Search the dblp DataBase
Abdelmalek Benzekri :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Osman Salem , Abdelmalek Benzekri Towards Absolute End-to-End QoS in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] AICT/ICIW, 2006, pp:18- [Conf ] Ramón Puigjaner , Abdelmalek Benzekri , Sandra Ayache Estimation Process of Performance Constraints during the design of Real-Time & Embedded Systems [Citation Graph (0, 0)][DBLP ] CAiSE, 1993, pp:629-648 [Conf ] Bassem Nasser , Romain Laborde , Abdelmalek Benzekri , François Barrère , Michel Kamel Dynamic Creation of Inter-Organizational Grid Virtual Organizations. [Citation Graph (0, 0)][DBLP ] e-Science, 2005, pp:405-412 [Conf ] F. Maurice , Abdelmalek Benzekri , Yves Raynaud Evaluation and Improvement of Software Products and Processes based on Measurement. [Citation Graph (0, 0)][DBLP ] HASE, 1997, pp:108-113 [Conf ] Jean-Michel Bruel , Robert B. France , Abdelmalek Benzekri A Z-based Approach to Specifying and Analyzing Complex Systems. [Citation Graph (0, 0)][DBLP ] ICECCS, 1996, pp:336-343 [Conf ] Bassem Nasser , Abdelmalek Benzekri , Romain Laborde , Frédéric Grasset , François Barrère Access Control Model for Grid Virtual Organizations. [Citation Graph (0, 0)][DBLP ] ICEIS (3), 2005, pp:152-158 [Conf ] Romain Laborde , François Barrère , Abdelmalek Benzekri A Security Management Information Model Derivation Framework: From Goals to Configurations. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2005, pp:217-234 [Conf ] Omar Hjiej , Abdelmalek Benzekri , Alberto Valderruten From Annotated LOTOS Specifications to Queueing Networks: Automating Performance Models Derivation. [Citation Graph (0, 0)][DBLP ] Decentralized and Distributed Systems, 1993, pp:401-412 [Conf ] Rima Abdallah , Abdelmalek Benzekri , Ali El Hajj , Ibrahim Moukarzel Learner and Course Interoperability in a Web Based Training Model. [Citation Graph (0, 0)][DBLP ] Information Technology in Educational Management, 2002, pp:119-127 [Conf ] Alia Fourati , Hella Kaffel Ben Ayed , Farouk Kamoun , Abdelmalek Benzekri Wireless set: an approach for the deployment of set over WAP mobile networks. [Citation Graph (0, 0)][DBLP ] Net-Con, 2002, pp:437-442 [Conf ] Alia Fourati , Hella Kaffel Ben Ayed , Farouk Kamoun , Abdelmalek Benzekri A SET Based Approach to Secure the Payment in Mobile Commerce. [Citation Graph (0, 0)][DBLP ] LCN, 2002, pp:136-140 [Conf ] F. Maurice , Abdelmalek Benzekri , Yves Raynaud Introducing Rigorous Metrics Specification and Verification into a Measurement Program. [Citation Graph (0, 0)][DBLP ] IEEE METRICS, 1997, pp:12-19 [Conf ] Romain Laborde , François Barrère , Abdelmalek Benzekri A formal framework (Expression + Analysis) for network security. [Citation Graph (0, 0)][DBLP ] NCA, 2005, pp:223-227 [Conf ] Bassem Nasser , Romain Laborde , Abdelmalek Benzekri , François Barrère , Michel Kamel Access Control Model for Inter-organizational Grid Virtual Organizations. [Citation Graph (0, 0)][DBLP ] OTM Workshops, 2005, pp:537-551 [Conf ] François Barrère , Abdelmalek Benzekri , Frédéric Grasset , Romain Laborde A Multi-Domain Security Policy Distribution Architecture for Dynamic IP Based VPN Management. [Citation Graph (0, 0)][DBLP ] POLICY, 2002, pp:224-227 [Conf ] François Barrère , Abdelmalek Benzekri , Frédéric Grasset , Romain Laborde , Bassem Nasser Inter-Domains policy negociation. [Citation Graph (0, 0)][DBLP ] POLICY, 2003, pp:239-242 [Conf ] Abdelmalek Benzekri , Osman Salem A Software Performance Evaluation Approach Using Stochastic Process Algebra Tools. [Citation Graph (0, 0)][DBLP ] Software Engineering Research and Practice, 2003, pp:62-67 [Conf ] Romain Laborde , Bassem Nasser , Frédéric Grasset , François Barrère , Abdelmalek Benzekri A Formal Approach for the Evaluation of Network Security Mechanisms Based on RBAC Policies. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:121, n:, pp:117-142 [Journal ] Romain Laborde , François Barrère , Abdelmalek Benzekri Network security policy refinement process: Expression and analysis. [Citation Graph (0, 0)][DBLP ] J. High Speed Networks, 2006, v:15, n:3, pp:247-260 [Journal ] Romain Laborde , Michel Kamel , François Barrère , Abdelmalek Benzekri Implementation of a Formal Security Policy Refinement Process in WBEM Architecture. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 2007, v:15, n:2, pp:241-266 [Journal ] An organizational pattern for contributing to the deployment of secure Virtual Enterprises. [Citation Graph (, )][DBLP ] PEP = Point to Enhance Particularly. [Citation Graph (, )][DBLP ] Which Web Browsers Process SSL Certificates in a Standardized Way? [Citation Graph (, )][DBLP ] A secure collaborative web based environment for virtual organizations. [Citation Graph (, )][DBLP ] The X.509 certificate quality. [Citation Graph (, )][DBLP ] Automated Creation of Inter-organizational Grid Virtual Organizations. [Citation Graph (, )][DBLP ] Validating X.509 Certificates Based on their Quality. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.303secs