Zobrazeno 1 - 10
of 94
pro vyhledávání: '"Anas Abou El Kalam"'
Autor:
Souhail Mssassi, Anas Abou El Kalam
Publikováno v:
Journal of Sensor and Actuator Networks, Vol 13, Iss 1, p 7 (2024)
This paper presents an innovative incentive model that utilizes graph and game theories to address the issue of node incentives in decentralized blockchain networks such as EVM blockchains. The lack of incentives for nodes within EVM networks gives r
Externí odkaz:
https://doaj.org/article/167e4eba94374e8a93d1f016201d81cc
Autor:
Mohamed Talha, Anas Abou El Kalam
Publikováno v:
Journal of Universal Computer Science, Vol 27, Iss 12, Pp 1300-1324 (2021)
Big Data often refers to a set of technologies dedicated to deal with large volumes of data. Data Quality and Data Security are two essential aspects for any Big Data project. While Data Quality Management Systems are about putting in place a set of
Externí odkaz:
https://doaj.org/article/2d95f27339574576a877c702a2567186
Publikováno v:
Hybrid Intelligent Systems ISBN: 9783031274084
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::26e52c1a3e23d75c03715e214982936d
https://doi.org/10.1007/978-3-031-27409-1_120
https://doi.org/10.1007/978-3-031-27409-1_120
Publikováno v:
International Journal of Safety and Security Engineering. 11:529-535
This article is devoted to the topic of coupling access and inference controls into security policies. The coupling of these two mechanisms is necessary to strengthen the protection of the privacy of complex systems users. Although the PrivOrBAC acce
Autor:
Mohamed Talha, Anas Abou El Kalam
Publikováno v:
Hybrid Intelligent Systems ISBN: 9783030963040
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::83a493d92147ce44b2755c32203eaeb3
https://doi.org/10.1007/978-3-030-96305-7_55
https://doi.org/10.1007/978-3-030-96305-7_55
Publikováno v:
Journal of Ubiquitous Systems and Pervasive Networks. 12:09-15
Publikováno v:
ANT/EDI40
As part of our work, we seek to define a modeling language for model-driven design of secure and privacy-friendly systems. Our approach is based on access control strengthened by the criteria of personal data protection. We show how UML can be used t
Publikováno v:
ANT/EDI40
The essence of an information system lies in the data; if it is not of good quality or not sufficiently protected, the consequences will undoubtedly be harmful. Quality and Security are two essential aspects that add value to data and their implement
Autor:
KC Santosh, Aaisha Makkar, Myra Conway, Ashutosh K. Singh, Antoine Vacavant, Anas Abou el Kalam, Mohamed-Rafik Bouguelia, Ravindra Hegadi
This book constitutes the refereed proceedings of the 6th International Conference on Recent Trends in Image Processing and Pattern Recognition, RTIP2R 2023, held in Derby, UK, during December 2023, in collaboration with the Applied AI Research Lab a
Publikováno v:
BDET
Among the many challenges in the Big Data Security field is that we have to secure a high volume and velocity flow of data, this cannot be done using classic static security methods, we need a different approach, one that can analyze the traffic in r