Hanan El Bakkali

Orcid: 0000-0003-2941-3768

Affiliations:
  • Mohammed V University, ENSIAS, Information Security Research Team, Rabat, Morocco


According to our database1, Hanan El Bakkali authored at least 40 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examination and Codification of Vulnerabilities in Prominent Blockchains.
CoRR, 2023

Preserving Privacy in Mobile Crowdsensing within Intelligent Transportation System: Current Research and Future Challenges.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

An Overview of Funded Research Projects in The MENA Region on Intelligent Transportation Systems.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Toward Reliable Mobile CrowdSensing Data Collection: Image Splicing Localization Overview.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

CL2S4P: A Privacy Policy Translator for Comprehensive Interpretation in Smart Healthcare Systems.
Proceedings of the 6th IEEE International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, 2023

2022
A Decentralized Trust Establishment Protocol for Smart IoT Systems.
Internet Things, 2022

Communizer: A collaborative cloud-based self-protecting software communities framework - Focus on the alert coordination system.
Comput. Secur., 2022

2021
Proximity Measurement for Hierarchical Categorical Attributes in Big Data.
Secur. Commun. Networks, 2021

The Pandemic Impact on Organizations Security and Resiliency: The Workflow Satisfiability Problem.
Proceedings of the Hybrid Intelligent Systems, 2021

2020
A Classification of non-Cryptographic Anonymization Techniques Ensuring Privacy in Big Data.
Int. J. Commun. Networks Inf. Secur., 2020

Immunizer: A Scalable Loosely-Coupled Self-Protecting Software Framework using Adaptive Microagents and Parallelized Microservices.
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020

Towards Smart Blockchain-Based System for Privacy and Security in a Smart City environment.
Proceedings of the 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, 2020

2019
Application-Level Unsupervised Outlier-Based Intrusion Detection and Prevention.
Secur. Commun. Networks, 2019

A survey of major data privacy laws, languages and approaches in smart cities environments.
Proceedings of the 4th International Conference on Smart City Applications, 2019

Automated Security Driven Solution for Inter-Organizational Workflows.
Proceedings of the Hybrid Intelligent Systems, 2019

Predicting Patients' Health Behavior Based on Their Privacy Preferences.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
Security based partner selection in Inter-organizational workflow systems.
Int. J. Commun. Networks Inf. Secur., 2018

Novel Access Control Approach for Inter-organizational Workflows.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

Proximity Test for Sensitive Categorical Attributes in Big Data.
Proceedings of the 2018 4th International Conference on Cloud Computing Technologies and Applications, 2018

2017
State of the art of Trust and Reputation Systems in E-Commerce Context.
CoRR, 2017

Toward Third-Party Immune Applications.
Proceedings of the Computer Network Security, 2017

Weighted Access Control Policies Cohabitation in Distributed Systems.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2017

A Comparative Study on Access Control Models and Security Requirements in Workflow Systems.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2017

2016
Resolving Conflicting Privacy Policies in M-health based on Prioritization.
Scalable Comput. Pract. Exp., 2016

Calculating and Evaluating Trustworthiness of Certification Authority.
Int. J. Commun. Networks Inf. Secur., 2016

An approach for evaluating trust in X.509 certificates.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

2015
CIOSOS: Combined Idiomatic-Ontology Based Sentiment Orientation System for Trust Reputation in E-commerce.
Proceedings of the International Joint Conference, 2015

Toward resolving access control policy conflict in inter-organizational workflows.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2014
A New Trust Reputation System for E-Commerce Applications.
CoRR, 2014

Towards controlled-privacy in e-health: A comparative study.
Proceedings of the 4th International Conference on Multimedia Computing and Systems, 2014

PPAMH: A novel privacy-preserving approach for mobile healthcare.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

2013
Enhancing Workflow Systems Resiliency by Using Delegation and Priority Concepts.
J. Digit. Inf. Manag., 2013

2012
Bypassing Workflow Satisfiability Problem Due to Access Control Constraints.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

Towards a new design for trust reputation system.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

2010
Workflow access control: From role engineering to task engineering.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

A New Task Engineering Approach for Workflow Access Control.
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010

2009
RB-WAC: New approach for access control in workflows.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2004
E-Payment Security - Recommendations About the Use of a PKI for E-Payment Security.
Proceedings of the ICETE 2004, 2004

2001
A Predicate Calculus Logic for the PKI Trust Model Analysis.
Proceedings of the IEEE International Symposium on Network Computing and Applications (NCA 2001), 2001

Logic-Based Reasoning About PKI Trust Model.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001


  Loading...