Dhouha Ayed

According to our database1, Dhouha Ayed authored at least 21 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Protecting sensitive data in the cloud-to-edge continuum: The FogProtect approach.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022

ETSI ZSM Driven Security Management in Future Networks.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

2020
FogProtect: Protecting Sensitive Data in the Computing Continuum.
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2020


2018
Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Secure Data Processing in the Cloud.
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2017

2015
Analysis of XACML policies with ASP.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Cross-Domain Attribute Conversion for Authentication and Authorization.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Security and Trustworthiness Threats to Composite Services: Taxonomy, Countermeasures, and Research Directions.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Monitoring Threats to Composite Services within the Aniketos Run-Time Framework.
Proceedings of the Secure and Trustworthy Service Composition - The Aniketos Approach, 2014

Integration of Data-Minimising Authentication into Authorisation Systems.
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014

2013
An event processing approach for threats monitoring of service compositions.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

2008
CADeComp: Context-aware deployment of component-based applications.
J. Netw. Comput. Appl., 2008

2007
Dynamic adaptation of CORBA component-based applications.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

UniTI: A Unified Transformation Infrastructure.
Proceedings of the Model Driven Engineering Languages and Systems, 2007

MDD Approach for the Development of Context-Aware Applications.
Proceedings of the Modeling and Using Context, 2007

2006
UML profile for the design of a platform-independent context-aware applications.
Proceedings of the 1st workshop on MOdel Driven Development for Middleware, 2006

An Adaptation Methodology for the Deployment of Mobile Component-based Applications.
Proceedings of the ACS/IEEE International Conference on Pervasive Services 2006, 2006

2005
Deployment of Component-based Applications on Top of a Context-aware Middleware.
Proceedings of the IASTED International Conference on Software Engineering, 2005

2004
Context-Aware Distributed Deployment of Component-Based Applications.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004

A pro-active middleware platform for mobile environments.
Proceedings of the IASTED International Conference on Software Engineering, 2004


  Loading...