.

Browsing School of Arts and Sciences by Title

LAUR Repository

Browsing School of Arts and Sciences by Title

Sort by: Order: Results:

  • Mourad, Azzam; Otrok, Hadi; Yahyaoui, Hamdi; Baajour, Lama (IEEE, 2017-03-10)
    We introduce in this paper an abstract language on top of XACML (eXtensible Access Control Markup Language) for web services security. It is based on the automatic generation of XACML security policies from abstract XACML ...
  • Bassam, Abbas K. (Lebanese American University, 2011-04-20)
    Medical fields are becoming an increasingly important area for research and application. Therefore, doctors, nurses and patients can benefit from the highest technology offered by IT department to serve the overall operations ...
  • Cherif, Wael; Filali, Fethi; Sharafeddine, Sanaa; Dawy, Zaher (IEEE, 2018-06-19)
    The planning procedure of 802.11 WLAN networks is specific to each type of venue. In the case of large venues with high number and dense Wi-Fi devices, the network planning requires a deep investigation on: available ...
  • Yang, Xin; Walpita, Janitha; Zhou, Dapeng; Luk, Hoi Ling; Vyas, Shubham; Khnayzer, Rony S. (2017-11-03)
    The excited-state hydride release from 10-methyl-9-phenyl-9,10-dihydroacridine (PhAcrH) was investigated using steady-state and time-resolved UV/vis absorption spectroscopy. Upon excitation, PhAcrH is oxidized to the ...
  • Mourad, Azzam; Otrok, Hadi; Ayoubi, Sara (IEEE, 2017-03-08)
    In this paper, we introduce our approach for the automatic generation of BPEL (Business Process Execution Language) aspects from security policies. It is based on a synergy between policies, Aspect-Oriented Programming ...
  • Aharonian, Nora (Lebanese American University, 2012-05-30)
  • Tout, Hanine; Mourad, Azzam; Yahyaoui, Hamdi; Talhi, Chamseddine; Otrok, Hadi (IEEE, 2017-03-10)
    By handling the orchestration, composition and interaction of Web services, the Business Process Execution Language (BPEL) has gained tremendous interest. However, such process-based language does not assure a secure ...
  • Difi, Safa (Lebanese American University, 2023-05-08)
    While domestic violence is a prevalent phenomenon in Algeria, little do we know about the dynamics of gender inequality that shape the experiences of women subjected to violence. Through an intersectional lens, this thesis ...
  • Knio, Mona (University of Leeds, 2018-09-19)
    The impression that Arabs did not attempt to express themselves through the medium of dramatic arts till recently echoes a simultaneous conviction which prevailed concerning visual arts expression. Early in the second ...
  • Haraty, Ramzi; Elariss, Haifa Elsidani; Khaddaj, Souheil (ACTA Press, 2018-02-08)
    In recent years, many non-expert user applications have been developed to query Geographic Information Systems (GIS) that are used to browse and view data about space and time thus naming them spatio-temporal databases. ...
  • Haraty, Ramzi A.; Bekaii, Natalie (2017-01-31)
    Standard Relational Databases are used to store the state of reality at a single moment of time. Temporal Databases are used to store Time-Varying Data. Multilevel Secure Databases are used to securely store highly ...
  • Haraty, Ramzi A.; Bekai, Nathalie (2018-03-02)
  • Bekai, Nathalie Yacoub (Lebanese American University, 2011-09-29)
  • Dbouk, Toufic; Otrok, Hadi; Mourad, Azzam; Talhi, Chamseddine (IEEE, 2018-08-14)
    As the usage of smart devices is increasing, malware affecting such devices is rapidly evolving as well. Security risks affecting the confidentiality, integrity, and privacy of smart devices are rapidly emerging. Mobile ...
  • Houri, Ahmad; Wehbe, Hania (2016-05-13)
  • Tout, Hanine; Talhi, Chamseddine; Kara, Nadjia; Mourad, Azzam (IEEE, 2017-03-10)
    Mobile virtualization is a key technology that is witnessing widespread adoption to realize multi-persona functionality capable of accommodating work, personal, and mobility needs on a single mobile terminal. Yet, unlike ...
  • Yahyaoui, H.; Wang, L.; Mourad, A.; Almullah, M.; Sheng, Q.Z. (2017-03-14)
    We propose in this paper a new approach to achieve highly adaptable Web services through context-adaptable Web service policies. A Web service policy is a set of rules that defines the capabilities and requirements of a ...
  • Haraty, Ramzi A.; Allaham, Mohamad Mowafak; El-Homaissi, Amer (Curran, 2018-02-01)
  • Khater, Carol (Lebanese American University, 2011-04-20)
    For several years now, LAU professors in almost all disciplines have been trying to voice their frustration from the decadence they are witnessing among students, when it comes to writing essays, papers, and dissertations. ...
  • Mourad, Azzam; Alhadidi, Dima; Debbabi, Mourad (2018-09-13)
    In this paper, we propose an approach for weaving security concerns in the Gimple representation of programs. Gimple is an intermediate, language-independent, and tree-based representation generated by GNU Compiler Collection ...

Search LAUR


Advanced Search

Browse

My Account