Khalifa Toumi

According to our database1, Khalifa Toumi authored at least 35 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A comprehensive survey on blockchain-based C-ITS applications: Classification, challenges, and open issues.
Veh. Commun., October, 2023

2021
UTM-Chain: Blockchain-Based Secure Unmanned Traffic Management for Internet of Drones.
Sensors, 2021

Blockchain based Privacy Aware Distributed Access Management Framework for Industry 4.0.
Proceedings of the 30th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2021

2020
A novel data exploitation framework based on blockchain.
Pervasive Mob. Comput., 2020

A Trust Framework for Centralized TDMA Scheduling Mechanism in Vehicular Ad hoc Networks.
Int. J. Interdiscip. Telecommun. Netw., 2020

A novel credential protocol for protecting personal attributes in blockchain.
Comput. Electr. Eng., 2020

The StakeCube blockchain : Instantiation, Evaluation & Applications.
Proceedings of the 2020 Second International Conference on Blockchain Computing and Applications, 2020

An Event-B Based Approach for Formal Modelling and Verification of Smart Contracts.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Blockchain based trust management mechanism for IoT.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

DRMF: A Distributed Resource Management Framework for Industry 4.0 Environments.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

2018
A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System.
Comput. J., 2018

N-Combat: A Nuisance Call Combating Framework for Internet Telephony.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
TrustCall: A Trust Computation Model for Web Conversational Services.
IEEE Access, 2017

ProtectCall: Call Protection Based on User Reputation.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Link reliable and trust aware RPL routing protocol for Internet of Things.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Preserving confidentiality during the migration of virtual SDN topologies: A formal approach.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Adaptive Policy-driven Attack Mitigation in SDN.
Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures, 2017

2016
Reputation trust mechanism under the organizational-based access control model.
Secur. Commun. Networks, 2016

Formal framework for defining trust in multi-organisation environment.
Int. J. Auton. Adapt. Commun. Syst., 2016

Usage Control Policy Enforcement in SDN-Based Clouds: A Dynamic Availability Service Use Case.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Br2Br: A Vector-Based Trust Framework for WebRTC Calling Services.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
An Active Testing Tool for Security Testing of Distributed Systems.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
A trust framework for multi-organization environments. (Un système de confiance pour les environnements multi-organisationnels).
PhD thesis, 2014

Validation of a Trust Approach in Multi-Organization Environments.
Int. J. Secur. Softw. Eng., 2014

Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study.
CoRR, 2014

How to Evaluate Trust Using MMT.
Proceedings of the Network and System Security - 8th International Conference, 2014

On Modeling and Testing Security Properties of Vehicular Networks.
Proceedings of the Seventh IEEE International Conference on Software Testing, 2014

A Formal Approach to Automatic Testing of Security Policies Specified in XACML.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

ISER: A Platform for Security Interoperability of Multi-source Systems.
Proceedings of the Risks and Security of Internet and Systems, 2014

2013
Trust Ontology Based on Access Control Parameters in Multi-organization Environments.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Security Properties in Virtual Organizations.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments.
Proceedings of the Information Systems Security, 8th International Conference, 2012

Role based interoperability security policies in collaborative systems.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

A vector based model approach for defining trust in Multi-Organization Environments.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2010
HAT: HIP Address Translation protocol for Hybrid RFID/IP Internet of Things communication.
Proceedings of the International Conference on Wireless and Ubiquitous Systems , 2010


  Loading...