Follow
Yahya Benkaouz
Yahya Benkaouz
Professor of Computer Science, FSR, Mohammed V University, Morocco
Verified email at um5s.net.ma
Title
Cited by
Cited by
Year
Work in progress: K-nearest neighbors techniques for abac policies clustering
Y Benkaouz, M Erradi, B Freisleben
Proceedings of the 2016 ACM International Workshop on Attribute Based Access …, 2016
332016
HaVe-2W3G: A vertical handoff solution between WLAN, WiMAX and 3G networks
B Angoma, M Erradi, Y Benkaouz, A Berqia, MC Akalay
2011 7th International Wireless Communications and Mobile Computing …, 2011
302011
Clustering-based Approach for Anomaly Detection in XACML Policies.
MA El Hadj, M Ayache, Y Benkaouz, A Khoumsi, M Erradi
SECRYPT, 548-553, 2017
182017
A distributed protocol for privacy preserving aggregation with non-permanent participants
Y Benkaouz, M Erradi
Computing 97, 893-912, 2015
152015
Robust p2p personalized learning
K Boubouh, A Boussetta, Y Benkaouz, R Guerraoui
2020 International Symposium on Reliable Distributed Systems (SRDS), 299-308, 2020
102020
A Collaborative Task Role Based Access Control Model.
MA Madani, M Erradi, Y Benkaouz
Journal of Information Assurance & Security 11 (6), 2016
102016
A distributed polling with probabilistic privacy
Y Benkaouz, R Guerraoui, M Erradi, F Huc
2013 IEEE 32nd International Symposium on Reliable Distributed Systems, 41-50, 2013
102013
Formal approach to detect and resolve anomalies while clustering ABAC policies
MA El Hadj, A Khoumsi, Y Benkaouz, M Erradi
EAI Endorsed Transactions on Security and Safety 5 (16), e3-e3, 2018
92018
Validation and correction of large security policies: A clustering and access log based approach
MA El Hadj, M Erradi, A Khoumsi, Y Benkaouz
2018 IEEE international conference on big Data (Big Data), 5330-5332, 2018
82018
Towards a Decentralized OSN for a Privacy-preserving e-health System
Y Benkaouz, M Erradi
Procedia Computer Science 63, 284-291, 2015
82015
Efficient security policy management using suspicious rules through access log analysis
M Ait El Hadj, A Khoumsi, Y Benkaouz, M Erradi
Networked Systems: 7th International Conference, NETYS 2019, Marrakech …, 2019
72019
ABAC rule reduction via similarity computation
M Ait El Hadj, Y Benkaouz, B Freisleben, M Erradi
Networked Systems: 5th International Conference, NETYS 2017, Marrakech …, 2017
72017
A vertical handoff implementation in a real testbed
B Angoma, M Erradi, Y Benkaouz, A Berqia, MC Akalay
Mobile Computing 1 (1), 1-14, 2012
72012
A distributed protocol for privacy preserving aggregation
Y Benkaouz, M Erradi
Networked Systems: First International Conference, NETYS 2013, Marrakech …, 2013
62013
Performance analysis of WiFi/WiMax vertical handover based on media independent handover
Y Benkaouz, B Angoma, M Erradi
2012 International Conference on Multimedia Computing and Systems, 36-40, 2012
62012
Access control in a collaborative session in multi tenant environment
MA Madani, M Erradi, Y Benkaouz
2015 11th International Conference on Information Assurance and Security …, 2015
52015
Nearest Neighbors Graph Construction: Peer Sampling to the Rescue
Y Benkaouz, M Erradi, AM Kermarrec
International Conference on Networked Systems, 48-62, 2016
42016
Distributed privacy-preserving data aggregation via anonymization
Y Benkaouz, M Erradi, B Freisleben
Networked Systems: Third International Conference, NETYS 2015, Agadir …, 2015
42015
ABAC Based Online Collaborations in the Cloud
MA Madani, M Erradi, Y Benkaouz
Emerging Technologies for Developing Countries: First International EAI …, 2018
32018
Initial centroid selection method for an enhanced k-means clustering algorithm
Y Aamer, Y Benkaouz, M Ouzzif, K Bouragba
Ubiquitous Networking: 5th International Symposium, UNet 2019, Limoges …, 2020
22020
The system can't perform the operation now. Try again later.
Articles 1–20