Publications

Export 20 results:
Filters: Auteur is El Bakkali, H.  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
H. Hatim, H. Bakkali, E., et Berrada, I., « Workflow access control: From role engineering to task engineering », in 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010, 2010.
E. A. Kandoussi et H. Bakkali, E., « Weighted access control policies cohabitation in distributed systems », Advances in Intelligent Systems and Computing, vol. 735, p. 350-360, 2018.
V
M. Alouane et H. Bakkali, E., « Virtualization in Cloud Computing: NoHype vs HyperWall new approach », in Proceedings of 2016 International Conference on Electrical and Information Technologies, ICEIT 2016, 2016, p. 49-54.
M. Alouane et H. Bakkali, E., « Virtualization in Cloud Computing: Existing solutions and new approach », in Proceedings of 2016 International Conference on Cloud Computing Technologies and Applications, CloudTech 2016, 2017, p. 116-123.
T
E. Z. Uahhabi et H. Bakkali, E., « Trust assessment of X.509 certificate based on certificate authority trustworthiness and its certificate policy », International Journal of Internet Technology and Secured Transactions, vol. 8, p. 103-136, 2018.
S. Sadki et H. Bakkali, E., « Towards controlled-privacy in e-health: A comparative study », in International Conference on Multimedia Computing and Systems -Proceedings, 2014, p. 674-679.
H. Rahimi et H. Bakkali, E., « Towards a new design for trust reputation system », in Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS 2012, 2012, p. 943-948.
O. Iraqi et H. Bakkali, E., « Toward third-party immune applications », Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10446 LNCS, p. 348-359, 2017.
S
H. Rahimi et H. Bakkali, E., « State of the art of reputation systems in e-commerce [Etat de l'art des systèmes de réputation en e-commerce] », in Proceedings of the 2nd National Days of Network Security and Systems, JNS2 2012, 2012, p. 18-23.
M. Alouane et H. Bakkali, E., « Security, privacy and trust in cloud computing: A comparative study », in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, 2015.
P
E. Z. Ouazzani et H. Bakkali, E., « Privacy in big data through variable t-closeness for MSN attributes », Lecture Notes in Networks and Systems, vol. 49, p. 125-141, 2019.
A. A. El Kalam, H. Bakkali, E., et Ouadghiri, D., « Preface [Preface] », in Proceedings of the 2nd National Days of Network Security and Systems, JNS2 2012, 2012.
B
E. H. Bakkali, « Bypassing Workflow Satisfiability Problem Due to Access Control Constraints », Communications in Computer and Information Science, vol. 294 PART 2, p. 178-191, 2012.
A
S. Sadki et H. Bakkali, E., « An approach for privacy policies negotiation in mobile health-Cloud environments », in Proceedings of 2015 International Conference on Cloud Computing Technologies and Applications, CloudTech 2015, 2015.

Partenaires

Localisation


Location map

Suivez-nous sur

  

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

Résultat de recherche d'images pour "icone fax" Télécopie : (+212) 5 37 77 72 30

    Compteur de visiteurs:321,769
    Education - This is a contributing Drupal Theme
    Design by WeebPal.