@conference { ISI:000367072600061, title = {Modeling and Enforcing Security and Service Control Policies using FlexRFID Middleware Healthcare Scenarios}, booktitle = {2014 SCIENCE AND INFORMATION CONFERENCE (SAI)}, year = {2014}, note = {Science and Information Conference (SAI), Sci \& Informat Org, London, ENGLAND, AUG 27-29, 2014}, pages = {461-467}, publisher = {Microsoft; RK Trans2Cloud; Springer; IEEE Comp Soc, UKRI Sect; IEEE Computat Intelligence Soc, UKRI Sect; IEEE}, organization = {Microsoft; RK Trans2Cloud; Springer; IEEE Comp Soc, UKRI Sect; IEEE Computat Intelligence Soc, UKRI Sect; IEEE}, abstract = {RFID and WSN technologies are widely used in today{\textquoteright}s pervasive computing. In Wireless Sensor Networks, sensor nodes sense the physical environment and send the sensed data to the sink by multi-hops. WSN are used in many applications such as military and environment monitoring. In Radio Frequency Identification, a unique ID is assigned to a RFID tag which is associated with a real world object. RFID applications cover many areas such as Supply Chain Management (SCM), healthcare, library management, automatic toll collection, etc. The integration of both technologies will bring many advantages in the future of ubiquitous computing, through the provision of real-world tracking and context information about the objects. This will increase considerably the automation of an information system. In order to process the large volume of data captured by sensors and RFID readers in real time, a middleware solution is needed. This middleware should be designed in a way to allow the aggregation, filtering and grouping of the data captured by the hardware devices before sending them to the backend applications. In this paper we demonstrate how our middleware solution called FlexRFID handles large amount of RFID and sensor scan data, and executes applications{\textquoteright} business rules in real time through its policy-based Business Rules layer. The FlexRFID middleware provides easy addition and removal of hardware devices that capture data, as well as uses the business rules of the applications to control all its services. We demonstrate how the middleware controls some defined healthcare scenarios, and deals with the access control security concern to sensitive healthcare data through the use of policies.}, isbn = {978-0-9893193-1-7}, author = {El Khaddar, Mehdia Ajana and Chraibi, Mhammed and Harroud, Hamid and Boulmalf, Mohammed and Elkoutbi, Mohammed and Maach, Abdelilah} } @conference { ISI:000378641000047, title = {Policy Based Security Middleware as a Service}, booktitle = {2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD)}, year = {2014}, note = {2nd International Conference on Future Internet of Things and Cloud (FiCloud), Barcelona, SPAIN, AUG 27-29, 2014}, pages = {322-327}, publisher = {IEEE Comp Soc, Tech Comm Internet; IEEE Comp Soc}, organization = {IEEE Comp Soc, Tech Comm Internet; IEEE Comp Soc}, abstract = {Cloud computing is amongst the major topics researched in Computer Science. Cloud computing security is at the heart of the topic. The reason behind this is that, as a technology, cloud computing is a great alternative that allows companies to outsource the management of their computing resources. However, due to the security issues, the cloud technology is not reaching its full potential. In this paper we present a system that allows the enforcement of privacy, accountability, integrity, and availability in each one of cloud computing levels using software policies. We present and describe the architecture of the Policy-Based Security Middleware as a Service.}, isbn = {978-1-4799-4357-9}, doi = {10.1109/FiCloud.2014.57}, author = {Chraibi, Mhammed and Harroud, Hamid and El Khaddar, Mehdia Ajana and Elkoutbi, Mohammed and Maach, Abdelilah} } @conference { ISI:000310353000082, title = {Emerging Wireless Technologies In E-Health}, booktitle = {2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS)}, year = {2012}, note = {International Conference on Multimedia Computing and Systems (ICMCS), Tangiers, MOROCCO, MAY 10-12, 2012}, pages = {440-445}, publisher = {Morocco Sect MTT/AP Joint Chapter}, organization = {Morocco Sect MTT/AP Joint Chapter}, abstract = {In healthcare the importance of obtaining the right information, at the right time, irrespective of time and location dependency is very critical. Healthcare personnel need to access real-time medical data such as patient clinical histories, laboratory results, treatments, chronic diseases, medication, and insurance information. Therefore, healthcare is the most apt domain for the application of ubiquitous technologies. Ubiquitous health care aims at creating an environment where healthcare is available to everyone, everywhere through the use of technologies that would not only be pervasive but also be assimilated flawlessly in the daily lives. With large-scale wireless networks and mobile computing solutions, such as cellular 3G, Wi-Fi mesh, WiMAX, Bluetooth, RFID, and Wireless Sensor Networks, health care personnel can tap into vital information anywhere and at any time within the health care networks. Ubiquitous healthcare, although promising, there are myriad challenges associated with realizing its vision. This paper highlights some snapshots of current uses and future trends of various wireless communications in the healthcare domains, addresses their applications for e-health, states the challenges faced in a ubiquitous healthcare environment equipped with different wireless technologies, and how the resulting issues might be addressed by developing a framework that provides a flexible and convenient medical monitoring, consultation, and healthcare.}, isbn = {978-1-4673-1520-3}, author = {El Khaddar, Mehdia Ajana and Harroud, Hamid and Boulmalf, Mohammed and Elkoutbi, Mohammed and Habbani, Ahmed}, editor = {Essaaidi, M and Zaz, Y} }