@conference {L{\textquoteright}Amrani2017736, title = {Identity management systems: Laws of identity for models7 evaluation}, booktitle = {Colloquium in Information Science and Technology, CIST}, year = {2017}, note = {cited By 0}, pages = {736-740}, abstract = {The digital identity is the representation of an active entity (Person, actor), it{\textquoteright}s used by most systems to allow access to resources. When users are involved in many domains they should hardly remember a lot of authentication criterions for every access. They exist many identity management systems that aim to solve the issues in relation with digital identity. However, the problem of identification process and Cross-Domain target the digital identity use. In this work, we analyze the existing identity management systems within the laws of identity, which make a roadmap for managing the identities migration cross-domain. A comparative study between identity management systems based on the laws of identity as evaluation criteria of those systems is the main of this work. {\textcopyright} 2016 IEEE.}, doi = {10.1109/CIST.2016.7804984}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85010194106\&doi=10.1109\%2fCIST.2016.7804984\&partnerID=40\&md5=ce22c4c9d844e8bb028241fc0debd7b6}, author = {L{\textquoteright}Amrani, H.a and Berroukech, B.E.b and El Bouzekri El Idrissi, Y.b and Ajhoun, R.a} } @conference {Sara2016244, title = {Time aware recommendation}, booktitle = {Proceedings - 6th International Conference on Information and Communication Technology for the Muslim World, ICT4M 2016}, year = {2016}, note = {cited By 0}, pages = {244-247}, abstract = {The overload of information can become a significant challenge in relation to information retrieval systems. Often users will need to carry out extensive research to get the information they desire. This issue will only become more challenging as the quantity of data available on the internet increases. This increase shows no signs of slowing down and inevitably demands better solutions. One such solution proposed in this paper will look at the quality of the service discovery, such as adaptation customizing recommendation. In our project we considered ways to customize the contextual recommendation by creating a time awareness system. {\textcopyright} 2016 IEEE.}, doi = {10.1109/ICT4M.2016.75}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85013052828\&doi=10.1109\%2fICT4M.2016.75\&partnerID=40\&md5=2f395fcbdfe337e52f75ed942f05dffe}, author = {Sara, A.a and El Bouzekri El Idrissi, Y.b and Ajhoun, R.a} } @conference {L{\textquoteright}Amrani201556, title = {The security of web services: Secure communication and identity management}, booktitle = {CEUR Workshop Proceedings}, volume = {1580}, year = {2015}, note = {cited By 0}, pages = {56-60}, abstract = {Service Oriented Architectures have become the new trend in the world of communication on the web. Especially web services are the high-performance specification of service-oriented architectures. The use of confidential data on the Web becomes the primary problem in the secure communication over the web. The solution proposed in this paper is a secure communication tool OCS based on the principals of SAML standard and Single Sign-On. Our solution proposes a new approach which collaborates strong points of SAML standard and single sign-on method. The implementation of this approach is in the form of a platform or a tool which provide a secure communication between web services. Thus, a future approach that exceeds the level of authentication and address the level of access control, likewise and as a further step, prepare an evaluation of the most important technologies which provide Single Sign-On possibility and secure communication context between heterogeneous web services.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84977540481\&partnerID=40\&md5=947fc7d5e6948e0dbe24131531e28dc1}, author = {L{\textquoteright}Amrani, H.a and El Bouzekri El Idrissi, Y.b and Ajhoun, R.a} }