Yahya Benkaouz

According to our database1, Yahya Benkaouz authored at least 26 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Decentralized SGX-Based Cloud Key Management.
Proceedings of the Network and System Security - 17th International Conference, 2023

EdgeSA: Secure Aggregation for Privacy-Preserving Federated Learning in Edge Computing.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2021
LighTx: A Lightweight Proof-of-Bandwidth Transactions Transfer System.
Proceedings of the Networked Systems - 9th International Conference, 2021

LighTx: a lightweight transactions transfer system.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

2020
A new approach for increasing K-nearest neighbors performance.
Proceedings of the 8th International Conference on Wireless Networks and Mobile Communications, 2020

Robust P2P Personalized Learning.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

A Log-Based Method to Detect and Resolve Efficiently Conflicts in Access Control Policies.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

2019
Special issue on NETYS'17 selected papers.
Computing, 2019

Initial Centroid Selection Method for an Enhanced K-means Clustering Algorithm.
Proceedings of the Ubiquitous Networking - 5th International Symposium, 2019

Efficient Security Policy Management Using Suspicious Rules Through Access Log Analysis.
Proceedings of the Networked Systems - 7th International Conference, 2019

2018
Formal Approach to Detect and Resolve Anomalies while Clustering ABAC Policies.
EAI Endorsed Trans. Security Safety, 2018

Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Clustering-based Approach for Anomaly Detection in XACML Policies.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

ABAC Rule Reduction via Similarity Computation.
Proceedings of the Networked Systems - 5th International Conference, 2017

Access Domain-Based Approach for Anomaly Detection and Resolution in XACML Policies.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2017

ABAC Based Online Collaborations in the Cloud.
Proceedings of the Emerging Technologies for Developing Countries, 2017

2016
Nearest Neighbors Graph Construction: Peer Sampling to the Rescue.
Proceedings of the Networked Systems - 4th International Conference, 2016

Work in Progress: K-Nearest Neighbors Techniques for ABAC Policies Clustering.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016

2015
A distributed protocol for privacy preserving aggregation with non-permanent participants.
Computing, 2015

Distributed Privacy-Preserving Data Aggregation via Anonymization.
Proceedings of the Networked Systems - Third International Conference, 2015

Towards a Decentralized OSN for a Privacy-preserving e-health System.
Proceedings of the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2015)/ The 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2015)/ Affiliated Workshops, 2015

Access control in a collaborative session in multi tenant environment.
Proceedings of the 11th International Conference on Information Assurance and Security, 2015

2013
A Distributed Polling with Probabilistic Privacy.
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013

A Distributed Protocol for Privacy Preserving Aggregation.
Proceedings of the Networked Systems - First International Conference, 2013

2012
Performance analysis of WiFi/WiMax vertical handover based on media independent handover.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

2011
HaVe-2W3G: A vertical handoff solution between WLAN, WiMAX and 3G networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011


  Loading...