[go: up one dir, main page]

Follow
Yahya Benkaouz
Yahya Benkaouz
Professor of Computer Science, FSR, Mohammed V University, Morocco
Verified email at um5s.net.ma
Title
Cited by
Cited by
Year
Work in progress: K-nearest neighbors techniques for abac policies clustering
Y Benkaouz, M Erradi, B Freisleben
Proceedings of the 2016 ACM international workshop on attribute based access …, 2016
402016
HaVe-2W3G: A vertical handoff solution between WLAN, WiMAX and 3G networks
B Angoma, M Erradi, Y Benkaouz, A Berqia, MC Akalay
2011 7th International Wireless Communications and Mobile Computing …, 2011
292011
Clustering-based Approach for Anomaly Detection in XACML Policies.
M Ait El Hadj, M Ayache, Y Benkaouz, A Khoumsi, M Erradi
SECRYPT, 548-553, 2017
192017
ABAC rule reduction via similarity computation
M Ait El Hadj, Y Benkaouz, B Freisleben, M Erradi
International conference on networked systems, 86-100, 2017
172017
Robust p2p personalized learning
K Boubouh, A Boussetta, Y Benkaouz, R Guerraoui
2020 International Symposium on Reliable Distributed Systems (SRDS), 299-308, 2020
152020
A distributed protocol for privacy preserving aggregation with non-permanent participants
Y Benkaouz, M Erradi
Computing 97 (9), 893-912, 2015
152015
A Collaborative Task Role Based Access Control Model.
MA Madani, M Erradi, Y Benkaouz
Journal of Information Assurance & Security 11 (6), 2016
132016
Validation and correction of large security policies: A clustering and access log based approach
M Ait El Hadj, M Erradi, A Khoumsi, Y Benkaouz
2018 IEEE international conference on big Data (Big Data), 5330-5332, 2018
122018
Efficient security policy management using suspicious rules through access log analysis
M Ait El Hadj, A Khoumsi, Y Benkaouz, M Erradi
International Conference on Networked Systems, 250-266, 2019
112019
Towards a Decentralized OSN for a Privacy-preserving e-health System
Y Benkaouz, M Erradi
Procedia Computer Science 63, 284-291, 2015
112015
Formal approach to detect and resolve anomalies while clustering ABAC policies
M Ait El Hadj, A Khoumsi, Y Benkaouz, M Erradi
EAI Endorsed Transactions on Security and Safety 5 (16), 2018
102018
A distributed polling with probabilistic privacy
Y Benkaouz, R Guerraoui, M Erradi, F Huc
2013 IEEE 32nd International Symposium on Reliable Distributed Systems, 41-50, 2013
102013
A vertical handoff implementation in a real testbed
B Angoma, M Erradi, Y Benkaouz, A Berqia, MC Akalay
Mobile Computing 1 (1), 1-14, 2012
82012
Access control in a collaborative session in multi tenant environment
MA Madani, M Erradi, Y Benkaouz
2015 11th International Conference on Information Assurance and Security …, 2015
72015
EdgeSA: Secure Aggregation for Privacy-Preserving Federated Learning in Edge Computing
J Bouamama, Y Benkaouz, M Ouzzif
2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2023
62023
Performance analysis of WiFi/WiMax vertical handover based on media independent handover
Y Benkaouz, B Angoma, M Erradi
2012 International Conference on Multimedia Computing and Systems, 36-40, 2012
62012
Lightx: A lightweight proof-of-bandwidth transactions transfer system
I El Abid, Y Benkaouz, A Khoumsi
International Conference on Networked Systems, 144-160, 2021
52021
ABAC Based Online Collaborations in the Cloud
MA Madani, M Erradi, Y Benkaouz
International Conference on Emerging Technologies for Developing Countries …, 2017
52017
Distributed privacy-preserving data aggregation via anonymization
Y Benkaouz, M Erradi, B Freisleben
International Conference on Networked Systems, 94-108, 2015
52015
A distributed protocol for privacy preserving aggregation
Y Benkaouz, M Erradi
International Conference on Networked Systems, 221-232, 2013
52013
The system can't perform the operation now. Try again later.
Articles 1–20