Lawan A. Mohammed

Lawan A. Mohammed received his BSC (ED) degree in Mathematics and Education from Ahmadu Bello University, Zaria, Nigeria. He received his MSc degree in Operational Research from University Putra Malaysia. He also obtained an MSc degree in Computer Science from DeMontfort University, UK. He completed his PhD degree in Computer and Communication Systems Engineering from University Putra Malaysia in 2004. His PhD research area was in the field of secure network communication particularly in the design of authentication protocol for both wired and wireless network.

Publications

Access Control Framework for Cloud Computing
Kashif Munir, Lawan A. Mohammed. © 2019. 14 pages.
Access control is generally a rule or procedure that allows, denies, restricts or limit access to system's resources. It may, as well, monitor and record all attempts made to...
Security Challenges for Cloud Computing Development Framework in Saudi Arabia
Lawan A. Mohammed, Kashif Munir. © 2018. 16 pages.
In recent years, cloud computing or on-demand computing technologies and applications have become ubiquitous, permeating every aspect of our personal and professional lives....
Handbook of Research on Security Considerations in Cloud Computing
Kashif Munir, Mubarak S. Al-Mutairi, Lawan A. Mohammed. © 2015. 408 pages.
Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is...
Security Challenges for Cloud Computing Development Framework in Saudi Arabia
Lawan A. Mohammed, Kashif Munir. © 2015. 16 pages.
In recent years, cloud computing or on-demand computing technologies and applications have become ubiquitous, permeating every aspect of our personal and professional lives....
Access Control Framework for Cloud Computing
Kashif Munir, Lawan A. Mohammed. © 2015. 12 pages.
Access control is generally a rule or procedure that allows, denies, restricts or limit access to system's resources. It may, as well, monitor and record all attempts made to...
ICT Security Policy: Challenges and Potential Remedies
Lawan A. Mohammed. © 2012. 17 pages.
Computer crime is now becoming a major international problem, with continual increases in incidents of cracking, hacking, viruses, worms, bacteria and the like having been...
Policy for Mobile Devices to Access Grid Infrastructure
Kashif Munir, Lawan A. Mohammed. © 2012. 16 pages.
Mobile devices are gradually becoming prevalent in our daily life, enabling users in the physical world to interact with the digital world conveniently. Mobile devices...
Cases on ICT Utilization, Practice and Solutions: Tools for Managing Day-to-Day Issues
Mubarak S. Al-Mutairi, Lawan Ahmed Mohammed. © 2011. 346 pages.
Information Communication Technology is one of the fastest advancing areas in our modern time. Gaining attention over the past few decades, ICT is one of the cornerstones of our...
ICT Security Policy: Challenges and Potential Remedies
Lawan A. Mohammed. © 2011. 17 pages.
Computer crime is now becoming a major international problem, with continual increases in incidents of cracking, hacking, viruses, worms, bacteria and the like having been...
Policy for Mobile Devices to Access Grid Infrastructure
Kashif Munir, Lawan A. Mohammed. © 2011. 16 pages.
Mobile devices are gradually becoming prevalent in our daily life, enabling users in the physical world to interact with the digital world conveniently. Mobile devices...
On The Design of Secure ATM System
Lawan A. Mohammed. © 2011. 21 pages.
Over the past three decades, consumers have been largely depending on and trust the Automatic Teller Machine, better known as ATM machine to conveniently meet their banking...
Wireless LAN Setup and Security Loopholes
Biju Issac, Lawan A. Mohammed. © 2009. 28 pages.
This chapter gives a practical overview of the brief implementation details of the IEEE802.11 wireless LAN and the security vulnerabilities involved in such networks....
Security Issues in Pervasive Computing
Lawan Ahmed Mohammed, Kashif Munir. © 2009. 22 pages.
The change in physical structures of computing facilities into small and portable devices, or even wearable computers, has enhanced ubiquitous information processing. The basic...
Vulnerability Analysis and Defenses in Wireless Networks
Lawan A. Mohammed, Biju Issac. © 2008. 16 pages.
This chapter shows that the security challenges posed by the 802.11 wireless networks are manifold and it is therefore important to explore the various vulnerabilities that are...
Cybercafé Systems Security
Lawan Ahmed Mohammed. © 2008. 17 pages.
This chapter introduces the vulnerability and security issues associated with the use and operations of Internet cafés or cybercafés by demonstrating different methods of...
Wireless LAN Setup and Security Loopholes
Biju Issac, Lawan A. Mohammed. © 2007. 31 pages.
This chapter gives a practical overview of the brief implementation details of the IEEE802.11 wireless LAN and the security vulnerabilities involved in such networks....