.

Browsing SoAS - Scholarly Publications by Author "Talhi, Chamseddine"

LAUR Repository

Browsing SoAS - Scholarly Publications by Author "Talhi, Chamseddine"

Sort by: Order: Results:

  • Debbabi, Mourad; Mourad, Azzam; Talhi, Chamseddine; Yahyaoui, Hamdi (2015-09-15)
    With the proliferation of wireless devices, networks, and systems, the deployment of efficient embedded Java virtual machines is becoming a challenging and important research area. Accordingly, a plethora of acceleration ...
  • Mouheb, Djedjiga; Talhi, Chamseddine; Mourad, Azzam; Lima, Victor; Debbabi, Mourad; Wang, Lingyu; Pourzandi, Makan (2018-08-17)
    Security is a very challenging task in software engineering. Enforcing security policies should be taken care of during the early phases of the software development life cycle to prevent security breaches in the final ...
  • Mourad, Azzam; Tout, Hanine; Talhi, Chamseddine; Otrok, Hadi; Yahyaoui, Hamdi (2017-02-06)
    With lot of hype surrounding policy-based computing, XACML (eXtensible Access Control Markup Language) has become the widely used de facto standard for managing access to open and distributed service-based environments ...
  • Tout, Hanine; Mourad, Azzam; Talhi, Chamseddine; Otrok, Hadi; Yahyaoui, Hamdi (2020-09-08)
    Throughout the recent years, Web services security has been the target of many researchers. Particularly, by integrating policies and rules to govern the Web services behaviors at runtime, researchers have been able to ...
  • Dbouk, Toufic; Mourad, Azzam; Otrok, Hadi; Tout, Hanine; Talhi, Chamseddine (2021-04-15)
    While the usage of smart devices is increasing, security attacks and malware affecting such terminals are briskly evolving as well. Mobile security suites exist to defend devices against malware and other intrusions. ...
  • Tout, Hanine; Kara, Nadjia; Talhi, Chamseddine; Mourad, Azzam (2021-04-15)
    Latest mobile virtualization techniques have opened the door for multi-persona mobility to overcome security and privacy concerns of bring-your-own devices practice. Multi-persona allows a physical device to co-host multiple ...
  • Tout, Hanine; Talhi, Chamseddine; Kara, Nadjia; Mourad, Azzam (2017-02-06)
    Fueled by changes in professional application models, personal interests and desires and technological advances in mobile devices, multi-persona has emerged recently to keep balance between different aspects, in our daily ...
  • Tout, Hanine; Talhi, Chamseddine; Kara, Nadija; Mourad, Azzam (2018-08-14)
    Although mobile devices have been considerably upgraded to more powerful terminals, yet their lightness feature still impose intrinsic limitations in their computation capability, storage capacity and battery lifetime. ...
  • Tout, Hanine; Mourad, Azzam; Yahyaoui, Hamdi; Talhi, Chamseddine; Otrok, Hadi (IEEE, 2017-03-10)
    By handling the orchestration, composition and interaction of Web services, the Business Process Execution Language (BPEL) has gained tremendous interest. However, such process-based language does not assure a secure ...
  • Dbouk, Toufic; Otrok, Hadi; Mourad, Azzam; Talhi, Chamseddine (IEEE, 2018-08-14)
    As the usage of smart devices is increasing, malware affecting such devices is rapidly evolving as well. Security risks affecting the confidentiality, integrity, and privacy of smart devices are rapidly emerging. Mobile ...
  • Tout, Hanine; Talhi, Chamseddine; Kara, Nadjia; Mourad, Azzam (IEEE, 2017-03-10)
    Mobile virtualization is a key technology that is witnessing widespread adoption to realize multi-persona functionality capable of accommodating work, personal, and mobility needs on a single mobile terminal. Yet, unlike ...

Search LAUR


Advanced Search

Browse

My Account