log
Writing Institute Day 7 LogWriting Institute Day 7 Log
Writing Institute Day 7 Log
Lesley Roessing
 
Reglas de ortografía
Reglas de ortografíaReglas de ortografía
Reglas de ortografía
Jacqueline Torres
 
Increasing the Visibility and Reputation of Extension and Outreach
Increasing the Visibility and Reputation of Extension and OutreachIncreasing the Visibility and Reputation of Extension and Outreach
Increasing the Visibility and Reputation of Extension and Outreach
Harrison Inefuku
 
Prezentacja prof. Jerzego Langera z seminarium "Inteligentna specjalizacja" w...
Prezentacja prof. Jerzego Langera z seminarium "Inteligentna specjalizacja" w...Prezentacja prof. Jerzego Langera z seminarium "Inteligentna specjalizacja" w...
Prezentacja prof. Jerzego Langera z seminarium "Inteligentna specjalizacja" w...
Wrocław Research Centre EIT+
 
Service operation, Case volvo
Service operation, Case volvoService operation, Case volvo
Service operation, Case volvo
Yogesh Garg
 
Use cloud services to solve your personal and business problem in minutes
Use cloud services to solve your personal and business problem in minutesUse cloud services to solve your personal and business problem in minutes
Use cloud services to solve your personal and business problem in minutes
aaron hui
 
The ACADEMY by DHI - Courses & Events Calendar 2014 - UK
The ACADEMY by DHI - Courses & Events Calendar 2014 - UKThe ACADEMY by DHI - Courses & Events Calendar 2014 - UK
The ACADEMY by DHI - Courses & Events Calendar 2014 - UK
Stephen Flood
 
Mapa conceptual gerencia de proyectos
Mapa conceptual gerencia de proyectosMapa conceptual gerencia de proyectos
Mapa conceptual gerencia de proyectos
Susy Ortiz
 
Profesor Jerzy Langer - inauguracja konferencji Climate-KIC
Profesor Jerzy Langer - inauguracja konferencji Climate-KICProfesor Jerzy Langer - inauguracja konferencji Climate-KIC
Profesor Jerzy Langer - inauguracja konferencji Climate-KIC
Wrocław Research Centre EIT+
 
Open Access and Digital Repositories
Open Access and Digital RepositoriesOpen Access and Digital Repositories
Open Access and Digital Repositories
Harrison Inefuku
 
Rencana strategis tahun 2010 2014
Rencana strategis tahun 2010 2014Rencana strategis tahun 2010 2014
Rencana strategis tahun 2010 2014
Eka Ramadhani
 
Code abroadcodetogether
Code abroadcodetogetherCode abroadcodetogether
Code abroadcodetogether
Xavi Cano
 
Writing Institute Day 1 Log
Writing Institute Day 1 LogWriting Institute Day 1 Log
Writing Institute Day 1 Log
Lesley Roessing
 
Writing Institute Day 7 Log
Writing Institute Day 7 LogWriting Institute Day 7 Log
Writing Institute Day 7 Log
Lesley Roessing
 
תרשים לשון תת תפקודית
תרשים לשון תת תפקודיתתרשים לשון תת תפקודית
תרשים לשון תת תפקודיתנטע שפיר
 
MIKE FM HPC Trial
MIKE FM HPC TrialMIKE FM HPC Trial
MIKE FM HPC Trial
Stephen Flood
 
Writing Institute Day 7 Log
Writing Institute Day 7 LogWriting Institute Day 7 Log
Writing Institute Day 7 Log
Lesley Roessing
 
Junk food clothing seo umsl class team projects
Junk food clothing seo umsl class team projectsJunk food clothing seo umsl class team projects
Junk food clothing seo umsl class team projects
Perry Drake
 

Viewers also liked (20)

New media bubbles oct5
New media bubbles oct5New media bubbles oct5
New media bubbles oct5
 
Writing Institute Day 7 Log
Writing Institute Day 7 LogWriting Institute Day 7 Log
Writing Institute Day 7 Log
 
Reglas de ortografía
Reglas de ortografíaReglas de ortografía
Reglas de ortografía
 
Natraleza
NatralezaNatraleza
Natraleza
 
Increasing the Visibility and Reputation of Extension and Outreach
Increasing the Visibility and Reputation of Extension and OutreachIncreasing the Visibility and Reputation of Extension and Outreach
Increasing the Visibility and Reputation of Extension and Outreach
 
Prezentacja prof. Jerzego Langera z seminarium "Inteligentna specjalizacja" w...
Prezentacja prof. Jerzego Langera z seminarium "Inteligentna specjalizacja" w...Prezentacja prof. Jerzego Langera z seminarium "Inteligentna specjalizacja" w...
Prezentacja prof. Jerzego Langera z seminarium "Inteligentna specjalizacja" w...
 
Service operation, Case volvo
Service operation, Case volvoService operation, Case volvo
Service operation, Case volvo
 
Use cloud services to solve your personal and business problem in minutes
Use cloud services to solve your personal and business problem in minutesUse cloud services to solve your personal and business problem in minutes
Use cloud services to solve your personal and business problem in minutes
 
The ACADEMY by DHI - Courses & Events Calendar 2014 - UK
The ACADEMY by DHI - Courses & Events Calendar 2014 - UKThe ACADEMY by DHI - Courses & Events Calendar 2014 - UK
The ACADEMY by DHI - Courses & Events Calendar 2014 - UK
 
Mapa conceptual gerencia de proyectos
Mapa conceptual gerencia de proyectosMapa conceptual gerencia de proyectos
Mapa conceptual gerencia de proyectos
 
Profesor Jerzy Langer - inauguracja konferencji Climate-KIC
Profesor Jerzy Langer - inauguracja konferencji Climate-KICProfesor Jerzy Langer - inauguracja konferencji Climate-KIC
Profesor Jerzy Langer - inauguracja konferencji Climate-KIC
 
Open Access and Digital Repositories
Open Access and Digital RepositoriesOpen Access and Digital Repositories
Open Access and Digital Repositories
 
Rencana strategis tahun 2010 2014
Rencana strategis tahun 2010 2014Rencana strategis tahun 2010 2014
Rencana strategis tahun 2010 2014
 
Code abroadcodetogether
Code abroadcodetogetherCode abroadcodetogether
Code abroadcodetogether
 
Writing Institute Day 1 Log
Writing Institute Day 1 LogWriting Institute Day 1 Log
Writing Institute Day 1 Log
 
Writing Institute Day 7 Log
Writing Institute Day 7 LogWriting Institute Day 7 Log
Writing Institute Day 7 Log
 
תרשים לשון תת תפקודית
תרשים לשון תת תפקודיתתרשים לשון תת תפקודית
תרשים לשון תת תפקודית
 
MIKE FM HPC Trial
MIKE FM HPC TrialMIKE FM HPC Trial
MIKE FM HPC Trial
 
Writing Institute Day 7 Log
Writing Institute Day 7 LogWriting Institute Day 7 Log
Writing Institute Day 7 Log
 
Junk food clothing seo umsl class team projects
Junk food clothing seo umsl class team projectsJunk food clothing seo umsl class team projects
Junk food clothing seo umsl class team projects
 

Similar to Biographical Sketch

Current Issue: November 2019, Volume 10, Number 4/5/6--- Table of Contents
Current Issue: November 2019, Volume 10, Number 4/5/6--- Table of ContentsCurrent Issue: November 2019, Volume 10, Number 4/5/6--- Table of Contents
Current Issue: November 2019, Volume 10, Number 4/5/6--- Table of Contents
ijdpsjournal
 
Most Viewed Article in the Current Issue - International Journal of Distribut...
Most Viewed Article in the Current Issue - International Journal of Distribut...Most Viewed Article in the Current Issue - International Journal of Distribut...
Most Viewed Article in the Current Issue - International Journal of Distribut...
ijdpsjournal
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
ISACA Indonesia - Erik Guldentops - Father of COBIT - Special Technical Event...
ISACA Indonesia - Erik Guldentops - Father of COBIT - Special Technical Event...ISACA Indonesia - Erik Guldentops - Father of COBIT - Special Technical Event...
ISACA Indonesia - Erik Guldentops - Father of COBIT - Special Technical Event...
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
 
Review Paper ( Research Articles )
Review Paper ( Research Articles )Review Paper ( Research Articles )
Review Paper ( Research Articles )
SaadSaif6
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
acijjournal
 
Most viewed article for an year in academia - Advanced Computing: An Internat...
Most viewed article for an year in academia - Advanced Computing: An Internat...Most viewed article for an year in academia - Advanced Computing: An Internat...
Most viewed article for an year in academia - Advanced Computing: An Internat...
acijjournal
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Top 10 Read Articles in International Journal of Security, Privacy and Trust ...
Top 10 Read Articles in International Journal of Security, Privacy and Trust ...Top 10 Read Articles in International Journal of Security, Privacy and Trust ...
Top 10 Read Articles in International Journal of Security, Privacy and Trust ...
ClaraZara1
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Long CV-english
Long CV-englishLong CV-english
Long CV-english
Enas Al-lozi
 
Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
acijjournal
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
IJNSA Journal
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
IJNSA Journal
 
TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...
AIRCC Publishing Corporation
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
Dr Maqsood_Mahmud_CV May 2016 International
Dr Maqsood_Mahmud_CV   May  2016 InternationalDr Maqsood_Mahmud_CV   May  2016 International
Dr Maqsood_Mahmud_CV May 2016 International
Dr. MAQSOOD MAHMUD, PhD.
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
IJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 

Similar to Biographical Sketch (20)

Current Issue: November 2019, Volume 10, Number 4/5/6--- Table of Contents
Current Issue: November 2019, Volume 10, Number 4/5/6--- Table of ContentsCurrent Issue: November 2019, Volume 10, Number 4/5/6--- Table of Contents
Current Issue: November 2019, Volume 10, Number 4/5/6--- Table of Contents
 
Most Viewed Article in the Current Issue - International Journal of Distribut...
Most Viewed Article in the Current Issue - International Journal of Distribut...Most Viewed Article in the Current Issue - International Journal of Distribut...
Most Viewed Article in the Current Issue - International Journal of Distribut...
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
 
ISACA Indonesia - Erik Guldentops - Father of COBIT - Special Technical Event...
ISACA Indonesia - Erik Guldentops - Father of COBIT - Special Technical Event...ISACA Indonesia - Erik Guldentops - Father of COBIT - Special Technical Event...
ISACA Indonesia - Erik Guldentops - Father of COBIT - Special Technical Event...
 
Review Paper ( Research Articles )
Review Paper ( Research Articles )Review Paper ( Research Articles )
Review Paper ( Research Articles )
 
June 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced ComputingJune 2020: Top Read Articles in Advanced Computing
June 2020: Top Read Articles in Advanced Computing
 
Most viewed article for an year in academia - Advanced Computing: An Internat...
Most viewed article for an year in academia - Advanced Computing: An Internat...Most viewed article for an year in academia - Advanced Computing: An Internat...
Most viewed article for an year in academia - Advanced Computing: An Internat...
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
 
Top 10 Read Articles in International Journal of Security, Privacy and Trust ...
Top 10 Read Articles in International Journal of Security, Privacy and Trust ...Top 10 Read Articles in International Journal of Security, Privacy and Trust ...
Top 10 Read Articles in International Journal of Security, Privacy and Trust ...
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
Long CV-english
Long CV-englishLong CV-english
Long CV-english
 
Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
 
Dr Maqsood_Mahmud_CV May 2016 International
Dr Maqsood_Mahmud_CV   May  2016 InternationalDr Maqsood_Mahmud_CV   May  2016 International
Dr Maqsood_Mahmud_CV May 2016 International
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 

Recently uploaded

From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Ukraine
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 

Recently uploaded (20)

From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 

Biographical Sketch

  • 1. Dr. Waleed A. Alrodhan (Biographical Sketch) Waleed was born in the Kingdom of Saudi Arabia in 1981. He has received his B.Sc. degree in Computer Sciences from King Saud University (2002), his M.Sc. degree (with distinction) in Information Security from Royal Holloway, University of London (2005), and his Ph.D. degree in Information Security from Royal Holloway, University of London (2011). Currently, he is a Vice-Dean of the Deanship of Information Technology at Imam Muhammed Ibn Saud University. His research interests include privacy, identity management, federated identity, single sign-on, and secure web-based protocols. After receiving his B.Sc. degree in Computer Sciences from King Saud University in 2002, Waleed joined the Saudi Arabian Monetary Agency (SAMA) as a System Integration Engineer. In the same year, he joined Al- Elm Information Security Company as an Information Security Engineer (for one year). As a part of his job duties at Al-Elm, Waleed was assigned to IRIS Corporation in Malaysia to work as a Smart-card Application Developer in 2002. Waleed has switched to academia in 2003. He has joined Imam Muhammed Ibn Saud University as a Teaching Assistant. In addition to his teaching duties at the university, Waleed was designated as the Computer Applications Diploma Programme Director, and as the Secretary of the Computer Science Department. In 2004, Waleed has been granted a scholarship from Imam Muhammed Ibn Saud University to continue his postgraduate studies at the Information Security Group (ISG) in Royal Holloway, University of London. He has received a M.Sc. degree (with distinction) in 2005 and a Ph.D. degree in 2010. During his Ph.D. studies, Waleed has worked as an Academic Supervisor at Royal Holloway, University of London for the academic year 2009.
  • 2. Currently, Waleed is a Vice-Dean of the Deanship of Information Technology at Imam Muhammed Ibn Saud University. In addition, he is an Assistant Professor at the Computer Sciences department in the College of Computer and Information Sciences, the Network Security (CS 432) and the Operating Systems Security (CS 466) courses coordinator, the Head of the Research Unit, and the Chairman of the Research Council. Waleed was the Vice Dean for Development and Quality of the college in the period between September 2011 and January 2014. Moreover, Waleed is a member the Strategic Planning Steering Committee at Imam Muhammed Ibn Saud University. He have attended many international training courses on strategic planning and academic quality assurance. Finally, Waleed is the Head of the Information Security Interest Group (ISIG) at the Saudi Computer Society (SAC), and a part-time consultant at a number of organisations. Two of Waleed’s research papers (Addressing privacy issues in CardSpace and Improving the Security of CardSpace) have been chosen to be taught as an integral part of the (CS 590) M.Sc. course on Cloud Systems for Blind and Hearing Impaired, held by Purdue University, USA, 2010. Moreover, many of Waleed’s research papers have been used and cited in a number of identity management related reports (e.g. reports by the Future of Identity in the Information Society (FIDIS) consortium; funded by the European Union), books (e.g. The Future of Identity in the Information Society by Kai Rannenberg), M.Sc. dissertations and postgraduate courses taught by highly ranked academic institutions (e.g. IY5601: Application and Business Security Developments, by the ISG, RHUL). Waleed is a reviewer for a number of well-known journals (e.g. The Computer Journal, Oxford Journals, Oxford University, UK and Security and Communication Networks, Wiley, USA). He also reviewed many papers for a number of well-known international conferences (e.g. NordSec and EuroPKI), and books (e.g. Digital Identity and Access Management: Technologies and Framework and Fundamentals of Digital Forensics).
  • 3. List of publications: - Books:  W. A. Alrodhan, ‘Privacy and Practicality of Identity Management Systems: Academic Overview’, VDM Verlag Dr. Müller GmbH, Germany. ISBN 978-3639380255, 2011. - Chapters in Books:  W. A. Alrodhan, ‘Identity Management’, chapter in the ‘Digital Identity and Access Management: Technologies and Framework’, IGI Global. State University of New York, NY, USA. ISBN 9781613504987, 2011.  W. A. Alrodhan, ‘Identity Management Systems’, chapter in the ‘Digital Identity and Access Management: Technologies and Framework’, IGI Global. State University of New York, NY, USA. ISBN 9781613504987, 2011. - Papers in Journals:  W. A. Alrodhan and C. J. Mitchell, ‘Improving the Security of CardSpace’, EURASIP Journal on Information Security, Volume 2009 (2009), Article ID 167216, 8 pages, oi:10.1155/2009/167216.  W. A. Alrodhan, ‘Enhancing User Privacy in Information Card-Based Identity Management Systems’ (invited paper), IJEI: International Journal of Engineering and Industries, Vol. 2, No. 3, pp. 76 - 85, 2011.  L. A. Alsulaiman and W. A. Alrodhan, ‘Information Privacy Status in Saudi Arabia’, The Computer and Information Science Journal, Vol. 7, No. 3, pp. 102, 2014. - Papers in Refereed Conferences:  W. A. Alrodhan and C. J. Mitchell, ‘Addressing privacy issues in CardSpace’, in: Proceedings of IAS’07, Third International Symposium on Information Assurance and Security, Manchester, UK, August 2007, IEEE Computer Society (2007), pp.285-291.  W. A. Alrodhan and C. J. Mitchell, ‘A Client-side CardSpace- Liberty Integration Architecture’, in: Proceedings of IDTrust’08, the 7th symposium on Identity and trust on the
  • 4. Internet , NIST, Gaithersburg, Maryland, USA, March 2008, ACM International Conference Proceeding Series; Vol. 283 , pages 1-7.  W. A. Alrodhan and C. J. Mitchell, ‘A Delegation Framework for Liberty’, in: Proceedings of the 3rd Conference on Advances in Computer Security and Forensics (ACSF’08), Liverpool John Moores University, Liverpool, UK, 10 - 11 July, 2008; pages 67- 73.  W. A. Alrodhan and C. J. Mitchell, ‘Enhancing User Authentication in Claim-Based Identity Management’, in: Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, CTS 2010, Chicago, Illinois, USA, pages 75-83. IEEE, 2010.  H. Al-Sinani, W. A. Alrodhan, and C. J. Mitchell, ‘Liberty- CardSpace Integration for CardSpace Users’, in: Proceedings of the ninth symposium on Identity and Trust on the Internet , IDTrust 2010, NIST, Gaithersburg, USA, pages12-25. ACM, 2010.  M. H. Almeshekah and W. A. Alrodhan, ‘Why did Microsoft Passport fail, and how good is the CardSpace solution?’, in: Proceedings of the 4th Saudi International Conference (SIC’10), Manchester, UK, 2010.  W. A. Alrodhan, A. Alturbaq and S. Aldahlawi, ‘A Mobile Biometric-Based E-voting Scheme’, in: Proceedings of the 2014 World Symposium on Computer Applications and Research, WSCAR 2014, Sousse, Tunisia. IEEE, 2014.  W. A. Alrodhan and L. Alsulaiman, ‘Information Privacy in Saudi: A Country-Wide Project’, in: Proceedings of the 2014 World Symposium on Computer Applications and Research, WSCAR 2014, Sousse, Tunisia. IEEE, 2014. - Other Publications:  W. A. Alrodhan, ‘Privacy and Practicality of Identity Management Systems’, Technical Report. Department of Mathematics, Royal Holloway University of London. Ph.D. Thesis. RHUL–MA–2010–14, 2010.
  • 5.  Recognitions & Rewards:  An appreciation letter (with a monetary reward) from the principle of Royal Holloway, University of London, 2005.  An appreciation letter (with a monetary reward) from the Saudi Arabian cultural attaché, 2006.  An appreciation letter (with a monetary reward) from the Saudi Arabian cultural attaché, 2009.  An appreciation letter (with a monetary reward) from the Principle of Imam Muhammed Ibn Saud University for the outstanding research achievements, 2012.  Memberships & Affiliations:  Associate Member of the Institute of Information Security Professionals (IISP), UK.  Certified Information Systems Security Professional (CISSP), ISC2, USA.  Member of the Information Systems Security Association (ISSA), USA.  Member of the Centre of Excellence in Information Assurance (COEIA), KSA.  Member of the Saudi Computer Society.  Contacts:  Email: waleed@waleed-security.com