Follow
BENZEKRI
BENZEKRI
Abdelmalek
Verified email at irit.fr
Title
Cited by
Cited by
Year
Towards automated negotiation of access control policies
VG Bharadwaj, JS Baras
Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for …, 2003
91*2003
A SET based approach to secure the payment in mobile commerce
A Fourati, HKB Ayed, F Kamoun, A Benzekri
27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings …, 2002
472002
A formal approach for the evaluation of network security mechanisms based on RBAC policies
R Laborde, B Nasser, F Grasset, F Barrère, A Benzekri
Electronic Notes in Theoretical Computer Science 121, 117-142, 2005
462005
A user-centric identity management framework based on the W3C verifiable credentials and the FIDO universal authentication framework
R Laborde, A Oglaza, S Wazan, F Barrere, A Benzekri, DW Chadwick, ...
2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC …, 2020
342020
Implementation of a formal security policy refinement process in WBEM architecture
R Laborde, M Kamel, F Barrère, A Benzekri
Journal of Network and Systems Management 15, 241-266, 2007
272007
Toward authorization as a service: a study of the XACML standard
R Laborde, F Barrère, A Benzekri
16th Communications and Networking Symposium (CNS 2013) in 2013 Spring …, 2013
202013
A formal model of trust for calculating the quality of X.509 certificate
AS Wazan, R Laborde, F Barrere, AM Benzekri
Security and Communication Networks, 2011
202011
Access control model for inter-organizational grid virtual organizations
B Nasser, R Laborde, A Benzekri, F Barrère, M Kamel
On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops: OTM …, 2005
202005
A formal model of trust for calculating the quality of X.509 certificate
AS Wazan, R Laborde, F Barrere, AM Benzekri
20*
Specification and enforcement of dynamic authorization policies oriented by situations
B Kabbani, R Laborde, F Barrere, A Benzekri
2014 6th International Conference on New Technologies, Mobility and Security …, 2014
182014
Dynamic creation of inter-organizational grid virtual organizations
B Nasser, R Laborde, A Benzekri, F Barrère, M Kamel
First International Conference on e-Science and Grid Computing (e-Science'05 …, 2005
182005
A multi-domain security policy distribution architecture for dynamic IP based VPN management
F Barrere, A Benzekri, F Grasset, R Laborde
Proceedings Third International Workshop on Policies for Distributed Systems …, 2002
172002
Trust management for public key infrastructures: Implementing the X. 509 trust broker
AS Wazan, R Laborde, DW Chadwick, F Barrere, A Benzekri, M Kaiiali, ...
Security and Communication Networks 2017, 2017
162017
The X. 509 trust model needs a technical and legal expert
AS Wazan, R Laborde, F Barrere, A Benzekri
2012 IEEE International Conference on Communications (ICC), 6895-6900, 2012
152012
Tls connection validation by web browsers: Why do web browsers still not agree?
AS Wazan, R Laborde, DW Chadwick, F Barrère, A Benzekri
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017
142017
An extensible XACML authorization decision engine for context aware applications
M Cheaito, R Laborde, F Barrère, A Benzekri
2009 Joint Conferences on Pervasive Computing (JCPC), 377-382, 2009
132009
A secure collaborative web-based environment for virtual organisations
R Laborde, M Kamel, S Wazan, F Barrere, A Benzekri
International Journal of Web Based Communities 5 (2), 273-292, 2009
132009
Validating X. 509 certificates based on their quality
AS Wazan, R Laborde, F Barrère, A Benzekri
2008 The 9th International Conference for Young Computer Scientists, 2055-2060, 2008
132008
Network security management: A formal evaluation tool based on RBAC policies
R Laborde, B Nasser, F Grasset, F Barrère, A Benzekri
Network Control and Engineering for QoS, Security and Mobility, III: IFIP …, 2005
132005
On the Validation of Web X. 509 Certificates by TLS interception products
AS Wazan, R Laborde, DW Chadwick, R Venant, A Benzekri, E Billoir, ...
IEEE Transactions on Dependable and Secure Computing 19 (1), 227-242, 2020
122020
The system can't perform the operation now. Try again later.
Articles 1–20