Kamel Adi
Kamel Adi
Professor of Computer Science, Université du Québec en Outaouais
Verified email at
Cited by
Cited by
Dynamic risk-based decision methods for access control systems
RA Shaikh, K Adi, L Logrippo
computers & security 31 (4), 447-464, 2012
A new logic for electronic commerce protocols
K Adi, M Debbabi, M Mejri
Theoretical Computer Science 291 (3), 223-283, 2003
A semantic-based classification approach for an enhanced spam detection
N Saidani, K Adi, MS Allili
Computers & Security 94, 101716, 2020
A data classification method for inconsistency and incompleteness detection in access control policy sets
RA Shaikh, K Adi, L Logrippo
International Journal of Information Security 16, 91-113, 2017
A framework for risk assessment in access control systems
H Khambhammettu, S Boulares, K Adi, L Logrippo
computers & security 39, 86-103, 2013
UACML: Unified access control modeling language
N Slimani, H Khambhammettu, K Adi, L Logrippo
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
Validation of consistency and completeness of access control policy sets
RA Shaikh, K Adi, L Logrippo, S Mankovskii
US Patent 8,904,472, 2014
Risk analysis in access control systems
J Ma, K Adi, M Mejri, L Logrippo
2010 Eighth International Conference on Privacy, Security and Trust, 160-166, 2010
Typing for conflict detection in access control policies
K Adi, Y Bouzida, I Hattak, L Logrippo, S Mankovskii
E-Technologies: Innovation in an Open World: 4th International Conference …, 2009
Inconsistency detection method for access control policies
RA Shaikh, K Adi, L Logrippo, S Mankovski
2010 Sixth International Conference on Information Assurance and Security …, 2010
Efficient certificateless web-of-trust model for public-key authentication in MANET
K Hamouid, K Adi
Computer Communications 63, 24-39, 2015
Designing flexible access control models for the cloud
S Khamadja, K Adi, L Logrippo
Proceedings of the 6th International Conference on Security of Information …, 2013
An efficient intrusion detection in resource-constrained mobile ad-hoc networks
M Bouhaddi, MS Radjef, K Adi
Computers & Security 76, 156-177, 2018
Risk-based decision method for access control systems
RA Shaikh, K Adi, L Logrippo, S Mankovski
2011 Ninth Annual International Conference on Privacy, Security and Trust …, 2011
Formal enforcement of security policies on concurrent systems
M Langar, M Mejri, K Adi
Journal of Symbolic Computation 46 (9), 997-1016, 2011
Automatic security policy enforcement in computer systems
K Adi, L Hamza, L Pene
computers & security 73, 156-171, 2018
Using edit automata for rewriting-based security enforcement
H Ould-Slimane, M Mejri, K Adi
Data and Applications Security XXIII: 23rd Annual IFIP WG 11.3 Working …, 2009
Privacy-aware authentication scheme for electric vehicle in-motion wireless charging
K Hamouid, K Adi
2020 International Symposium on Networks, Computers and Communications …, 2020
An auto-learning approach for network intrusion detection
A Boulaiche, K Adi
Telecommunication Systems 68, 277-294, 2018
Detecting incompleteness in access control policies using data classification schemes
RA Shaikh, K Adi, L Logrippo, S Mankovski
2010 Fifth International Conference on Digital Information Management (ICDIM …, 2010
The system can't perform the operation now. Try again later.
Articles 1–20