.

Browsing by Author "Mourad, Azzam"

LAUR Repository

Browsing by Author "Mourad, Azzam"

Sort by: Order: Results:

  • Taghavi, Mona; Bentahar, Jamal; Otrok, Hadi; Abdel Wahab, Omar; Mourad, Azzam (IEEE Xplore, 2018-08-14)
    In todays cloud market, providers are taking advantage of consumer reviews and ratings as a new marketing tool to establish their credibility. However, to achieve higher ratings, they need to enhance their service quality ...
  • Abdel Wahab, Omar; Bentahar, Jamal; Otrok, Hadi; Mourad, Azzam (2018-08-14)
    Distributed Denial of Service (DDoS) constitutes a major threat against cloud systems owing to the large financial losses it incurs. This motivated the security research community to investigate numerous detection techniques ...
  • Charpentier, Robert; Debbabi, Mourad; Mourad, Azzam; Laverdiere, Marc-André (2017-02-06)
    In today's computing world, security takes an increasingly predominant role. The industry is facing challenges in public confidence at the discovery of vulnerabilities and customers are expecting security to be delivered ...
  • Tout, Hanine; Kara, Nadjia; Talhi, Chamseddine; Mourad, Azzam (2021-04-15)
    Latest mobile virtualization techniques have opened the door for multi-persona mobility to overcome security and privacy concerns of bring-your-own devices practice. Multi-persona allows a physical device to co-host multiple ...
  • Farhat, Peter; Sami, Hani; Mourad, Azzam (2021-04-08)
    On the fly deployment of fog nodes near users provides the flexibility of pushing services anywhere and whenever needed. Nevertheless, taking a real-life scenario, the cloud might limit the number of fogs to place for ...
  • Moati, Nadia; Otrok, Hadi; Mourad, Azzam; Robert, Jean-Marc (2016-05-13)
    The QOLSR is a multimedia protocol that was designed on top of the optimized link state routing (OLSR) protocol for mobile ad hoc network. It considers the quality of service (QoS) of the nodes during the selection of the ...
  • SBA-XACML 
    Mourad, Azzam; Jebbaoui, Hussein (2015-11-24)
    Policy-based computing is taking an increasing role in providing real-time decisions and governing the systematic interaction among distributed Web services. XACML (eXtensible Access Control Markup Language) has been known ...
  • Mourad, Azzam; Laverdiere, Marc-André; Debbabi, Mourad (2015-11-25)
    In this paper, we define the concept of software security hardening, which will allow the developers and maintainers to deploy and harden security features and remedy present vulnerabilities and threats into existing ...
  • Mourad, Azzam; Debbabi, Mourad; Gherbi, Abdelouahed; Yahyaoui, Hamdi (2017-07-17)
    This paper presents a new selective dynamic compilation technique targeting ARM 16/32-bit embedded system processors. This compiler is built inside the J2ME/CLDC (Java 2 Micro Edition for Connected Limited Device Configuration) ...
  • Tout, Hanine; Talhi, Chamseddine; Kara, Nadjia; Mourad, Azzam (2017-02-06)
    Fueled by changes in professional application models, personal interests and desires and technological advances in mobile devices, multi-persona has emerged recently to keep balance between different aspects, in our daily ...
  • Jebbaoui, Hussein; Mourad, Azzam; Otrok, Hadi; Haraty, Ramzi (2015-11-24)
    XACML (eXtensible Access Control Markup Language) policies, which are widely adopted for defining and controlling dynamic access among Web/cloud services, are becoming more complex in order to handle the significant growth ...
  • Tout, Hanine; Talhi, Chamseddine; Kara, Nadija; Mourad, Azzam (2018-08-14)
    Although mobile devices have been considerably upgraded to more powerful terminals, yet their lightness feature still impose intrinsic limitations in their computation capability, storage capacity and battery lifetime. ...
  • Abbas, Nadine; Fawaz, Wissam; Sharafeddine, Sanaa; Mourad, Azzam; Abou-Rjeily, Chadi (2022-11-17)
    Integrating device-to-device (D2D) cooperation with mobile edge computing (MEC) for computation offloading has proven to be an effective method for extending the system capabilities of low-end devices to run complex ...
  • Mourad, Azzam; Otrok, Hadi; Yahyaoui, Hamdi; Baajour, Lama (IEEE, 2017-03-10)
    We introduce in this paper an abstract language on top of XACML (eXtensible Access Control Markup Language) for web services security. It is based on the automatic generation of XACML security policies from abstract XACML ...
  • Mourad, Azzam; Otrok, Hadi; Ayoubi, Sara (IEEE, 2017-03-08)
    In this paper, we introduce our approach for the automatic generation of BPEL (Business Process Execution Language) aspects from security policies. It is based on a synergy between policies, Aspect-Oriented Programming ...
  • Tout, Hanine; Mourad, Azzam; Yahyaoui, Hamdi; Talhi, Chamseddine; Otrok, Hadi (IEEE, 2017-03-10)
    By handling the orchestration, composition and interaction of Web services, the Business Process Execution Language (BPEL) has gained tremendous interest. However, such process-based language does not assure a secure ...
  • Dbouk, Toufic; Otrok, Hadi; Mourad, Azzam; Talhi, Chamseddine (IEEE, 2018-08-14)
    As the usage of smart devices is increasing, malware affecting such devices is rapidly evolving as well. Security risks affecting the confidentiality, integrity, and privacy of smart devices are rapidly emerging. Mobile ...
  • Tout, Hanine; Talhi, Chamseddine; Kara, Nadjia; Mourad, Azzam (IEEE, 2017-03-10)
    Mobile virtualization is a key technology that is witnessing widespread adoption to realize multi-persona functionality capable of accommodating work, personal, and mobility needs on a single mobile terminal. Yet, unlike ...
  • Mourad, Azzam; Alhadidi, Dima; Debbabi, Mourad (2018-09-13)
    In this paper, we propose an approach for weaving security concerns in the Gimple representation of programs. Gimple is an intermediate, language-independent, and tree-based representation generated by GNU Compiler Collection ...
  • AlOrabi, Wael AlRahal; Abdul Rahman, Sawsan; El Barachi, May; Mourad, Azzam (2016-11-15)
    With the increased need for mobility and the overcrowding of cities, the area of Intelligent Transportation aims at improving the efficiency, safety, and productivity of transportation systems by relying on communication ...