Benzekri Abdelmalek

Orcid: 0000-0001-8236-8690

According to our database1, Benzekri Abdelmalek authored at least 76 papers between 1993 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Article 45 of the eIDAS Directive Unveils the need to implement the X.509 4-cornered trust model for the WebPKI.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

Enhancing Secure Deployment with Ansible: A Focus on Least Privilege and Automation for Linux.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
A SLAHP in the Face of DLL Search Order Hijacking.
Proceedings of the Ubiquitous Security, 2023

Towards Reliable Collaborative Data Processing Ecosystems: Survey on Data Quality Criteria.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

The Interplay Between Policy and Technology in Metaverses: Towards Seamless Avatar Interoperability Using Self-Sovereign Identity.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

2022
On the Validation of Web X.509 Certificates by TLS Interception Products.
IEEE Trans. Dependable Secur. Comput., 2022

AutoRoC-DBSCAN: Automatic Tuning of DBSCAN to Detect Malicious DNS Tunnels.
Proceedings of the Emerging Information Security and Applications, 2022

Governance Foundations for the European Cybersecurity Community.
Proceedings of the Digital Sovereignty in Cyber Security: New Challenges in Future Vision, 2022

2021
A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context.
J. Cybersecur. Priv., July, 2021

RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

2020
Detecting abnormal DNS traffic using unsupervised machine learning.
Proceedings of the 4th Cyber Security in Networking Conference, 2020

A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

Know Your Customer: Opening a new bank account online using UAAF.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
A situation-driven framework for dynamic security management.
Ann. des Télécommunications, 2019

Logic-based methodology to help security architects in eliciting high-level network security requirements.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situations.
Proceedings of the 3rd Cyber Security in Networking Conference, 2019

2018
Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

2017
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker.
Secur. Commun. Networks, 2017

A new approach for managing Android permissions: learning users' preferences.
EURASIP J. Inf. Secur., 2017

dynSMAUG: A dynamic security management framework driven by situations.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

Describing advanced persistent threats using a multi-agent system approach.
Proceedings of the 1st Cyber Security in Networking Conference, 2017

TLS Connection Validation by Web Browsers: Why do Web Browsers Still Not Agree?
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Towards the Weaving of the Characteristics of Good Security Requirements.
Proceedings of the Risks and Security of Internet and Systems, 2016

Difficulties to enforce your privacy preferences on Android? Kapuer will help you.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

A Recommender-Based System for Assisting Non-technical Users in Managing Android Permissions.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
G-Cloud on Openstack: Adressing access control and regulation requirements.
Proceedings of the International Symposium on Networks, Computers and Communications, 2015

2014
A data flow-oriented specification method for analysing network security configurations.
Int. J. Internet Protoc. Technol., 2014

Specification and Enforcement of Dynamic Authorization Policies Oriented by Situations.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

An Adaptive XACMLv3 Policy Enforcement Point.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Toward authorization as a service: a study of the XACML standard.
Proceedings of the 16th Communications & Networking Symposium, 2013

PKI Interoperability: Still an Issue? A Solution in the X.509 Realm.
Proceedings of the Information Assurance and Security Education and Training, 2013

A specification method for analyzing fine grained network security mechanism configurations.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
The X.509 trust model needs a technical and legal expert.
Proceedings of IEEE International Conference on Communications, 2012

2011
A formal model of trust for calculating the quality of X.509 certificate.
Secur. Commun. Networks, 2011

A Generic Data Flow Security Model.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

2010
Toward Self-Contained Authorization Policies.
Proceedings of the POLICY 2010, 2010

A deployment framework for self-contained policies.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
A secure collaborative web-based environment for virtual organisations.
Int. J. Web Based Communities, 2009

An Extensible XACML Authorization Web Service: Application to Dynamic Web Sites Access Control.
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009

Which Web Browsers Process SSL Certificates in a Standardized Way?
Proceedings of the Emerging Challenges for Security, 2009

An organizational pattern for contributing to the deployment of secure Virtual Enterprises.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
A trust-based virtual collaborative environment.
J. Digit. Inf. Manag., 2008

Authentication in Virtual Organizations: A Reputation Based PKI Interconnection Model.
Proceedings of the Systems and Virtualization Management. Standards and New Technologies, 2008

PEP = Point to Enhance Particularly.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Validating X.509 Certificates Based on their Quality.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

The X.509 certificate quality.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

A best practices-oriented approach for establishing trust chains within Virtual Organisations.
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

2007
Implementation of a Formal Security Policy Refinement Process in WBEM Architecture.
J. Netw. Syst. Manag., 2007

A secure collaborative web based environment for virtual organizations.
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007

2006
Network security policy refinement process: Expression and analysis.
J. High Speed Networks, 2006

Automated Creation of Inter-organizational Grid Virtual Organizations.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Towards Absolute End-to-End QoS in Ad Hoc Networks.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2005
Access Control Model for Inter-organizational Grid Virtual Organizations.
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005

A formal framework (Expression + Analysis) for network security.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005

A Security Management Information Model Derivation Framework: From Goals to Configurations.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005

Access Control Model for Grid Virtual Organizations.
Proceedings of the ICEIS 2005, 2005

Dynamic Creation of Inter-Organizational Grid Virtual Organizations.
Proceedings of the First International Conference on e-Science and Grid Technologies (e-Science 2005), 2005

2004
A Formal Approach for the Evaluation of Network Security Mechanisms Based on RBAC Policies.
Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models, 2004

Security issues of m-commerce over hotspot networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

An Algebraic Model of an Adaptive Extension of DiffServ for MANETs.
Proceedings of the Network Control and Engineering for QoS, Security and Mobility, III, 2004

Network Security Management: A Formal Evaluation Tool Based on RBAC Policies.
Proceedings of the Network Control and Engineering for QoS, Security and Mobility, III, 2004

2003
A Software Performance Evaluation Approach Using Stochastic Process Algebra Tools.
Proceedings of the International Conference on Software Engineering Research and Practice, 2003

Inter-Domains policy negociation.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

SPIDERNet: the Security Policy Derivation for Networks Tool.
Proceedings of the 3rd Latin American Network Operations and Management Symposium, 2003

2002
A Multi-Domain Security Policy Distribution Architecture for Dynamic IP Based VPN Management.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

A SET Based Approach to Secure the Payment in Mobile Commerce.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

Wireless set: an approach for the deployment of set over WAP mobile networks.
Proceedings of the Network Control and Engineering for QoS, 2002

Learner and Course Interoperability in a Web Based Training Model.
Proceedings of the Management of Education in the Information Age: The Role of ICT, 2002

1999
Real-Time Network Applications Programming.
Parallel Distributed Comput. Pract., 1999

1997
Introducing Rigorous Metrics Specification and Verification into a Measurement Program.
Proceedings of the 4th IEEE International Software Metrics Symposium (METRICS 1997), 1997

Evaluation and Improvement of Software Products and Processes based on Measurement.
Proceedings of the 2nd High-Assurance Systems Engineering Workshop (HASE '97), 1997

1996
A Z-based Approach to Specifying and Analyzing Complex Systems.
Proceedings of the 2nd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '96), 1996

1993
From Annotated LOTOS Specifications to Queueing Networks: Automating Performance Models Derivation.
Proceedings of the Decentralized and Distributed Systems, 1993

Estimation Process of Performance Constraints during the design of Real-Time & Embedded Systems
Proceedings of the Advanced Information Systems Engineering, 1993


  Loading...