Evaluation of a Security Policy Based on OrBAC Model Using MotOrBAC: Application E-learning (English)
- New search for: Kassid, Asmaa
- New search for: El Kamoun, Najib
- New search for: Sabir, Essaïd
- New search for: Medromi, Hicham
- New search for: Sadik, Mohamed
- New search for: Kassid, Asmaa
- New search for: El Kamoun, Najib
In:
Advances in Ubiquitous Networking
: Proceedings of the UNet’15
;
Chapter: 11
;
129-139
;
2016
- Article/Chapter (Book) / Electronic Resource
-
Title:Evaluation of a Security Policy Based on OrBAC Model Using MotOrBAC: Application E-learning
-
Additional title:Lect. Notes Electrical Eng.
-
Contributors:Sabir, Essaïd ( editor ) / Medromi, Hicham ( editor ) / Sadik, Mohamed ( editor ) / Kassid, Asmaa ( author ) / El Kamoun, Najib ( author )
-
Conference:International Symposium on Ubiquitous Networking ; 2015 ; Casablanca, Morocco
-
Published in:Advances in Ubiquitous Networking : Proceedings of the UNet’15 ; Chapter: 11 ; 129-139Lecture Notes in Electrical Engineering ; 366 ; 129-139
-
Publisher:
- New search for: Springer Nature Singapore
-
Place of publication:Singapore
-
Publication date:2016-02-02
-
Size:11 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Generalized Slotted Aloha Revisited: A Throughput and Stability AnalysisSabir, Essaid / Ezzahidi, Sidi Ahmed / Bouyakhf, El Houssine et al. | 2016
- 2
-
Enhanced Hybrid Uplink Time Difference of Arrival and Assisted Global Positioning System for UMTS UsersEl Mourabit, Ilham / Sahel, Aïcha / Badri, Abdelmajid / Baghdad, Abdennaceur et al. | 2016
- 3
-
Efficient Incentive Scheme forWireless Random Channel Access with Selfish UsersKarouit, Abdelillah et al. | 2016
- 4
-
A Pricing-Based Spectrum Leasing Framework with Adaptive Distributed Learning for Cognitive Radio NetworksHandouf, Sara / Sabir, Essaid / Sadik, Mohammed et al. | 2016
- 5
-
Theoretical Analysis of BER Performance for Asynchronous FBMC Based Multi-cellular Networks with Non Linear DistortionsElmaroud, Brahim / Faqihi, Ahmed / Abbad, Mohammed / Aboutajdine, Driss et al. | 2016
- 6
-
Towards a Zero-Failure Distributed Access for Wireless Collision ChannelsArabi, Sara / Errami, Ahmed / Khaldoun, Mohamed / Sabir, Essaid / El Mesbahi, Jelloul et al. | 2016
- 7
-
Toward a New Extension of the Access Control Model ABAC for Cloud ComputingEd-Daibouni, Maryam / Lebbat, Adil / Tallal, Saida / Medromi, Hicham et al. | 2016
- 8
-
A Bargaining Nash Game Based Adaptive Negotiation of Context Level Agreements for Pervasive SystemsRoutaib, Hayat / Badidi, Elarbi / Sabir, Essaid / ElKoutbi, Mohammed et al. | 2016
- 9
-
A New Secure Network Architecture to Increase Security Among Virtual Machines in Cloud ComputingElmrabet, Zakaria / Elghazi, Hamid / Sadiki, Tayeb / Elghazi, Hassan et al. | 2016
- 10
-
Text Mining for Suspicious Contents in Mobile Cloud Computing EnvironmentAlami, Salim / Elbeqqali, Omar et al. | 2016
- 11
-
Evaluation of a Security Policy Based on OrBAC Model Using MotOrBAC: Application E-learningKassid, Asmaa / El Kamoun, Najib et al. | 2016
- 12
-
Applying Encryption Algorithm for Data Security in Cloud StorageKartit, Zaid / Azougaghe, Ali / Kamal Idrissi, H. / El Marraki, M. / Hedabou, M. / Belkasmi, M. / Kartit, A. et al. | 2016
- 13
-
A New Shared and Comprehensive Tool of Cloud Computing Security Risk AssessmentDrissi, Saadia / Benhadou, Siham / Medromi, Hicham et al. | 2016
- 14
-
The Behavior of CPW-Fed Slotted Cantor Set Fractal AntennaReha, Abdelati / El Amri, Abdelkebir / Benhmammouch, Othmane / Oulad Said, Ahmed et al. | 2016
- 15
-
Directive Beam-Steering Patch Antenna Using Adjustable Metamaterial SuperstrateErrifi, Hayat / Baghdad, Abdennaceur / Badri, Abdelmajid / Sahel, Aicha et al. | 2016
- 16
-
High Sensitive and Efficient Circular Polarized Rectenna Design for RF Energy Harvesting at 5.8 GHzSennouni, Mohamed Adel / Zbitou, Jamal / Abboud, Benaissa / Tribak, Abdelwahed / Bennis, Hamid / Latrach, Mohamed et al. | 2016
- 17
-
Miniaturized Wideband Flexible CPW Antenna with Hexagonal Ring Slots for Early Breast Cancer DetectionAmal, Afyf / Larbi, Bellarbi / Anouar, Achour / Fatima, Riouch / Abdelhamid, Errachid et al. | 2016
- 18
-
Maximizing QoS in Heterogeneous Wireless Sensor Networks Using Game Theory and Learning AlgorithmsEl Hammouti, Hajar / Echabbi, Loubna / Ben Maissa, Yann et al. | 2016
- 19
-
Traffic Congestion Manager, a Cost-Effective ApproachAdnane, Ahmed / Lmimouni, Mohamed Salim / Rezzai, Maha / Medromi, Hicham et al. | 2016
- 20
-
Automated SLA Negotiation: A Novel Approach for Optimizing Cloud Data OverloadMaftahi, Latifa / Rakrak, Said / Raghay, Said et al. | 2016
- 21
-
Frequency-Domain Analysis and Design of a TCP Flow Controller Using the AQM MechanismLefrouni, Khalid / Ellaia, Rachid et al. | 2016
- 22
-
Quality of Service Provision and Data Security in Communication Networks Based on Traffic Classificationde Godoy Stênico, Jeferson Wilian / Ling, Lee Luan et al. | 2016
- 23
-
A Survey on QoS for OLSR Routing Protocol in MANETSLakrami, Fatima / Elkamoun, N. / El Kamili, M. et al. | 2016
- 24
-
New Classification of Nodes Cooperation in Delay Tolerant NetworksLoudari, Salah Eddine / Benamar, Maria / Benamar, Nabil et al. | 2016
- 25
-
A Survey on Flat Routing Protocols in Wireless Sensor NetworksEchoukairi, Hassan / Bourgba, Khalid / Ouzzif, Mohammed et al. | 2016
- 26
-
An Energy-Aware Clustering Approach Based on the K-Means Method for Wireless Sensor NetworksEl Mezouary, Ridouane / Choukri, Ali / Kobbane, Abdellatif / El Koutbi, Mohammed et al. | 2016
- 27
-
An Efficient Key Establishment Protocol for Wireless Sensor NetworksMaleh, Yassin / Ezzati, Abdellah et al. | 2016
- 28
-
Computer Aid Diagnostic in Mammogram Image Using SUSAN Algorithm and Hierarchical Watershed TransformAnibou, Chaimae / Saidi, Mohammed Nabil / Aboutajdine, Driss et al. | 2016
- 29
-
Improving the Performance of CBIR with Genetic Approach and FeedbackBourass, Youssef / Bahri, Abdelkhalak / Zouaki, Hamid et al. | 2016
- 30
-
Multi-scale Image Co-segmentationEs-salhi, Rachida / Daoudi, Imane / Weber, Jonathan / El Ouardi, Hamid / Tallal, Saida / Medromi, Hicham et al. | 2016
- 31
-
A Novel Approach for Computing the Coefficient of ART Descriptor Using Polar Coordinates for Gray-Level and Binary ImagesKhatabi, Abderrahim / Tmiri, Amal / Serhir, Ahmed et al. | 2016
- 32
-
A New Image Interpolation Using Laplacian OperatorOusguine, Said / Essannouni, Fedwa / Essannouni, Leila / Abbad, Mohammed / Aboutajdine, Driss et al. | 2016
- 33
-
3D Objects Comparison Using New Approach Based Similarity IndexAznag, Khalid / Kane, Nouhoun / El Oirrak, Ahmed / El Bachari, Essaid et al. | 2016
- 34
-
Multilevel MPSoC Performance Evaluation, ISS Model with Timing and Priority ManagementAlali, Abdelhakim / Assayad, Ismail / Sadik, Mohamed et al. | 2016
- 35
-
Hybrid Electrical Architecture for Vertical Takeoff and Landing Unmmaned Aerial VehiculeBerradi, Souad / Moutaouakkil, Fouad / Medromi, Hicham et al. | 2016
- 36
-
SMART: Implementing a New Flight System Based on Multi-agent and Embedded on a Real-Time PlatformMarzouk, Firdaous / Ennaji, Mohamed / Medromi, Hicham et al. | 2016
- 37
-
Analytical Study of Nonlinear Controls Applied to Wind Energy Conversion Systems Using a DFIGBerdai, Abdelmajid / Reddak, Moussa / Belfqih, Abdelaziz / Jamal, Boukherouaa / El Mariami, Faissal / Hmidat, Abdelhamid et al. | 2016
- 38
-
Statistical Learning Based Framework for Random Networks Knowledge Extraction Applied in Smart CitiesTigani, Smail / Ouzzif, Mohammed / Saadane, Rachid et al. | 2016
- 39
-
Just in Time: A Social Computing Approach for Finding Reliable Answers in Large Public SpacesMahmud, Nasim et al. | 2016
- 40
-
A Decision Approach to Select the Best Framework to Treat an IT Problem by Using Multi-Agent System and Expert SystemsChakir, A. / Chergui, M. / Elhasnaou, S. / Medromi, H. / Sayouti, A. et al. | 2016
- 41
-
An Abstract Framework for Introducing Computational Trust Models in JADE-Based Multi-Agent SystemsMifrah, Youssef / En-Nouaary, Abdeslam / Dahchour, Mohamed et al. | 2016
- 42
-
Including EAS-SGR IT Risk Framework in an IT GRC Global FrameworkIguer, Hajar / Medromi, Hicham / Sayouti, Adil / Tallal, Saadia et al. | 2016
- 43
-
Enterprise Architecture Complexity Component Based on Archimate LanguageLakhrouit, Jihane / Baïna, Karim et al. | 2016
- 44
-
A Multi-Agent Systems Contribution in Change of Information SystemBenanbar, Nabil / Moussaid, Laila / Medromi, Hicham et al. | 2016
- 45
-
Designing Multi Agent System Architecture for Project Performance Based on PMBOK StandardHammouch, Houda / Medromi, Hicham / Sayouti, Adil et al. | 2016