@article {Khoumsi2016229, title = {An approach to resolve NP-hard problems of firewalls}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {9944 LNCS}, year = {2016}, note = {cited By 0}, pages = {229-243}, abstract = {Firewalls are a common solution to protect information systems from intrusions. In this paper, we apply an automata-based methodology to resolve several NP-Hard problems which have been shown in the literature to be fundamental for the study of firewall security policies. We also compute space and time complexities of our resolution methods. {\textcopyright} Springer International Publishing AG 2016.}, doi = {10.1007/978-3-319-46140-3_19}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84990038429\&doi=10.1007\%2f978-3-319-46140-3_19\&partnerID=40\&md5=cd031e8992745830e08b31671e0e3416}, author = {Khoumsi, A.a and Erradi, M.b and Ayache, M.b and Krombi, W.b} } @article {Khoumsi2016, title = {A formal basis for the design and analysis of firewall security policies}, journal = {Journal of King Saud University - Computer and Information Sciences}, year = {2016}, note = {cited By 0; Article in Press}, abstract = {A firewall is the core of a well defined network security policy. This paper presents an automata-based method to study firewall security policies. We first propose a procedure that synthesizes an automaton that describes a security policy given as a table of rules. The synthesis procedure is then used to develop procedures to detect: incompleteness, anomalies and discrepancies in security policies. A method is developed to represent the automaton by a policy qualified as mixable and that has practical utilities, such as ease to determine the whitelist and the blacklist of the policy. The developed procedures have been deeply evaluated in terms of time and space complexities. Then, a real case study has been investigated. The obtained results confirm that the developed procedures have reasonable complexities and that their actual execution times are of the order of seconds. Finally, proofs of all results are provided. {\textcopyright} 2016 King Saud University.}, doi = {10.1016/j.jksuci.2016.11.008}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85008234846\&doi=10.1016\%2fj.jksuci.2016.11.008\&partnerID=40\&md5=07a25a70cda473802a697eff8dbb8dec}, author = {Khoumsi, A.a and Erradi, M.b and Krombi, W.b} } @article {Khoumsi2015221, title = {A formal approach to verify completeness and detect anomalies in firewall security policies}, journal = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, volume = {8930}, year = {2015}, note = {cited By 1}, pages = {221-236}, abstract = {Security policies are a relevant solution to protect information systems from undue accesses. In this paper, we develop a formal and rigorous automata-based approach to design and analyze security policies. The interest of our approach is that it can be used as a common basis for analyzing several aspects of security policies, instead of using a distinct approach and formalism for studying each aspect. We first develop a procedure that synthesizes automatically an automaton which implements a given security policy. Then, we apply this synthesis procedure to verify completeness of security policies and detect several types of anomalies in security policies. We also study space and time complexities of the developed procedures. {\textcopyright} Springer International Publishing Switzerland 2015.}, doi = {10.1007/978-3-319-17040-4_14}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84928524690\&doi=10.1007\%2f978-3-319-17040-4_14\&partnerID=40\&md5=af206fc0108d0632a452dcb6750e1fd1}, author = {Khoumsi, A.a and Krombi, W.b and Erradi, M.b} } @article {Harbouche2013137, title = {Deriving multi-agent system behavior}, journal = {International Journal of Software Engineering and its Applications}, volume = {7}, number = {4}, year = {2013}, note = {cited By 1}, pages = {137-156}, abstract = {The multi-agent systems (MAS) have become a very powerful paradigm in the development of complex computer systems. The modeling of these systems can reduce this complexity during the development phases. The Model-Driven Architecture (MDA) approach can be used to resolve this problem. It allows designers to model their systems at different abstraction levels, providing them with automatic model transformations to incrementally refine abstract models into concrete ones. This paper presents a MDA approach to develop multi-agent system with the derivation of the behavior of a given system agent from its global requirements. The suggested approach is based on the definition of an appropriate requirements meta-model (Computational Independent Meta-Model CIMM) and the definition of a target design meta-model (Platform Independent Meta-model PIMM). The CIM models are specified using UML activity diagram extended with collaborations to describe the system global behavior. The agent{\textquoteright}s behavior model (PIM) is in the form of distributed UML state machines. Automatic model transformations between these two models have been designed in order to govern the derivation process. A real application of telediagnosis in neuroscience has been developed using this approach.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84884544209\&partnerID=40\&md5=b50eb063699a17d3e7b5f71c9c8137ae}, author = {Harbouche, A.a and Erradi, M.b and Mokhtari, A.c} } @conference {Sabir2013, title = {Design of an annular ring Ferry-assisted topology for Wireless Sensor Networks}, booktitle = {Proceedings of 2013 6th Joint IFIP Wireless and Mobile Networking Conference, WMNC 2013}, year = {2013}, note = {cited By 0}, abstract = {To ensure connectivity in highly sparse Wireless Sensor Networks (WSNs), we consider a Ferry-assisted Wireless Sensor Network (FWSN). In our FWSN, message ferries moving along concentric annulus collect the static sensors generated packets and propagate them throughout a ferry-to-ferry forwarding schema to the sink. Moreover, a ferry may embed a sensor and then could be assimilated to a mobile sensor node generating its own data. We provide a mathematical framework based on queuing theory to model the network and analyze its performances in terms of end-to-end throughput. Some of our findings are the characterization of the forwarding queues{\textquoteright} stability and the average end-to-end throughput as well. At stability, we notice a special feature where the average end-to-end throughput becomes independent of the choice of the weighted fair queuing. {\textcopyright} 2013 IEEE.}, doi = {10.1109/WMNC.2013.6548984}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84881399979\&doi=10.1109\%2fWMNC.2013.6548984\&partnerID=40\&md5=db7991dded90e289f75582cf59d1e214}, author = {Sabir, E.a and Kobbane, A.b and Koulali, M.-A.c and Erradi, M.b} } @conference {Ouahed201333, title = {A discovery service for automatic composition of web services oriented-agent}, booktitle = {Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE}, year = {2013}, note = {cited By 1}, pages = {33-35}, abstract = {In this paper we present an approach for automatic web service composition. The process of composition considered includes two layers; the discovery layer which aims to generate a composition schema, and the execution layer which uses a multi-agent system to select web services and execute the composite service. The main focus of this work is on the discovery layer where we propose an approach to optimize the search of the composite service. Firstly, a dependency graph is created by matching the I/O parameters of request and all available web services in register. Then a backward search is performed on this graph to choose the composition schema. The principle used for choosing services is based on the proportion of input and output parameters. Services with the highest proportion are preferred, allowing us to minimize the number of services participating in the solution. Experimentation and performance evaluation of the suggested approach are given at the end of this paper. {\textcopyright} 2013 IEEE.}, doi = {10.1109/WETICE.2013.16}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883530751\&doi=10.1109\%2fWETICE.2013.16\&partnerID=40\&md5=58ccbaef94e0989981dec058cdee4e71}, author = {Ouahed, A.K.E.a and Erradi, M.b and Azzoune, H.c} } @conference {Harbouche201344, title = {A flexible wireless body sensor network system for health monitoring}, booktitle = {Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE}, year = {2013}, note = {cited By 3}, pages = {44-49}, abstract = {The Wireless Body Sensor Network (WBSN) is a wireless network used for communication among sensor nodes operating on or inside the human body in order to monitor vital body parameters and movements. The design and the development of such systems for health monitoring have gained a lot of attention recently in both the research and the industry. Mainly motivated by the increasing of healthcare costs and propelled by the recent advances in the development of miniature health monitoring devices. This paper presents a preventive health care system with a flexible design. By using sensors nodes in combination with a mobile data collector, both daily continuous monitoring as well as specific controls are provided. In this work, we propose a system based on an architecture with heterogeneous nodes to provide continuous monitoring. A model has been defined to describe the system global behavior. An important aspect of this work is that we propose a model driven (MDE) approach to derive the behavior of each node in the network from the system global behavior. The derived behaviors include the synchronization messages to ensure the global coordination among the system components. {\textcopyright} 2013 IEEE.}, doi = {10.1109/WETICE.2013.17}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883508266\&doi=10.1109\%2fWETICE.2013.17\&partnerID=40\&md5=1a5fad127161b3ce2aa9c892e0441504}, author = {Harbouche, A.a and Erradi, M.b and Kobbane, A.b} }