Anas Abou El Kalam

According to our database1, Anas Abou El Kalam authored at least 73 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Game Theory-Based Incentive Design for Mitigating Malicious Behavior in Blockchain Networks.
J. Sens. Actuator Networks, February, 2024

2023
A Novel Biometric Authentication Based on Blockchain and Watermarking.
Proceedings of the Recent Trends in Image Processing and Pattern Recognition, 2023

2021
Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms.
J. Univers. Comput. Sci., 2021

Securing SCADA and critical industrial systems: From needs to security mechanisms.
Int. J. Crit. Infrastructure Prot., 2021

Big Data: Towards a Collaborative Security System at the Service of Data Quality.
Proceedings of the Hybrid Intelligent Systems, 2021

Anomaly Detection for Big Data Security: A Benchmark.
Proceedings of the BDET 2021: The 3rd International Conference on Big Data Engineering and Technology, 2021

2020
Quality and Security in Big Data: Challenges as opportunities to build a powerful wrap-up solution.
J. Ubiquitous Syst. Pervasive Networks, 2020

Transformation of PrivUML into XACML Using QVT.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

Big Data security and privacy techniques.
Proceedings of the NISS 2020: The 3rd International Conference on Networking, Information Systems & Security, Marrakech, Morocco, March 31, 2020

Privacy-Aware and Authentication based on Blockchain with Fault Tolerance for IoT enabled Fog Computing.
Proceedings of the Fifth International Conference on Fog and Mobile Edge Computing, 2020

2019
Big Data: Trade-off between Data Quality and Data Security.
Proceedings of the 10th International Conference on Ambient Systems, Networks and Technologies (ANT 2019) / The 2nd International Conference on Emerging Data and Industry 4.0 (EDI40 2019) / Affiliated Workshops, April 29, 2019

PrivUML: A Privacy Metamodel.
Proceedings of the 10th International Conference on Ambient Systems, Networks and Technologies (ANT 2019) / The 2nd International Conference on Emerging Data and Industry 4.0 (EDI40 2019) / Affiliated Workshops, April 29, 2019

Decentralized Access Control Infrastructure using Blockchain for Big Data.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
Knowledge Based Access Control a model for security and privacy in the Big Data.
Proceedings of the 3rd International Conference on Smart City Applications, 2018

Emergence-Based Access Control: New Approach to Secure the Internet of Things.
Proceedings of the 1st International Conference on Digital Tools & Uses Congress, 2018

2017
Access control in the Internet of Things: Big challenges and new opportunities.
Comput. Networks, 2017

Harnessing the power of blockchain technology to solve IoT security & privacy issues.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Mobile app security by fragmentation "MASF".
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Securing the mobile environment: firewall anti-leak of sensitive data on smartphone.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Biometric Template Privacy Using Visual Cryptography.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2017

Towards a Collaborative Architecture of Honeypots.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2016
Bilateral Teleoperation System Using QoS and Secure Communication Networks for Telemedicine Applications.
IEEE Syst. J., 2016

FairAccess: a new Blockchain-based access control framework for the Internet of Things.
Secur. Commun. Networks, 2016

Reduce positive and negative falses from attacks collected from the deployment of distributed honeypot network.
CoRR, 2016

Access control in IoT: Survey & state of the art.
Proceedings of the 5th International Conference on Multimedia Computing and Systems, 2016

Securing SCADA Critical Network Against Internal and External Threats - Short Paper.
Proceedings of the Critical Information Infrastructures Security, 2016

Firewall Anti-Leak of Sensitive Data.
Proceedings of the 7th International Conference on Ambient Systems, 2016

Analysis and enhancements of an efficient biometric-based remote user authentication scheme using smart cards.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity.
Int. J. Inf. Sec., 2015

Distributed Intrusion Detection System based on Anticipation and Prediction Approach.
Proceedings of the SECRYPT 2015, 2015

Automatic Classification and Detection of Snort Configuration Anomalies - a Formal Approach.
Proceedings of the International Joint Conference, 2015

A Security Framework for Internet of Things.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015

SmartOrBAC security and privacy in the Internet of Things.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2014
A model-driven approach for experimental evaluation of intrusion detection systems.
Secur. Commun. Networks, 2014

Conflict detection in obligation with deadline policies.
EURASIP J. Inf. Secur., 2014

A Novel Metric for the Evaluation of IDSs Effectiveness.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Specifying and enforcing constraints in dynamic access control policies.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Introduction to identity usurpation applied to biometric modalities.
Proceedings of the 4th International Conference on Multimedia Computing and Systems, 2014

2013
Conflict Management in Obligation with Deadline Policies.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
A Secure Architecture for Nomadic User in IMS Network.
Int. J. Mob. Comput. Multim. Commun., 2012

Integrity-Organization Based Access Control for Critical Infrastructure Systems.
Proceedings of the Critical Infrastructure Protection VI, 2012

Performance Analysis of Wireless Intrusion Detection Systems.
Proceedings of the Internet and Distributed Computing Systems, 2012

Multi-level Authentication Based Single Sign-On for IMS Services.
Proceedings of the Communications and Multimedia Security, 2012

2011
Further Privacy Mechanisms.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Specification, implementation and performance evaluation of the QoS-friendly encapsulating security payload (Q-ESP) protocol.
Secur. Commun. Networks, 2011

A holistic methodology for evaluating wireless Intrusion Detection Systems.
Proceedings of the 5th International Conference on Network and System Security, 2011

QoS-aware Firewall Session Table.
Proceedings of the CRiSIS 2011, 2011

A Secure One-Way Authentication Protocol in IMS Context.
Proceedings of the Communications and Multimedia Security, 2011

2009
A new protocol for security and QoS in IP networks.
Int. J. Inf. Comput. Secur., 2009

PolyOrBAC: A security framework for Critical Infrastructures.
Int. J. Crit. Infrastructure Prot., 2009

Extending Firewall Session Table to Accelerate NAT, QoS Classification and Routing
CoRR, 2009

A Policy Language for Modelling Recommendations.
Proceedings of the Emerging Challenges for Security, 2009

Q-ESP: A QoS-Compliant Security Protocol to Enrich IPSec Framework.
Proceedings of the NTMS 2009, 2009

Manipulation of Network Traffic Traces for Security Evaluation.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

Sécurité des réseaux et infrastructures critiques. (Security of critical infrastructures and Networks).
, 2009

2008
A research challenge in modeling access control policies: Modeling recommendations.
Proceedings of the IEEE International Conference on Research Challenges in Information Science, 2008

Execution Patterns in Automatic Malware and Human-Centric Attacks.
Proceedings of The Seventh IEEE International Symposium on Networking Computing and Applications, 2008

Collaborative Access Control For Critical Infrastructures.
Proceedings of the Critical Infrastructure Protection II, 2008

Critical Infrastructures Security Modeling, Enforcement and Runtime Checking.
Proceedings of the Critical Information Infrastructure Security, 2008

EESP: A Security protocol that supports QoS management.
Proceedings of the CRiSIS '08, 2008

Access control for cooperative systems: A comparative analysis.
Proceedings of the CRiSIS '08, 2008

2007
Access Control for Collaborative Systems: A Web Services Based Approach.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

The CRUTIAL Architecture for Critical Information Infrastructures.
Proceedings of the Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], 2007

Defining categories to select representative attack test-cases.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

2005
Personal data anonymization for security and privacy in collaborative environments.
Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005

Intrusion detection and security policy framework for distributed environments.
Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005

Privacy Requirements Implemented with a JavaCard.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Modèle de sécurité pour le secteur de la santé.
Tech. Sci. Informatiques, 2004

A generic approach for healthcare data anonymization.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

Smartcard-based Anonymization.
Proceedings of the Smart Card Research and Advanced Applications VI, 2004

2003
Modèles et politiques de securite pour les domaines de la SANTE et des Affaires sociales. (Security policies and models for Health Care Computing and Communication Systems).
PhD thesis, 2003

Security Model for Health Care Computing and Communication Systems.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Organization based access contro.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003


  Loading...