A methodology and toolkit for deploying reliable security policies in critical infrastructures F Jaïdi, F Labbene Ayachi, A Bouhoula Security and Communication Networks 2018 (1), 7142170, 2018 | 14 | 2018 |
Rbac+: Dynamic access control for rbac-administered web-based databases A Bouchahda, N Le Thanh, A Bouhoula, F Labbene 2010 Fourth international conference on emerging security information …, 2010 | 14 | 2010 |
Enforcing Access Control to Web Databases A Bouchahda, N Le Thanh, A Bouhoula, F Labbene 2010 10th IEEE International Conference on Computer and Information …, 2010 | 14 | 2010 |
Advanced techniques for deploying reliable and efficient access control: Application to E-healthcare F Jaïdi, F Labbene-Ayachi, A Bouhoula Journal of medical systems 40, 1-9, 2016 | 11 | 2016 |
An approach to formally validate and verify the compliance of low level access control policies F Jaidi, FL Ayachi 2014 IEEE 17th International Conference on Computational Science and …, 2014 | 11 | 2014 |
The problem of integrity in RBAC-based policies within relational databases: Synthesis and problem study F Jaidi, FL Ayachi Proceedings of the 9th International Conference on Ubiquitous Information …, 2015 | 10 | 2015 |
A risk awareness approach for monitoring the compliance of RBAC-based policies F Jaidi, FL Ayachi 2015 12th International Joint Conference on e-Business and …, 2015 | 9 | 2015 |
To summarize the problem of non-conformity in concrete rbac-based policies: synthesis, system proposal and future directives F Jaidi, F Labbene Ayachi NNGT International Journal of Information Security 2, 1-12, 2015 | 8 | 2015 |
A formal approach based on verification and validation techniques for enhancing the integrity of concrete role based access control policies F Jaidi, FL Ayachi International Joint Conference: CISIS’15 and ICEUTE’15, 53-64, 2015 | 7 | 2015 |
A reverse engineering and model transformation approach for RBAC-administered databases F Jaidi, F Labbene Ayachi 13th International Conference on High Performance Computing & Simulation, HPCS, 2015 | 5 | 2015 |
Enforcing a risk assessment approach in access control policies management: analysis, correlation study and model enhancement PA Evina, FL Ayachi, F Jaïdi, A Bouhoula 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 4 | 2019 |
A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment. F Jaidi, FL Ayachi, A Bouhoula SCSS, 120-132, 2017 | 4 | 2017 |
An access control model for web databases A Bouchahda-Ben Tekaya, N Le Thanh, A Bouhoula, F Labbene-Ayachi IFIP Annual Conference on Data and Applications Security and Privacy, 287-294, 2010 | 2 | 2010 |
Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems. PA Evina, FL Ayachi, F Jaidi, A Bouhoula SCSS, 77-82, 2017 | 1 | 2017 |