Yahya Benkaouz
Yahya Benkaouz
Professor of Computer Science, FSR, Mohammed V University, Morocco
Verified email at um5s.net.ma
Title
Cited by
Cited by
Year
HaVe-2W3G: A vertical handoff solution between WLAN, WiMAX and 3G networks
B Angoma, M Erradi, Y Benkaouz, A Berqia, MC Akalay
2011 7th International Wireless Communications and Mobile Computing …, 2011
312011
Work in progress: K-nearest neighbors techniques for abac policies clustering
Y Benkaouz, M Erradi, B Freisleben
Proceedings of the 2016 ACM International Workshop on Attribute Based Access …, 2016
232016
A distributed protocol for privacy preserving aggregation with non-permanent participants
Y Benkaouz, M Erradi
Computing 97 (9), 893-912, 2015
142015
A distributed polling with probabilistic privacy
Y Benkaouz, R Guerraoui, M Erradi, F Huc
2013 IEEE 32nd International Symposium on Reliable Distributed Systems, 41-50, 2013
92013
A vertical handoff implementation in a real testbed
B Angoma, M Erradi, Y Benkaouz, A Berqia, MC Akalay
Mobile Computing 1 (1), 1-14, 2012
72012
Performance analysis of WiFi/WiMax vertical handover based on media independent handover
Y Benkaouz, B Angoma, M Erradi
2012 International Conference on Multimedia Computing and Systems, 36-40, 2012
62012
Clustering-based Approach for Anomaly Detection in XACML Policies.
MA El Hadj, M Ayache, Y Benkaouz, A Khoumsi, M Erradi
SECRYPT, 548-553, 2017
52017
A Collaborative Task Role Based Access Control Model.
MA Madani, M Erradi, Y Benkaouz
Journal of Information Assurance & Security 11 (6), 2016
52016
Towards a Decentralized OSN for a Privacy-preserving e-health System
Y Benkaouz, M Erradi
Procedia Computer Science 63, 284-291, 2015
52015
A distributed protocol for privacy preserving aggregation
Y Benkaouz, M Erradi
International Conference on Networked Systems, 221-232, 2013
52013
Efficient security policy management using suspicious rules through access log analysis
MA El Hadj, A Khoumsi, Y Benkaouz, M Erradi
International Conference on Networked Systems, 250-266, 2019
42019
Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach
MA El Hadj, M Erradi, A Khoumsi, Y Benkaouz
2018 IEEE International Conference on Big Data (Big Data), 5330-5332, 2018
42018
Distributed privacy-preserving data aggregation via anonymization
Y Benkaouz, M Erradi, B Freisleben
International Conference on Networked Systems, 94-108, 2015
42015
Formal Approach to Detect and Resolve Anomalies while Clustering ABAC Policies
MA El Hadj, A Khoumsi, Y Benkaouz, M Erradi
EAI Endorsed Transactions on Security and Safety 5 (16), 2018
32018
Access control in a collaborative session in multi tenant environment
MA Madani, M Erradi, Y Benkaouz
2015 11th International Conference on Information Assurance and Security …, 2015
32015
Access Domain-Based Approach for Anomaly Detection and Resolution in XACML Policies
MA El Hadj, Y Benkaouz, A Khoumsi, M Erradi
International Conference on Innovations in Bio-Inspired Computing and …, 2017
12017
ABAC rule reduction via similarity computation
MA El Hadj, Y Benkaouz, B Freisleben, M Erradi
International Conference on Networked Systems, 86-100, 2017
12017
ABAC Based Online Collaborations in the Cloud
MA Madani, M Erradi, Y Benkaouz
International Conference on Emerging Technologies for Developing Countries …, 2017
12017
Nearest Neighbors Graph Construction: Peer Sampling to the Rescue
Y Benkaouz, M Erradi, AM Kermarrec
International Conference on Networked Systems, 48-62, 2016
12016
ANALYSE DU COMPORTEMENT DU HANDOVER VERTICAL SELON UNE VARIETE DE PROTOCOLES DE TRANSPORT
B Angoma, Y Benkaouz, MC Akalay, A Berqia, M Erradi
Revue Méditerranéenne des Télécommunications 1 (1), 2011
12011
The system can't perform the operation now. Try again later.
Articles 1–20