Faten Ayachi
According to our database1,
Faten Ayachi
authored at least 20 papers
between 2010 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Pre-Trained Deep Convolutional Neural Network Architectures for Breast Cancer Diagnosis in Mammography: Current State-Of-The-Art.
Proceedings of the International Conference on Innovations in Intelligent Systems and Applications, 2023
2021
Attacks Scenarios in a Correlated Anomalies Context: Case of Medical System Database Application.
Proceedings of the 16th International Conference on Evaluation of Novel Approaches to Software Engineering, 2021
Proceedings of the CENTERIS 2021 - International Conference on ENTERprise Information Systems / ProjMAN 2021 - International Conference on Project MANagement / HCist 2021, 2021
2020
Advanced analysis of the integrity of access control policies: the specific case of databases.
Int. Arab J. Inf. Technol., 2020
Enforcing Risk-Awareness in Access Control Systems: Synthesis, Discussion and Guidelines.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
2019
Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Proceedings of the CENTERIS 2019 - International Conference on ENTERprise Information Systems / ProjMAN 2019 - International Conference on Project MANagement / HCist 2019, 2019
2018
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures.
Secur. Commun. Networks, 2018
Proceedings of the 13th International Conference on Evaluation of Novel Approaches to Software Engineering, 2018
2017
A Comprehensive Formal Solution for Access Control Policies Management: Defect Detection, Analysis and Risk Assessment.
Proceedings of the SCSS 2017, 2017
Towards a Reliable Formal Framework for Enhancing Risk Assessment in Access Control Systems.
Proceedings of the SCSS 2017, 2017
Proceedings of the Position Papers of the 2017 Federated Conference on Computer Science and Information Systems, 2017
2016
Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.
J. Medical Syst., 2016
2015
Proceedings of the SECRYPT 2015, 2015
The problem of integrity in RBAC-based policies within relational databases: synthesis and problem study.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015
A Formal Approach Based on Verification and Validation Techniques for Enhancing the Integrity of Concrete Role Based Access Control Policies.
Proceedings of the International Joint Conference, 2015
2014
An Approach to Formally Validate and Verify the Compliance of Low Level Access Control Policies.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
2010
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010