Kamel Adi
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2018
- [j12]Kamel Adi, Lamia Hamza, Liviu Pene:
Automatic security policy enforcement in computer systems. Computers & Security 73: 156-171 (2018) - 2017
- [j11]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo:
A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets. Int. J. Inf. Sec. 16(1): 91-113 (2017) - [c38]Sofiene Boulares, Kamel Adi, Luigi Logrippo:
Insider Threat Likelihood Assessment for Flexible Access Control. MCETECH 2017: 77-95 - [c37]Liviu Pene, Lamia Hamza, Kamel Adi:
Compliance Verification Algorithm for Computer Systems Security Policies. MCETECH 2017: 96-115 - [c36]Nadjate Saidani, Kamel Adi, Mouhand Saïd Allili:
A Supervised Approach for Spam Detection Using Text-Based Semantic Representation. MCETECH 2017: 136-148 - 2016
- [c35]Sofiene Boulares, Kamel Adi, Luigi Logrippo:
Insider Threat Likelihood Assessment for Access Control Systems: Quantitative Approach. FPS 2016: 135-142 - [c34]Myria Bouhaddi, Kamel Adi, Mohammed Said Radjef:
Evolutionary Game-Based Defense Mechanism in the MANETs. SIN 2016: 88-95 - 2015
- [j10]Khaled Hamouid, Kamel Adi:
Efficient certificateless web-of-trust model for public-key authentication in MANET. Computer Communications 63: 24-39 (2015) - [c33]Sofiene Boulares, Kamel Adi, Luigi Logrippo:
Information Flow-Based Security Levels Assessment for Access Control Systems. MCETECH 2015: 105-121 - 2014
- [c32]Myria Bouhaddi, Mohammed Said Radjef, Kamel Adi:
A Game Approach for an Efficient Intrusion Detection System in Mobile Ad Hoc Networks. FPS 2014: 131-146 - 2013
- [j9]Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo:
A framework for risk assessment in access control systems. Computers & Security 39: 86-103 (2013) - [c31]Salim Khamadja, Kamel Adi, Luigi Logrippo:
Designing flexible access control models for the cloud. SIN 2013: 225-232 - [c30]Salim Khamadja, Kamel Adi, Luigi Logrippo:
An access control framework for hybrid policies. SIN 2013: 282-286 - 2012
- [j8]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo:
Dynamic risk-based decision methods for access control systems. Computers & Security 31(4): 447-464 (2012) - [c29]Bernard Stepien, Hemanth Khambhammettu, Kamel Adi, Luigi Logrippo:
CatBAC: A generic framework for designing and validating hybrid access control models. ICC 2012: 6721-6726 - [c28]Khaled Hamouid, Kamel Adi:
Self-Certified Based Trust Establishment Scheme in Ad-Hoc Networks. NTMS 2012: 1-7 - [c27]Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo:
A Framework for Threat Assessment in Access Control Systems. SEC 2012: 187-198 - [c26]Ammar Boulaiche, Hatem Bouzayani, Kamel Adi:
A Quantitative Approach for Intrusions Detection and Prevention based on Statistical N-Gram Models. ANT/MobiWIS 2012: 450-457 - 2011
- [j7]Ji Ma, Mehmet A. Orgun, Kamel Adi:
An analytic tableau calculus for a temporalised belief logic. J. Applied Logic 9(4): 289-304 (2011) - [j6]Mahjoub Langar, Mohamed Mejri, Kamel Adi:
Formal enforcement of security policies on concurrent systems. J. Symb. Comput. 46(9): 997-1016 (2011) - [c25]Nadera Slimani, Hemanth Khambhammettu, Kamel Adi, Luigi Logrippo:
UACML: Unified Access Control Modeling Language. NTMS 2011: 1-8 - [c24]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Risk-based decision method for access control systems. PST 2011: 189-192 - 2010
- [j5]Kamel Adi, Liviu Pene, L. Sullivan:
Games for non-repudiation protocol correctness. IJWMC 4(4): 305-313 (2010) - [j4]Khaled Hamouid, Kamel Adi:
Secure and robust threshold key management (SRKM) scheme for ad hoc networks. Security and Communication Networks 3(6): 517-534 (2010) - [c23]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Inconsistency detection method for access control policies. IAS 2010: 204-209 - [c22]Waël Hassan, Nadera Slimani, Kamel Adi, Luigi Logrippo:
Secrecy UML Method for Model Transformations. ASM 2010: 400 - [c21]Mahjoub Langar, Mohamed Mejri, Kamel Adi:
Toward an Algebraic Framework for Security Policy Enforcement in Concurrent Systems. Security and Management 2010: 400-405 - [c20]Ji Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski:
Risk Analysis in Access Control Systems Based on Trust Theories. Web Intelligence/IAT Workshops 2010: 415-418 - [c19]Ji Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Risk management in dynamic role based access control systems. ICDIM 2010: 1-8 - [c18]Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski:
Detecting incompleteness in access control policies using data classification schemes. ICDIM 2010: 417-422 - [c17]Ji Ma, Kamel Adi, Mohamed Mejri, Luigi Logrippo:
Risk analysis in access control systems. PST 2010: 160-166 - [c16]Mahjoub Langar, Mohamed Mejri, Kamel Adi:
Rewriting-based Security Enforcement of Concurrent Systems - A Formal Approach. SECRYPT 2010: 66-74
2000 – 2009
- 2009
- [c15]Hakima Ould-Slimane, Mohamed Mejri, Kamel Adi:
Using Edit Automata for Rewriting-Based Security Enforcement. DBSec 2009: 175-190 - [c14]Ji Ma, Mehmet A. Orgun, Abdul Sattar, Kamel Adi:
Temporalised Epistemic Logic for Reasoning about Agent-Based Systems. Web Intelligence/IAT Workshops 2009: 474-477 - [c13]Khaled Hamouid, Kamel Adi:
Robust Key Management scheme for certification in mobile ad-hoc networks. ISCC 2009: 355-360 - [c12]Kamel Adi, Yacine Bouzida, Ikhlass Hattak, Luigi Logrippo, Serge Mankovski:
Typing for Conflict Detection in Access Control Policies. MCETECH 2009: 212-226 - [c11]Mohamed Mejri, Kamel Adi, Hamido Fujita:
Formal Specification and Analysis of Firewalls. SoMeT 2009: 284-293 - 2008
- [c10]Ammar Boulaiche, Kamel Adi:
Honeyd Detection Via Abnormal Behaviors Generated by the ARPD Daemon. SECRYPT 2008: 65-71 - [c9]
- 2007
- [c8]Mahjoub Langar, Mohamed Mejri, Kamel Adi:
A Formal Approach for Security Policy Enforcement in Concurrent Programs. Security and Management 2007: 165-171 - [c7]Lamia Hamza, Kamel Adi:
Formal Technique for Discovering Complex Attacks in Computer Systems. SoMeT 2007: 185-199 - 2006
- [j3]Kamel Adi, Daniel Amyot, Luigi Logrippo:
Foreword - New technologies in distributed systems. Annales des Télécommunications 61(11-12): 1226-1228 (2006) - [c6]Lamia Hamza, Kamel Adi, Karim El Guemhioui:
Automatic generation of attack scenarios for intrusion detection systems. AICT/ICIW 2006: 205 - [c5]Hakima Ould-Slimane, Mohamed Mejri, Kamel Adi:
Enforcing Security Policies on Programs. SoMeT 2006: 195-207 - [c4]Liviu Pene, Kamel Adi:
A Calculus for Distributed Firewall Specification and Verification. SoMeT 2006: 301-315 - 2005
- [c3]
- 2003
- [j2]Kamel Adi, Mourad Debbabi, Mohamed Mejri:
A new logic for electronic commerce protocols. Theor. Comput. Sci. 291(3): 223-283 (2003) - 2001
- [j1]Kamel Adi, Mourad Debbabi:
Abstract interpretation for proving secrecy properties in security protocols. Electr. Notes Theor. Comput. Sci. 55(1): 25-50 (2001) - 2000
- [c2]Kamel Adi, Mourad Debbabi, Mohamed Mejri:
A New Logic for Electronic Commerce Protocols. AMAST 2000: 499-513
1990 – 1999
- 1996
- [c1]Didier Bert, Rachid Echahed, Kamel Adi:
Resolution of Goals with the Functional and Logic Programming Language LPG: Impact of Abstract Interpretation. AMAST 1996: 629-632
Coauthor Index
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2018-04-15 21:05 CEST by the dblp team