Faten Ayachi

According to our database1, Faten Ayachi authored at least 20 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Pre-Trained Deep Convolutional Neural Network Architectures for Breast Cancer Diagnosis in Mammography: Current State-Of-The-Art.
Proceedings of the International Conference on Innovations in Intelligent Systems and Applications, 2023

2021
Attacks Scenarios in a Correlated Anomalies Context: Case of Medical System Database Application.
Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering, 2021

Data warehouse for machine learning: application to breast cancer diagnosis.
Proceedings of the CENTERIS 2021 - International Conference on ENTERprise Information Systems / ProjMAN 2021 - International Conference on Project MANagement / HCist 2021, 2021

2020
Advanced analysis of the integrity of access control policies: the specific case of databases.
Int. Arab J. Inf. Technol., 2020

Enforcing Risk-Awareness in Access Control Systems: Synthesis, Discussion and Guidelines.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

2019
Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

A reverse-engineering methodology for medical enhancement processes.
Proceedings of the CENTERIS 2019 - International Conference on ENTERprise Information Systems / ProjMAN 2019 - International Conference on Project MANagement / HCist 2019, 2019

2018
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures.
Secur. Commun. Networks, 2018

Anomalies Correlation for Risk-Aware Access Control Enhancement.
Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, 2018

2017
A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment.
Proceedings of the SCSS 2017, 2017

Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems.
Proceedings of the SCSS 2017, 2017

Risk Management in Access Control Policies.
Proceedings of the Position Papers of the 2017 Federated Conference on Computer Science and Information Systems, 2017

2016
Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.
J. Medical Syst., 2016

2015
A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies.
Proceedings of the SECRYPT 2015, 2015

The problem of integrity in RBAC-based policies within relational databases: synthesis and problem study.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

A Formal Approach Based on Verification and Validation Techniques for Enhancing the Integrity of Concrete Role Based Access Control Policies.
Proceedings of the International Joint Conference, 2015

2014
An Approach to Formally Validate and Verify the Compliance of Low Level Access Control Policies.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2010
RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

An Access Control Model for Web Databases.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Enforcing Access Control to Web Databases.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010


  Loading...