Wassim Itani

According to our database1, Wassim Itani authored at least 33 papers between 2003 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.



In proceedings 
PhD thesis 


On csauthors.net:


Network Programming and Probabilistic Sketching for Securing the Data Plane.
Security and Communication Networks, 2018

ENAGS: energy and network-aware genetic scheduling algorithm on cloud data centers.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Virtualized network views for localizing misbehaving sources in SDN data planes.
Proceedings of the IEEE International Conference on Communications, 2017

Paving the Way for Energy Efficient Cloud Data Centers: A Type-Aware Virtual Machine Placement Strategy.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

Towards Solving the Problem of Virtual Machine Placement in Cloud Computing: A Job Classification Approach.
JCS, 2016

Power management in virtualized data centers: state of the art.
J. Cloud Computing, 2016

NCaaS: network configuration as a service in SDN-driven cloud architectures.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks.
Sensors, 2015

G-Route: an energy-aware service routing protocol for green cloud computing.
Cluster Computing, 2015

Job Classification in Cloud Computing: The Classification Effects on Energy Efficiency.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

ServBGP: BGP-inspired autonomic service routing for multi-provider collaborative architectures in the cloud.
Future Generation Comp. Syst., 2014

ALPS: The Accountable Cloud Protocol Stack.
Proceedings of the CLOSER 2014, 2014

SNUAGE: an efficient platform-as-a-service security framework for the cloud.
Cluster Computing, 2013

BGP-inspired autonomic service routing for the cloud.
Proceedings of the ACM Symposium on Applied Computing, 2012

Security analysis and solution for thwarting cache poisoning attacks in the Domain Name System.
Proceedings of the 19th International Conference on Telecommunications, 2012

Policy-based Security Channels for Protecting Network Communication in Mobile Cloud Computing.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Secure delay-tolerant communications in the presence of oppressive governments.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Energy-efficient platform-as-a-service security provisioning in the cloud.
Proceedings of the International Conference on Energy Aware Computing, 2011

Accountable Reputation Ranking Schemes for Service Providers in Cloud Computing.
Proceedings of the CLOSER 2011, 2011

STRIDE: A Secure Framework for Modeling Trust-Privacy Tradeoffs in Distributed Computing Environments.
IJDTIS, 2010

Slow but certain wins the race: authenticated bundle communication in delay tolerant networks.
Proceedings of the Q2SWinet'10, 2010

SinPack: A Security Protocol for Preventing Pollution Attacks in Network-Coded Content Distribution Networks.
Proceedings of the Global Communications Conference, 2010

Smart encryption channels for securing virtual machine-based networked applications.
Security and Communication Networks, 2009

PETRA: a secure and energy-efficient software update protocol for severely-constrained network devices.
Proceedings of the Q2SWinet'09, Proceedings of the Fifth ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Tenerife, Canary Islands, Spain, 2009

Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

An efficient and scalable Security ProtocoL for protecting fixed-Content Objects in ContEnt aDdressable StoraGe architEctures.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

A Policy-driven, Content-based Security Protocol for Protecting Audit Logs on Wireless Devices.
I. J. Network Security, 2006

An enterprise policy-based security protocol for protecting relational database network objects.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

PRIDE: Policy-Driven Web Security for Handheld Wireless Devices.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

J2ME application-layer end-to-end security for m-commerce.
J. Network and Computer Applications, 2004

SPECSA: a scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applications.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

J2ME end-to-end security for M-commerce.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003