default search action
Anas Abou El Kalam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Souhail Mssassi, Anas Abou El Kalam:
Game Theory-Based Incentive Design for Mitigating Malicious Behavior in Blockchain Networks. J. Sens. Actuator Networks 13(1): 7 (2024) - [e5]KC Santosh, Aaisha Makkar, Myra Conway, Ashutosh Kumar Singh, Antoine Vacavant, Anas Abou El Kalam, Mohamed-Rafik Bouguelia, Ravindra S. Hegadi:
Recent Trends in Image Processing and Pattern Recognition - 6th International Conference, RTIP2R 2023, Derby, UK, December 7-8, 2023, Revised Selected Papers, Part I. Communications in Computer and Information Science 2026, Springer 2024, ISBN 978-3-031-53081-4 [contents] - [e4]KC Santosh, Aaisha Makkar, Myra Conway, Ashutosh Kumar Singh, Antoine Vacavant, Anas Abou El Kalam, Mohamed-Rafik Bouguelia, Ravindra S. Hegadi:
Recent Trends in Image Processing and Pattern Recognition - 6th International Conference, RTIP2R 2023, Derby, UK, December 7-8, 2023, Revised Selected Papers, Part II. Communications in Computer and Information Science 2027, Springer 2024, ISBN 978-3-031-53084-5 [contents] - 2023
- [c53]Anas Abou El Kalam:
A Novel Biometric Authentication Based on Blockchain and Watermarking. RTIP2R (1) 2023: 371-386 - 2021
- [j14]Anas Abou El Kalam:
Securing SCADA and critical industrial systems: From needs to security mechanisms. Int. J. Crit. Infrastructure Prot. 32: 100394 (2021) - [j13]Mohamed Talha, Anas Abou El Kalam:
Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms. J. Univers. Comput. Sci. 27(12): 1300-1324 (2021) - [c52]Hamza Es-Samaali, Aissam Outchakoucht, Siham Benhadou, Oussama Mounnan, Anas Abou El Kalam:
Anomaly Detection for Big Data Security: A Benchmark. BDET 2021: 35-39 - [c51]Mohamed Talha, Anas Abou El Kalam:
Big Data: Towards a Collaborative Security System at the Service of Data Quality. HIS 2021: 595-606 - 2020
- [j12]Muhammad Talha, Nabil Elmarzouqi, Anas Abou El Kalam:
Quality and Security in Big Data: Challenges as opportunities to build a powerful wrap-up solution. J. Ubiquitous Syst. Pervasive Networks 12(1): 9-15 (2020) - [c50]Oussama Mounnan, Abdelkrim El Mouatasim, Otman Manad, Tarik Hidar, Anas Abou El Kalam, Noureddine Idboufker:
Privacy-Aware and Authentication based on Blockchain with Fault Tolerance for IoT enabled Fog Computing. FMEC 2020: 347-352 - [c49]Lamia El Haourani, Anas Abou El Kalam, Abdellah Ait Ouahman:
Big Data security and privacy techniques. NISS 2020: 22:1-22:9 - [c48]Jihane El Mokhtari, Anas Abou El Kalam, Siham Benhadou, Jean-Philippe Leroy:
Transformation of PrivUML into XACML Using QVT. SoCPaR 2020: 984-996
2010 – 2019
- 2019
- [c47]Oussama Mounnan, Anas Abou El Kalam, Lamia El Haourani:
Decentralized Access Control Infrastructure using Blockchain for Big Data. AICCSA 2019: 1-8 - [c46]Jihane El Mokhtari, Anas Abou El Kalam, Siham Benhadou, H. Medroumi:
PrivUML: A Privacy Metamodel. ANT/EDI40 2019: 53-60 - [c45]Muhammad Talha, Anas Abou El Kalam, Nabil Elmarzouqi:
Big Data: Trade-off between Data Quality and Data Security. ANT/EDI40 2019: 916-922 - 2018
- [c44]Anas Abou El Kalam, Aissam Outchakoucht, Hamza Es-Samaali:
Emergence-Based Access Control: New Approach to Secure the Internet of Things. DTUC 2018: 15:1-15:11 - [c43]Lamia El Haourani, Anas Abou El Kalam, Abdellah Ait Ouahman:
Knowledge Based Access Control a model for security and privacy in the Big Data. SCA 2018: 16:1-16:8 - 2017
- [j11]Aafaf Ouaddah, Hajar Mousannif, Anas Abou El Kalam, Abdellah Ait Ouahman:
Access control in the Internet of Things: Big challenges and new opportunities. Comput. Networks 112: 237-262 (2017) - [c42]Abdeljalil Agnaou, Anas Abou El Kalam, Abdellah Ait Ouahman:
Towards a Collaborative Architecture of Honeypots. AICCSA 2017: 1299-1305 - [c41]Sana Ibjaoun, Anas Abou El Kalam, Vincent Poirriez, Abdellah Ait Ouahman:
Biometric Template Privacy Using Visual Cryptography. IBICA 2017: 309-317 - [c40]Aafaf Ouaddah, Anas Abou El Kalam, Abdellah Ait Ouahman:
Harnessing the power of blockchain technology to solve IoT security & privacy issues. ICC 2017: 7:1-7:10 - [c39]Najim Ammari, Almokhtar Ait El Mrabti, Anas Abou El Kalam, Abdellah Ait Ouahman:
Securing the mobile environment: firewall anti-leak of sensitive data on smartphone. ICC 2017: 126:1-126:6 - [c38]Almokhtar Ait El Mrabti, Najim Ammari, Anas Abou El Kalam, Abdellah Ait Ouahman, Mina De Montfort:
Mobile app security by fragmentation "MASF". ICC 2017: 128:1-128:6 - 2016
- [j10]Aafaf Ouaddah, Anas Abou El Kalam, Abdellah Ait Ouahman:
FairAccess: a new Blockchain-based access control framework for the Internet of Things. Secur. Commun. Networks 9(18): 5943-5964 (2016) - [j9]Anas Abou El Kalam, Antoine Ferreira, Frédéric Kratz:
Bilateral Teleoperation System Using QoS and Secure Communication Networks for Telemedicine Applications. IEEE Syst. J. 10(2): 709-720 (2016) - [c37]Sana Ibjaoun, Anas Abou El Kalam, Vincent Poirriez, Abdellah Ait Ouahman, Mina De Montfort:
Analysis and enhancements of an efficient biometric-based remote user authentication scheme using smart cards. AICCSA 2016: 1-8 - [c36]Najim Ammari, Almokhtar Ait El Mrabti, Anas Abou El Kalam, Abdellah Ait Ouahman:
Firewall Anti-Leak of Sensitive Data. ANT/SEIT 2016: 1226-1231 - [c35]Mounia El Anbal, Anas Abou El Kalam, Siham Benhadou, Fouad Moutaouakkil, Hicham Medromi:
Securing SCADA Critical Network Against Internal and External Threats - Short Paper. CRITIS 2016: 328-339 - [c34]Aafaf Ouaddah, Hajar Mousannif, Anas Abou El Kalam, Abdellah Ait Ouahman:
Access control in IoT: Survey & state of the art. ICMCS 2016: 272-277 - [i3]Abdeljalil Agnaou, Anas Abou El Kalam, Abdellah Ait Ouahman, Mina De Montfort:
Reduce positive and negative falses from attacks collected from the deployment of distributed honeypot network. CoRR abs/1611.03252 (2016) - 2015
- [j8]Abdeljebar Ameziane El Hassani, Anas Abou El Kalam, Adel Bouhoula, Ryma Abassi, Abdellah Ait Ouahman:
Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity. Int. J. Inf. Sec. 14(4): 367-385 (2015) - [c33]Imane Bouij-Pasquier, Abdellah Ait Ouahman, Anas Abou El Kalam, Mina Ouabiba de Montfort:
SmartOrBAC security and privacy in the Internet of Things. AICCSA 2015: 1-8 - [c32]Imane Bouij-Pasquier, Anas Abou El Kalam, Abdellah Ait Ouahman, Mina De Montfort:
A Security Framework for Internet of Things. CANS 2015: 19-31 - [c31]Amina Saadaoui, Hajar Benmoussa, Adel Bouhoula, Anas Abou El Kalam:
Automatic Classification and Detection of Snort Configuration Anomalies - a Formal Approach. CISIS-ICEUTE 2015: 27-39 - [c30]Hajar Benmoussa, Anas Abou El Kalam, Abdellah Ait Ouahman:
Distributed Intrusion Detection System based on Anticipation and Prediction Approach. SECRYPT 2015: 343-348 - 2014
- [j7]Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam:
Conflict detection in obligation with deadline policies. EURASIP J. Inf. Secur. 2014: 13 (2014) - [j6]Anas Abou El Kalam, Mohammed Gad El Rab, Yves Deswarte:
A model-driven approach for experimental evaluation of intrusion detection systems. Secur. Commun. Networks 7(11): 1955-1973 (2014) - [c29]My Youssef Ichahane, Mohamed Chiny, Anas Abou El Kalam, Abdellah Ait Ouahman:
Introduction to identity usurpation applied to biometric modalities. ICMCS 2014: 1248-1255 - [c28]Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam:
Specifying and enforcing constraints in dynamic access control policies. PST 2014: 290-297 - [c27]Khalid Nasr, Anas Abou El Kalam:
A Novel Metric for the Evaluation of IDSs Effectiveness. SEC 2014: 220-233 - [e3]Nora Cuppens-Boulahia, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans:
ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. IFIP Advances in Information and Communication Technology 428, Springer 2014, ISBN 978-3-642-55414-8 [contents] - 2013
- [c26]Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam:
Conflict Management in Obligation with Deadline Policies. ARES 2013: 52-61 - 2012
- [j5]Anas Abou El Kalam, Mohamed Maachaoui, Noureddine Idboufker, H. Ait Lahcen, Abdellah Ait Ouahman:
A Secure Architecture for Nomadic User in IMS Network. Int. J. Mob. Comput. Multim. Commun. 4(1): 1-17 (2012) - [c25]Mohamed Maachaoui, Anas Abou El Kalam, Christian Fraboul, Abdellah Ait Ouahman:
Multi-level Authentication Based Single Sign-On for IMS Services. Communications and Multimedia Security 2012: 174-187 - [c24]Khalid Nasr, Anas Abou El Kalam, Christian Fraboul:
Performance Analysis of Wireless Intrusion Detection Systems. IDCS 2012: 238-252 - [c23]Abdeljebar Ameziane El Hassani, Anas Abou El Kalam, Abdellah Ait Ouahman:
Integrity-Organization Based Access Control for Critical Infrastructure Systems. Critical Infrastructure Protection 2012: 31-42 - 2011
- [j4]Mahmoud Mostafa, Anas Abou El Kalam, Mohamed Maachaoui, Noureddine Idboufker:
Specification, implementation and performance evaluation of the QoS-friendly encapsulating security payload (Q-ESP) protocol. Secur. Commun. Networks 4(12): 1387-1404 (2011) - [c22]Mohamed Maachaoui, Anas Abou El Kalam, Christian Fraboul:
A Secure One-Way Authentication Protocol in IMS Context. Communications and Multimedia Security 2011: 222-231 - [c21]Mahmoud Mostafa, Anas Abou El Kalam, Dragos Minuta, Christian Fraboul:
QoS-aware Firewall Session Table. CRiSIS 2011: 55-61 - [c20]Khalid Nasr, Anas Abou El Kalam, Christian Fraboul:
A holistic methodology for evaluating wireless Intrusion Detection Systems. NSS 2011: 9-16 - [p1]Anas Abou El Kalam, Carlos Aguilar Melchor, Stefan Berthold, Jan Camenisch, Sebastian Clauß, Yves Deswarte, Markulf Kohlweiss, Andriy Panchenko, Lexi Pimenidis, Matthieu Roy:
Further Privacy Mechanisms. Digital Privacy - PRIME 2011: 485-555
2000 – 2009
- 2009
- [b2]Anas Abou El Kalam:
Sécurité des réseaux et infrastructures critiques. (Security of critical infrastructures and Networks). National Polytechnic Institute of Toulouse, France, 2009 - [j3]Anas Abou El Kalam, Yves Deswarte, Amine Baïna, Mohamed Kaâniche:
PolyOrBAC: A security framework for Critical Infrastructures. Int. J. Crit. Infrastructure Prot. 2(4): 154-169 (2009) - [j2]Mahmoud Mostafa, Anas Abou El Kalam, Christian Fraboul:
A new protocol for security and QoS in IP networks. Int. J. Inf. Comput. Secur. 3(3/4): 245-264 (2009) - [c19]Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte:
Manipulation of Network Traffic Traces for Security Evaluation. AINA Workshops 2009: 1124-1129 - [c18]Mahmoud Mostafa, Anas Abou El Kalam, Christian Fraboul:
Q-ESP: A QoS-Compliant Security Protocol to Enrich IPSec Framework. NTMS 2009: 1-6 - [c17]Anas Abou El Kalam, Philippe Balbiani:
A Policy Language for Modelling Recommendations. SEC 2009: 176-189 - [e2]Anas Abou El Kalam, Yves Deswarte, Mahmoud Mostafa:
CRiSIS 2009, Post-Proceedings of the Fourth International Conference on Risks and Security of Internet and Systems, Toulouse, France, October 19-22, 2009. IEEE 2009, ISBN 978-1-4244-4498-4 [contents] - [i2]Mahmoud Mostafa, Anas Abou El Kalam, Christian Fraboul:
Extending Firewall Session Table to Accelerate NAT, QoS Classification and Routing. CoRR abs/0911.4033 (2009) - [i1]Mahmoud Mostafa, Anas Abou El Kalam, Christian Fraboul:
Q-ESP: a QoS-compliant Security Protocol to enrich IPSec Framework. CoRR abs/0911.4034 (2009) - 2008
- [c16]Amine Baïna, Yves Deswarte, Anas Abou El Kalam, Mohamed Kaâniche:
Access control for cooperative systems: A comparative analysis. CRiSIS 2008: 19-26 - [c15]Mahmoud Mostafa, Anas Abou El Kalam, Christian Fraboul:
EESP: A Security protocol that supports QoS management. CRiSIS 2008: 159-167 - [c14]Anas Abou El Kalam, Yves Deswarte:
Critical Infrastructures Security Modeling, Enforcement and Runtime Checking. CRITIS 2008: 95-108 - [c13]Amine Baïna, Anas Abou El Kalam, Yves Deswarte, Mohamed Kaâniche:
Collaborative Access Control For Critical Infrastructures. Critical Infrastructure Protection 2008: 189-201 - [c12]Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte:
Execution Patterns in Automatic Malware and Human-Centric Attacks. NCA 2008: 29-36 - [c11]Anas Abou El Kalam:
A research challenge in modeling access control policies: Modeling recommendations. RCIS 2008: 263-270 - 2007
- [c10]Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte:
Defining categories to select representative attack test-cases. QoP 2007: 40-42 - [c9]Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia, Yves Deswarte, Anas Abou El Kalam, Andrea Bondavalli, Alessandro Daidone:
The CRUTIAL Architecture for Critical Information Infrastructures. WADS 2007: 1-27 - [c8]Anas Abou El Kalam, Yves Deswarte, Amine Baïna, Mohamed Kaâniche:
Access Control for Collaborative Systems: A Web Services Based Approach. ICWS 2007: 1064-1071 - 2005
- [c7]Anas Abou El Kalam, Yves Deswarte:
Privacy Requirements Implemented with a JavaCard. ACSAC 2005: 527-536 - [c6]Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier:
Personal data anonymization for security and privacy in collaborative environments. CTS 2005: 56-61 - [c5]Anas Abou El Kalam, Jérémy Briffaut, Christian Toinard, Mathieu Blanc:
Intrusion detection and security policy framework for distributed environments. CTS 2005: 100-105 - 2004
- [j1]Yves Deswarte, Anas Abou El Kalam:
Modèle de sécurité pour le secteur de la santé. Tech. Sci. Informatiques 23(3): 291-321 (2004) - [c4]Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier:
Smartcard-based Anonymization. CARDIS 2004: 49-66 - [c3]Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier:
A generic approach for healthcare data anonymization. WPES 2004: 31-32 - [e1]Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, Anas Abou El Kalam:
Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8/WG8.8 & TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France. IFIP 153, Kluwer/Springer 2004, ISBN 1-4020-8146-4 [contents] - 2003
- [b1]Anas Abou El Kalam:
Modèles et politiques de securite pour les domaines de la SANTE et des Affaires sociales. (Security policies and models for Health Care Computing and Communication Systems). National Polytechnic Institute of Toulouse, France, 2003 - [c2]Anas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida, Frédéric Cuppens, Claire Saurel, Philippe Balbiani, Yves Deswarte, Gilles Trouessin:
Organization based access contro. POLICY 2003: 120- - [c1]Anas Abou El Kalam, Yves Deswarte:
Security Model for Health Care Computing and Communication Systems. SEC 2003: 277-288
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 17:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint