khalifa toumi
khalifa toumi
Telecom Management SudParis
Verified email at telecom-sudparis.eu
Title
Cited by
Cited by
Year
Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments
K Toumi, C Andrés, A Cavalli
International Conference on Information Systems Security, 89-103, 2012
292012
Adaptive policy-driven attack mitigation in SDN
R Sahay, G Blanc, Z Zhang, K Toumi, H Debar
Proceedings of the 1st International Workshop on Security and Dependability …, 2017
152017
Link reliable and trust aware RPL routing protocol for Internet of Things
A Lahbib, K Toumi, S Elleuch, A Laouiti, S Martin
2017 IEEE 16th International Symposium on Network Computing and Applications …, 2017
132017
Role based interoperability security policies in collaborative systems
K Toumi, A Cavalli, MEL Maarabani
2012 International Conference on Collaboration Technologies and Systems (CTS …, 2012
122012
Blockchain based trust management mechanism for IoT
A Lahbib, K Toumi, A Laouiti, A Laube, S Martin
2019 IEEE Wireless Communications and Networking Conference (WCNC), 1-8, 2019
102019
A vector based model approach for defining trust in multi-organization environments
K Toumi, C Andrés, A Cavalli, M El Maarabani
2012 7th International Conference on Risks and Security of Internet and …, 2012
102012
HAT: HIP address translation protocol for hybrid RFID/IP internet of things communication
K Toumi, M Ayari, LA Saidane, M Bouet, G Pujolle
2010 International Conference on Wireless and Ubiquitous Systems, 1-7, 2010
92010
HIP-Tags architecture implementation for the Internet of Things
P Urien, S Elrharbi, D Nyamy, H Chabanne, T Icart, F Lecocq, C Pépin, ...
2009 First Asian Himalayas International Conference on Internet, 1-5, 2009
82009
A novel data exploitation framework based on blockchain
O Dib, C Huyart, K Toumi
Pervasive and Mobile Computing 61, 101104, 2020
72020
TrustCall: A trust computation model for Web conversational services
IT Javed, K Toumi, N Crespi
IEEE Access 5, 24376-24388, 2017
72017
Usage control policy enforcement in sdn-based clouds: A dynamic availability service use case
K Toumi, MS Idrees, F Charmet, R Yaich, G Blanc
2016 IEEE 18th International Conference on High Performance Computing and …, 2016
52016
How to evaluate trust using MMT
K Toumi, W Mallouli, EM de Oca, C Andrés, A Cavalli
International Conference on Network and System Security, 484-492, 2015
52015
Br2br: A vector-based trust framework for webrtc calling services
IT Javed, K Toumi, N Crespi, A Mohammadinejad
2016 IEEE 18th International Conference on High Performance Computing and …, 2016
42016
On modeling and testing security properties of vehicular networks
MHE Aouadi, K Toumi, A Cavalli
2014 IEEE Seventh International Conference on Software Testing, Verification …, 2014
42014
Preserving confidentiality during the migration of virtual SDN topologies: A formal approach
F Charmet, R Waldinger, G Blanc, C Kiennert, K Toumi
2017 IEEE 16th International Symposium on Network Computing and Applications …, 2017
32017
An active testing tool for security testing of distributed systems
MHE Aouadi, K Toumi, A Cavalli
2015 10th International Conference on Availability, Reliability and Security …, 2015
32015
A formal approach to automatic testing of security policies specified in XACML
MHE Aouadi, K Toumi, A Cavalli
International Symposium on Foundations and Practice of Security, 367-374, 2014
32014
Testing security policies for distributed systems: vehicular networks as a case study
MHE Aouadi, K Toumi, A Cavalli
arXiv preprint arXiv:1410.5789, 2014
32014
UTM-chain: blockchain-based secure unmanned traffic management for internet of drones
A Allouch, O Cheikhrouhou, A Koubâa, K Toumi, M Khalgui, ...
Sensors 21 (9), 3049, 2021
22021
Decentralized identity systems: Architecture, challenges, solutions and future directions
O Dib, K Toumi
Annals of Emerging Technologies in Computing (AETiC), Print ISSN, 2516-0281, 2020
22020
The system can't perform the operation now. Try again later.
Articles 1–20