.

Browsing SoAS - Scholarly Publications by Author "Otrok, Hadi"

LAUR Repository

Browsing SoAS - Scholarly Publications by Author "Otrok, Hadi"

Sort by: Order: Results:

  • Mourad, Azzam; Otrok, Hadi; Baajour, Lama (2016-05-19)
    In this paper, we address the problems related to the applicability and usability of security patterns. In this context, we propose a new approach based on aspect-oriented programming (AOP) for security patterns development, ...
  • Ayoubi, Sara; Mourad, Azzam; Otrok, Hadi; Shahin, Ahmad (2015-11-24)
    Web services technology is the latest evolution in distributed computing. With all of the advantages of web services, one of the main hurdles remains security in composite web services. In this paper, we tackle this problem ...
  • Dbouk, Toufic; Mourad, Azzam; Otrok, Hadi; Tout, Hanine; Talhi, Chamseddine (2021-04-15)
    While the usage of smart devices is increasing, security attacks and malware affecting such terminals are briskly evolving as well. Mobile security suites exist to defend devices against malware and other intrusions. ...
  • Mourad, Azzam; Otrok, Hadi; Baajour, Lama (IEEE, 2017-03-09)
    In this paper, we address the problems related to the applicability and useability of security patterns. In this context, we propose a new approach based on aspect-oriented programming (AOP) for security patterns development, ...
  • Mourad, Azzam; Ayoubi, Sara; Yahyaoui, Hamdi; Otrok, Hadi (2015-11-25)
    In this paper, we propose a new framework for the dynamic enforcement of composite Web services security, which is based on a synergy between Aspect-Oriented Programming (AOP) and BPEL (Business Process Execution Language). ...
  • Hammoud, Ahmad; Otrok, Hadi; Mourad, Azzam; Abdel Wahab, Omar; Bentahar, Jamal (2021-04-15)
    Cloud federation has emerged as a new business architecture which aims to help cloud providers cope with the increased waves of demands on their resources and services. Although plenty of solutions have been proposed trying ...
  • Taghavi, Mona; Bentahar, Jamal; Otrok, Hadi; Abdel Wahab, Omar; Mourad, Azzam (IEEE Xplore, 2018-08-14)
    In todays cloud market, providers are taking advantage of consumer reviews and ratings as a new marketing tool to establish their credibility. However, to achieve higher ratings, they need to enhance their service quality ...
  • Abdel Wahab, Omar; Bentahar, Jamal; Otrok, Hadi; Mourad, Azzam (2018-08-14)
    Distributed Denial of Service (DDoS) constitutes a major threat against cloud systems owing to the large financial losses it incurs. This motivated the security research community to investigate numerous detection techniques ...
  • Moati, Nadia; Otrok, Hadi; Mourad, Azzam; Robert, Jean-Marc (2016-05-13)
    The QOLSR is a multimedia protocol that was designed on top of the optimized link state routing (OLSR) protocol for mobile ad hoc network. It considers the quality of service (QoS) of the nodes during the selection of the ...
  • Jebbaoui, Hussein; Mourad, Azzam; Otrok, Hadi; Haraty, Ramzi (2015-11-24)
    XACML (eXtensible Access Control Markup Language) policies, which are widely adopted for defining and controlling dynamic access among Web/cloud services, are becoming more complex in order to handle the significant growth ...
  • Mourad, Azzam; Otrok, Hadi; Yahyaoui, Hamdi; Baajour, Lama (IEEE, 2017-03-10)
    We introduce in this paper an abstract language on top of XACML (eXtensible Access Control Markup Language) for web services security. It is based on the automatic generation of XACML security policies from abstract XACML ...
  • Mourad, Azzam; Otrok, Hadi; Ayoubi, Sara (IEEE, 2017-03-08)
    In this paper, we introduce our approach for the automatic generation of BPEL (Business Process Execution Language) aspects from security policies. It is based on a synergy between policies, Aspect-Oriented Programming ...
  • Tout, Hanine; Mourad, Azzam; Yahyaoui, Hamdi; Talhi, Chamseddine; Otrok, Hadi (IEEE, 2017-03-10)
    By handling the orchestration, composition and interaction of Web services, the Business Process Execution Language (BPEL) has gained tremendous interest. However, such process-based language does not assure a secure ...
  • Dbouk, Toufic; Otrok, Hadi; Mourad, Azzam; Talhi, Chamseddine (IEEE, 2018-08-14)
    As the usage of smart devices is increasing, malware affecting such devices is rapidly evolving as well. Security risks affecting the confidentiality, integrity, and privacy of smart devices are rapidly emerging. Mobile ...
  • Abdul Wahad, Omar; Bentahar, Jamal; Otrok, Hadi; Mourad, Azzam (2017-02-06)
    The prominence of cloud computing led to unprecedented proliferation in the number of Web services deployed in cloud data centers. In parallel, service communities have gained recently increasing interest due to their ...
  • Tout, Hanine; Mourad, Azzam; Otrok, Hadi (2015-11-24)
    Web service orchestration represents an open and standards-based approach for connecting web services together leading to higher level of business processes. Business Process Execution Language (BPEL) engines are designed ...

Search LAUR


Advanced Search

Browse

My Account