Dynamic risk-based decision methods for access control systems RA Shaikh, K Adi, L Logrippo computers & security 31 (4), 447-464, 2012 | 82 | 2012 |
A semantic-based classification approach for an enhanced spam detection N Saidani, K Adi, MS Allili Computers & Security 94, 101716, 2020 | 72 | 2020 |
A new logic for electronic commerce protocols K Adi, M Debbabi, M Mejri Theoretical Computer Science 291 (3), 223-283, 2003 | 64 | 2003 |
A framework for risk assessment in access control systems H Khambhammettu, S Boulares, K Adi, L Logrippo Computers & Security 39, 86-103, 2013 | 57 | 2013 |
A data classification method for inconsistency and incompleteness detection in access control policy sets RA Shaikh, K Adi, L Logrippo International Journal of Information Security 16, 91-113, 2017 | 56 | 2017 |
Validation of consistency and completeness of access control policy sets RA Shaikh, K Adi, L Logrippo, S Mankovskii US Patent 8,904,472, 2014 | 44 | 2014 |
UACML: Unified access control modeling language N Slimani, H Khambhammettu, K Adi, L Logrippo 2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011 | 42 | 2011 |
Risk analysis in access control systems J Ma, K Adi, M Mejri, L Logrippo 2010 Eighth International Conference on Privacy, Security and Trust, 160-166, 2010 | 31 | 2010 |
Typing for conflict detection in access control policies K Adi, Y Bouzida, I Hattak, L Logrippo, S Mankovskii E-Technologies: Innovation in an Open World: 4th International Conference …, 2009 | 29 | 2009 |
Designing flexible access control models for the cloud S Khamadja, K Adi, L Logrippo Proceedings of the 6th International Conference on Security of Information …, 2013 | 27 | 2013 |
An efficient intrusion detection in resource-constrained mobile ad-hoc networks M Bouhaddi, MS Radjef, K Adi Computers & Security 76, 156-177, 2018 | 25 | 2018 |
Automatic security policy enforcement in computer systems K Adi, L Hamza, L Pene computers & security 73, 156-171, 2018 | 25 | 2018 |
Inconsistency detection method for access control policies RA Shaikh, K Adi, L Logrippo, S Mankovski 2010 Sixth International Conference on Information Assurance and Security …, 2010 | 25 | 2010 |
Efficient certificateless web-of-trust model for public-key authentication in MANET K Hamouid, K Adi Computer Communications 63, 24-39, 2015 | 24 | 2015 |
Risk-based decision method for access control systems RA Shaikh, K Adi, L Logrippo, S Mankovski 2011 Ninth Annual International Conference on Privacy, Security and Trust …, 2011 | 23 | 2011 |
Formal enforcement of security policies on concurrent systems M Langar, M Mejri, K Adi Journal of Symbolic Computation 46 (9), 997-1016, 2011 | 21 | 2011 |
Privacy-aware authentication scheme for electric vehicle in-motion wireless charging K Hamouid, K Adi 2020 International Symposium on Networks, Computers and Communications …, 2020 | 18 | 2020 |
Using edit automata for rewriting-based security enforcement H Ould-Slimane, M Mejri, K Adi Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working …, 2009 | 18 | 2009 |
Detecting incompleteness in access control policies using data classification schemes RA Shaikh, K Adi, L Logrippo, S Mankovski 2010 Fifth International Conference on Digital Information Management (ICDIM …, 2010 | 14 | 2010 |
An auto-learning approach for network intrusion detection A Boulaiche, K Adi Telecommunication Systems 68, 277-294, 2018 | 13 | 2018 |