.

Browsing SoAS - Scholarly Publications by Title

LAUR Repository

Browsing SoAS - Scholarly Publications by Title

Sort by: Order: Results:

  • Haraty, Ramzi A.; Zantout, Bassam (IEEE, 2018-02-27)
    Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a ...
  • Haraty, Ramzi A.; Zantout, Bassam (2018-01-23)
    Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a ...
  • Korfali, Samira Ibrahim; Davies, Brian E. (2015-11-07)
    Years of political instability have left Lebanon with significant gaps in environmental knowledge. This paper reports new results for trace metals in bed sediments of the river Nahr-lbrahim. The drainage basin of the river ...
  • Korfali, Samira Ibrahim (2016-04-11)
    A major part of chemical contamination in domestic water is the release of metals from metallic water distribution systems and the formation of metal scales. The objective of this study is the assessment of well and ...
  • Salamey, Imad; Pearson, Frederic (2015-09-28)
    More than a year and a half has passed since the U.S.-led coalition’s invasion of Iraq, and yet little progress has been seen in the daily lives of Iraqi people. Not only has reconstruction stalled, but human rights abuses ...
  • Mourad, Azzam; Otrok, Hadi; Yahyaoui, Hamdi; Baajour, Lama (IEEE, 2017-03-10)
    We introduce in this paper an abstract language on top of XACML (eXtensible Access Control Markup Language) for web services security. It is based on the automatic generation of XACML security policies from abstract XACML ...
  • Cherif, Wael; Filali, Fethi; Sharafeddine, Sanaa; Dawy, Zaher (IEEE, 2018-06-19)
    The planning procedure of 802.11 WLAN networks is specific to each type of venue. In the case of large venues with high number and dense Wi-Fi devices, the network planning requires a deep investigation on: available ...
  • Yang, Xin; Walpita, Janitha; Zhou, Dapeng; Luk, Hoi Ling; Vyas, Shubham; Khnayzer, Rony S. (2017-11-03)
    The excited-state hydride release from 10-methyl-9-phenyl-9,10-dihydroacridine (PhAcrH) was investigated using steady-state and time-resolved UV/vis absorption spectroscopy. Upon excitation, PhAcrH is oxidized to the ...
  • Mourad, Azzam; Otrok, Hadi; Ayoubi, Sara (IEEE, 2017-03-08)
    In this paper, we introduce our approach for the automatic generation of BPEL (Business Process Execution Language) aspects from security policies. It is based on a synergy between policies, Aspect-Oriented Programming ...
  • Tout, Hanine; Mourad, Azzam; Yahyaoui, Hamdi; Talhi, Chamseddine; Otrok, Hadi (IEEE, 2017-03-10)
    By handling the orchestration, composition and interaction of Web services, the Business Process Execution Language (BPEL) has gained tremendous interest. However, such process-based language does not assure a secure ...
  • Haraty, Ramzi; Elariss, Haifa Elsidani; Khaddaj, Souheil (ACTA Press, 2018-02-08)
    In recent years, many non-expert user applications have been developed to query Geographic Information Systems (GIS) that are used to browse and view data about space and time thus naming them spatio-temporal databases. ...
  • Haraty, Ramzi A.; Bekaii, Natalie (2017-01-31)
    Standard Relational Databases are used to store the state of reality at a single moment of time. Temporal Databases are used to store Time-Varying Data. Multilevel Secure Databases are used to securely store highly ...
  • Haraty, Ramzi A.; Bekai, Nathalie (2018-03-02)
  • Dbouk, Toufic; Otrok, Hadi; Mourad, Azzam; Talhi, Chamseddine (IEEE, 2018-08-14)
    As the usage of smart devices is increasing, malware affecting such devices is rapidly evolving as well. Security risks affecting the confidentiality, integrity, and privacy of smart devices are rapidly emerging. Mobile ...
  • Houri, Ahmad; Wehbe, Hania (2016-05-13)
  • Tout, Hanine; Talhi, Chamseddine; Kara, Nadjia; Mourad, Azzam (IEEE, 2017-03-10)
    Mobile virtualization is a key technology that is witnessing widespread adoption to realize multi-persona functionality capable of accommodating work, personal, and mobility needs on a single mobile terminal. Yet, unlike ...
  • Yahyaoui, H.; Wang, L.; Mourad, A.; Almullah, M.; Sheng, Q.Z. (2017-03-14)
    We propose in this paper a new approach to achieve highly adaptable Web services through context-adaptable Web service policies. A Web service policy is a set of rules that defines the capabilities and requirements of a ...
  • Haraty, Ramzi A.; Allaham, Mohamad Mowafak; El-Homaissi, Amer (Curran, 2018-02-01)
  • Mourad, Azzam; Alhadidi, Dima; Debbabi, Mourad (2018-09-13)
    In this paper, we propose an approach for weaving security concerns in the Gimple representation of programs. Gimple is an intermediate, language-independent, and tree-based representation generated by GNU Compiler Collection ...
  • AlOrabi, Wael AlRahal; Abdul Rahman, Sawsan; El Barachi, May; Mourad, Azzam (2016-11-15)
    With the increased need for mobility and the overcrowding of cities, the area of Intelligent Transportation aims at improving the efficiency, safety, and productivity of transportation systems by relying on communication ...

Search LAUR


Advanced Search

Browse

My Account