Wassim Itani
Wassim Itani
Associate Professor of Electrical and Computer Engineering, Beirut Arab University
Verified email at bau.edu.lb
Title
Cited by
Cited by
Year
Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures
W Itani, A Kayssi, A Chehab
2009 Eighth IEEE International Conference on Dependable, Autonomic and …, 2009
3742009
Energy-efficient incremental integrity for securing storage in mobile cloud computing
W Itani, A Kayssi, A Chehab
2010 International Conference on Energy Aware Computing, 1-2, 2010
932010
J2ME application-layer end-to-end security for m-commerce
W Itani, A Kayssi
Journal of Network and Computer Applications 27 (1), 13-32, 2004
582004
J2ME end-to-end security for M-commerce
W Itani, AI Kayssi
2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003. 3, 2015-2020, 2003
322003
Sine: Cache-friendly integrity for the web
C Gaspard, S Goldberg, W Itani, E Bertino, C Nita-Rotaru
2009 5th IEEE Workshop on Secure Network Protocols, 7-12, 2009
302009
CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks
A Tajeddine, A Kayssi, A Chehab, I Elhajj, W Itani
Sensors 15 (2), 3299-3333, 2015
272015
SPECSA: a scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applications
W Itani, A Kayssi
Computer communications 27 (18), 1825-1839, 2004
242004
PUMAP: A PUF-based ultra-lightweight mutual-authentication RFID protocol
R Bassil, W El-Beaino, W Itani, A Kayssi, A Chehab
International Journal of RFID Security and Cryptography 1 (1/2), 58-66, 2012
192012
ServBGP: BGP-inspired autonomic service routing for multi-provider collaborative architectures in the cloud
W Itani, C Ghali, R Bassil, A Kayssi, A Chehab
Future Generation Computer Systems 32, 99-117, 2014
142014
Security analysis and solution for thwarting cache poisoning attacks in the Domain Name System
R Bassil, R Hobeica, W Itani, C Ghali, A Kayssi, A Chehab
Telecommunications (ICT), 2012 19th International Conference on, 1-6, 2012
142012
Power management in virtualized data centers: state of the art
A Al-Dulaimy, W Itani, A Zekri, R Zantout
Journal of Cloud Computing 5 (1), 6, 2016
112016
Type-aware virtual machine management for energy efficient cloud data centers
A Al-Dulaimy, W Itani, R Zantout, A Zekri
Sustainable Computing: Informatics and Systems 19, 185-203, 2018
102018
Type-aware virtual machine management for energy efficient cloud data centers
A Al-Dulaimy, W Itani, R Zantout, A Zekri
Sustainable Computing: Informatics and Systems 19, 185-203, 2018
102018
Reputation as a Service: A System for Ranking Service Providers in Cloud Systems
W Itani, C Ghali, A Kayssi, A Chehab
Security, Privacy and Trust in Cloud Systems, 375-406, 2014
102014
Accountable Reputation Ranking Schemes for Service Providers in Cloud Computing.
W Itani, C Ghali, AI Kayssi, A Chehab
CLOSER, 49-55, 2011
102011
An enterprise policy-based security protocol for protecting relational database network objects
W Itani, A Kayssi, A Chehab
Proceedings of the 2006 international conference on Wireless communications …, 2006
102006
Energy-efficient platform-as-a-service security provisioning in the cloud
W Itani, A Chehab, A Kayssi
2011 International Conference on Energy Aware Computing, 1-6, 2011
92011
Job classification in cloud computing: the classification effects on energy efficiency
A Aldulaimy, R Zantout, A Zekri, W Itani
2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing …, 2015
82015
Job submission in the cloud: energy aware approaches
A Al-Dulaimy, R Zantout, W Itani, A Zekri
Proceedings of the World Congress on Engineering and Computer Science 1, 2016
72016
SNUAGE: an efficient platform-as-a-service security framework for the cloud
W Itani, A Kayssi, A Chehab
Cluster Computing 16 (4), 707-724, 2013
72013
The system can't perform the operation now. Try again later.
Articles 1–20