The SCEAS System
Navigation Menu

Search the dblp DataBase


Anas Abou El Kalam: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Anas Abou El Kalam, Yves Deswarte
    Privacy Requirements Implemented with a JavaCard. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:527-536 [Conf]
  2. Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier
    Smartcard-based Anonymization. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2004, pp:49-66 [Conf]
  3. Anas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida, Frédéric Cuppens, Claire Saurel, Philippe Balbiani, Yves Deswarte, Gilles Trouessin
    Organization based access contro. [Citation Graph (0, 0)][DBLP]
    POLICY, 2003, pp:120-0 [Conf]
  4. Anas Abou El Kalam, Yves Deswarte
    Security Model for Health Care Computing and Communication Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:277-288 [Conf]
  5. Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier
    A generic approach for healthcare data anonymization. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:31-32 [Conf]
  6. Yves Deswarte, Anas Abou El Kalam
    Modèle de sécurité pour le secteur de la santé. [Citation Graph (0, 0)][DBLP]
    Technique et Science Informatiques, 2004, v:23, n:3, pp:291-321 [Journal]
  7. Anas Abou El Kalam, Yves Deswarte, Amine Baïna, Mohamed Kaâniche
    Access Control for Collaborative Systems: A Web Services Based Approach. [Citation Graph (0, 0)][DBLP]
    ICWS, 2007, pp:1064-1071 [Conf]

  8. Manipulation of Network Traffic Traces for Security Evaluation. [Citation Graph (, )][DBLP]

  9. Defining categories to select representative attack test-cases. [Citation Graph (, )][DBLP]

  10. The CRUTIAL Architecture for Critical Information Infrastructures. [Citation Graph (, )][DBLP]

  11. Execution Patterns in Automatic Malware and Human-Centric Attacks. [Citation Graph (, )][DBLP]

  12. A Policy Language for Modelling Recommendations. [Citation Graph (, )][DBLP]

  13. Critical Infrastructures Security Modeling, Enforcement and Runtime Checking. [Citation Graph (, )][DBLP]

  14. A research challenge in modeling access control policies: Modeling recommendations. [Citation Graph (, )][DBLP]

  15. Q-ESP: A QoS-Compliant Security Protocol to Enrich IPSec Framework. [Citation Graph (, )][DBLP]

  16. EESP: A Security protocol that supports QoS management. [Citation Graph (, )][DBLP]

  17. Access control for cooperative systems: A comparative analysis. [Citation Graph (, )][DBLP]

  18. Extending Firewall Session Table to Accelerate NAT, QoS Classification and Routing [Citation Graph (, )][DBLP]

  19. Q-ESP: a QoS-compliant Security Protocol to enrich IPSec Framework [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002