Meryeme Ayache

According to our database1, Meryeme Ayache authored at least 18 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Enhanced DASS-CARE 2.0: a blockchain-based and decentralized FL framework.
Ann. des Télécommunications, November, 2023

Ensuring Authenticity and Sustainability in Perfume Production: A Blockchain Solution for the Fragrance Supply Chain.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

A Multi-Agent Reinforcement Learning Approach for Congestion Control in network based-SDN.
Proceedings of the 10th International Conference on Future Internet of Things and Cloud, 2023

Health Monitor: An IoMT Based Patient Health Monitoring System Using Blockchain and k-means.
Proceedings of the 10th International Conference on Future Internet of Things and Cloud, 2023

2022
Hayyakum (حيَّاكم) - COVID-19 Vaccine Digital Certificate: A Blockchain Approach.
Proceedings of the 9th International Conference on Wireless Networks and Mobile Communications, 2022

A Blockchain-Based Patient Electronic Health Record System - Etmaen (اِطْمَئِن).
Proceedings of the 9th International Conference on Wireless Networks and Mobile Communications, 2022

DASS-CARE 2.0: Blockchain-Based Healthcare Framework for Collaborative Diagnosis in CIoMT Ecosystem.
Proceedings of the 5th Conference on Cloud and Internet of Things, 2022

2019
XBAC: A Unified Access Control Model for Heterogeneous Multi-Tenancy Cloud Environments.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

DASS-CARE: A Decentralized, Accessible, Scalable, and Secure Healthcare Framework using Blockchain.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Managing Security Policies within Cloud Environments Using Aspect-Oriented State Machines.
Proceedings of the International Conference on Advanced Communication Technologies and Networking, 2019

2017
Clustering-based Approach for Anomaly Detection in XACML Policies.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Aspect-Oriented State Machines for Resolving Conflicts in XACML Policies.
Proceedings of the Networked Systems - 5th International Conference, 2017

2016
Analysis and Verification of XACML Policies in a Medical Cloud Environment.
Scalable Comput. Pract. Exp., 2016

An Approach to Resolve NP-Hard Problems of Firewalls.
Proceedings of the Networked Systems - 4th International Conference, 2016

Towards an Efficient Policy Evaluation Process in Multi-Tenancy Cloud Environments.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

2015
curlX: A middleware to enforce access control policies within a cloud environment.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Access control policies enforcement in a cloud environment: Openstack.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

2012
Using aspect-oriented state machines for detecting and resolving feature interactions.
Comput. Sci. Inf. Syst., 2012


  Loading...