The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Abdelmalek Benzekri: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Osman Salem, Abdelmalek Benzekri
    Towards Absolute End-to-End QoS in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AICT/ICIW, 2006, pp:18- [Conf]
  2. Ramón Puigjaner, Abdelmalek Benzekri, Sandra Ayache
    Estimation Process of Performance Constraints during the design of Real-Time & Embedded Systems [Citation Graph (0, 0)][DBLP]
    CAiSE, 1993, pp:629-648 [Conf]
  3. Bassem Nasser, Romain Laborde, Abdelmalek Benzekri, François Barrère, Michel Kamel
    Dynamic Creation of Inter-Organizational Grid Virtual Organizations. [Citation Graph (0, 0)][DBLP]
    e-Science, 2005, pp:405-412 [Conf]
  4. F. Maurice, Abdelmalek Benzekri, Yves Raynaud
    Evaluation and Improvement of Software Products and Processes based on Measurement. [Citation Graph (0, 0)][DBLP]
    HASE, 1997, pp:108-113 [Conf]
  5. Jean-Michel Bruel, Robert B. France, Abdelmalek Benzekri
    A Z-based Approach to Specifying and Analyzing Complex Systems. [Citation Graph (0, 0)][DBLP]
    ICECCS, 1996, pp:336-343 [Conf]
  6. Bassem Nasser, Abdelmalek Benzekri, Romain Laborde, Frédéric Grasset, François Barrère
    Access Control Model for Grid Virtual Organizations. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2005, pp:152-158 [Conf]
  7. Romain Laborde, François Barrère, Abdelmalek Benzekri
    A Security Management Information Model Derivation Framework: From Goals to Configurations. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:217-234 [Conf]
  8. Omar Hjiej, Abdelmalek Benzekri, Alberto Valderruten
    From Annotated LOTOS Specifications to Queueing Networks: Automating Performance Models Derivation. [Citation Graph (0, 0)][DBLP]
    Decentralized and Distributed Systems, 1993, pp:401-412 [Conf]
  9. Rima Abdallah, Abdelmalek Benzekri, Ali El Hajj, Ibrahim Moukarzel
    Learner and Course Interoperability in a Web Based Training Model. [Citation Graph (0, 0)][DBLP]
    Information Technology in Educational Management, 2002, pp:119-127 [Conf]
  10. Alia Fourati, Hella Kaffel Ben Ayed, Farouk Kamoun, Abdelmalek Benzekri
    Wireless set: an approach for the deployment of set over WAP mobile networks. [Citation Graph (0, 0)][DBLP]
    Net-Con, 2002, pp:437-442 [Conf]
  11. Alia Fourati, Hella Kaffel Ben Ayed, Farouk Kamoun, Abdelmalek Benzekri
    A SET Based Approach to Secure the Payment in Mobile Commerce. [Citation Graph (0, 0)][DBLP]
    LCN, 2002, pp:136-140 [Conf]
  12. F. Maurice, Abdelmalek Benzekri, Yves Raynaud
    Introducing Rigorous Metrics Specification and Verification into a Measurement Program. [Citation Graph (0, 0)][DBLP]
    IEEE METRICS, 1997, pp:12-19 [Conf]
  13. Romain Laborde, François Barrère, Abdelmalek Benzekri
    A formal framework (Expression + Analysis) for network security. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:223-227 [Conf]
  14. Bassem Nasser, Romain Laborde, Abdelmalek Benzekri, François Barrère, Michel Kamel
    Access Control Model for Inter-organizational Grid Virtual Organizations. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2005, pp:537-551 [Conf]
  15. François Barrère, Abdelmalek Benzekri, Frédéric Grasset, Romain Laborde
    A Multi-Domain Security Policy Distribution Architecture for Dynamic IP Based VPN Management. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:224-227 [Conf]
  16. François Barrère, Abdelmalek Benzekri, Frédéric Grasset, Romain Laborde, Bassem Nasser
    Inter-Domains policy negociation. [Citation Graph (0, 0)][DBLP]
    POLICY, 2003, pp:239-242 [Conf]
  17. Abdelmalek Benzekri, Osman Salem
    A Software Performance Evaluation Approach Using Stochastic Process Algebra Tools. [Citation Graph (0, 0)][DBLP]
    Software Engineering Research and Practice, 2003, pp:62-67 [Conf]
  18. Romain Laborde, Bassem Nasser, Frédéric Grasset, François Barrère, Abdelmalek Benzekri
    A Formal Approach for the Evaluation of Network Security Mechanisms Based on RBAC Policies. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:121, n:, pp:117-142 [Journal]
  19. Romain Laborde, François Barrère, Abdelmalek Benzekri
    Network security policy refinement process: Expression and analysis. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2006, v:15, n:3, pp:247-260 [Journal]
  20. Romain Laborde, Michel Kamel, François Barrère, Abdelmalek Benzekri
    Implementation of a Formal Security Policy Refinement Process in WBEM Architecture. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2007, v:15, n:2, pp:241-266 [Journal]

  21. An organizational pattern for contributing to the deployment of secure Virtual Enterprises. [Citation Graph (, )][DBLP]


  22. PEP = Point to Enhance Particularly. [Citation Graph (, )][DBLP]


  23. Which Web Browsers Process SSL Certificates in a Standardized Way? [Citation Graph (, )][DBLP]


  24. A secure collaborative web based environment for virtual organizations. [Citation Graph (, )][DBLP]


  25. The X.509 certificate quality. [Citation Graph (, )][DBLP]


  26. Automated Creation of Inter-organizational Grid Virtual Organizations. [Citation Graph (, )][DBLP]


  27. Validating X.509 Certificates Based on their Quality. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002