Publications

Export 20 results:
Filters: Auteur is El Bakkali, H.  [Clear All Filters]
2017
O. Iraqi et H. Bakkali, E., « Toward third-party immune applications », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10446 LNCS, p. 348-359, 2017.
M. Alouane et H. Bakkali, E., « Virtualization in Cloud Computing: Existing solutions and new approach », in Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016, 2017, p. 116-123.
2016
S. Sadki et H. Bakkali, E., « Resolving conflicting privacy policies in M-health based on prioritization », Scalable Computing, vol. 17, p. 207-226, 2016.
M. Alouane et H. Bakkali, E., « Virtualization in Cloud Computing: NoHype vs HyperWall new approach », in Proceedings of 2016 International Conference on Electrical and Information Technologies, ICEIT 2016, 2016, p. 49-54.
2015
S. Sadki et H. Bakkali, E., « An approach for privacy policies negotiation in mobile health-Cloud environments », in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, 2015.
M. Alouane et H. Bakkali, E., « Security, privacy and trust in cloud computing: A comparative study », in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, 2015.
2014
S. Sadki et H. Bakkali, E., « Towards controlled-privacy in e-health: A comparative study », in International Conference on Multimedia Computing and Systems -Proceedings, 2014, p. 674-679.
2013
E. H. Bakkali, « Enhancing workflow systems resiliency by using delegation and priority concepts », Journal of Digital Information Management, vol. 11, p. 267-276, 2013.
H. Rahimi et H. Bakkali, E., « A new reputation algorithm for evaluating trustworthiness in e-commerce context », in 2013 National Security Days - 3eme Edition Des Journees Nationales de Securite, JNS3, 2013.
2012
E. H. Bakkali, « Bypassing Workflow Satisfiability Problem Due to Access Control Constraints », Communications in Computer and Information Science, vol. 294 PART 2, p. 178-191, 2012.
A. A. El Kalam, H. Bakkali, E., et Ouadghiri, D., « Preface [Preface] », in Proceedings of the 2nd National Days of Network Security and Systems, JNS2 2012, 2012.
H. Rahimi et H. Bakkali, E., « State of the art of reputation systems in e-commerce [Etat de l'art des systèmes de réputation en e-commerce] », in Proceedings of the 2nd National Days of Network Security and Systems, JNS2 2012, 2012, p. 18-23.
H. Rahimi et H. Bakkali, E., « Towards a new design for trust reputation system », in Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012, 2012, p. 943-948.
2010
E. H. Bakkali, Hatim, H., et Berrada, I., « A new task engineering approach for workflow access control », Advances in Intelligent and Soft Computing, vol. 85, p. 203-212, 2010.
H. Hatim, H. Bakkali, E., et Berrada, I., « Workflow access control: From role engineering to task engineering », in 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010, 2010.

Partenaires

Localisation


Location map

Suivez-nous sur

  

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

Résultat de recherche d'images pour "icone fax" Télécopie : (+212) 5 37 77 72 30

    Compteur de visiteurs:274,286
    Education - This is a contributing Drupal Theme
    Design by WeebPal.