Rachid Saadi

According to our database1, Rachid Saadi authored at least 22 papers between 2005 and 2011.

Collaborative distances:

Timeline

2005
2006
2007
2008
2009
2010
2011
0
1
2
3
4
5
6
7
8
1
1
1
1
5
2
2
7
2

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Risk-based adaptive scheduling in randomly deployed video sensor networks for critical surveillance applications.
J. Netw. Comput. Appl., 2011

The CONNECT Architecture.
Proceedings of the Formal Methods for Eternal Networked Software Systems, 2011

Security and Trust.
Proceedings of the Formal Methods for Eternal Networked Software Systems, 2011

Proximity-Based Trust Inference for Mobile Social Networking.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

Composing Trust Models towards Interoperable Trust Management.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

Inferring Affordances Using Learning Techniques.
Proceedings of the Eternal Systems - First International Workshop, 2011

2010
Security in Distributed Collaborative Environments: Limitations and Solutions.
Proceedings of the Emergent Web Intelligence: Advanced Information Retrieval, 2010

Security-by-Contract-with-Trust for Mobile Devices.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

Dependability in dynamic, evolving and heterogeneous systems: the connect approach.
Proceedings of the 2nd International Workshop on Software Engineering for Resilient Systems, 2010

T2D: a peer to peer trust management system based on disposition to trust.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

2009
Adaptive scheduling of wireless video sensor nodes for surveillance applications.
Proceedings of the 4th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, 2009

Coverage and adaptive scheduling algorithms for criticality management on video wireless sensor networks.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

2007
Context Adapted Certificate Using Morph Template Signature for Pervasive Environments.
Proceedings of the Ubiquitous Computing Systems, 4th International Symposium, 2007

X316 Security Toolbox for New Generation of Certificate.
Proceedings of the Trust, 2007

Establishing Trust Beliefs Based on a Uniform Disposition to Trust.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

A New Certificate Signature for Pervasive Environment.
Proceedings of the Third International Workshop on Security, 2007

Morph Digital Signature A New Signature Framework for e-Documents in Pervasive Environments.
Proceedings of the IEEE International Conference on Pervasive Services, 2007

The Chameleon: A Pervasive Grid Security Architecture.
Proceedings of the Third International Conference on Networking and Services (ICNS 2007), 2007

Authentication and Access Control Using Trust Collaboration in Pervasive Grid Environments.
Proceedings of the Advances in Grid and Pervasive Computing, 2007

2005
(Dis)trust certification model for large access in a pervasive environment.
Int. J. Pervasive Comput. Commun., 2005

Authentification par la méfiance dans les systèmes pervasifs.
Proceedings of the Actes des 2èmes journées francophones Mobilité et Ubiquité 2005, 2005

APC: access pass certificate distrust certification model for large access in pervasive environment.
Proceedings of the International Conference on Pervasive Services 2005, 2005


  Loading...