Search Results - "Daoudagh, Said"

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Data Protection by Design in the Context of Smart Cities: A Consent and Access Control Proposal by Daoudagh, Said, Marchetti, Eda, Savarino, Vincenzo, Bernabe, Jorge Bernal, García-Rodríguez, Jesús, Moreno, Rafael Torres, Martinez, Juan Antonio, Skarmeta, Antonio F.

    Published in Sensors (Basel, Switzerland) (28-10-2021)
    “…The growing availability of mobile devices has lead to an arising development of smart cities services that share a huge amount of (personal) information and…”
    Get full text
    Journal Article
  2. 2

    COVID-19 & privacy: Enhancing of indoor localization architectures towards effective social distancing by Barsocchi, Paolo, Calabrò, Antonello, Crivello, Antonino, Daoudagh, Said, Furfari, Francesco, Girolami, Michele, Marchetti, Eda

    Published in Array (New York) (01-03-2021)
    “…The way people access services in indoor environments has dramatically changed in the last year. The countermeasures to the COVID-19 pandemic imposed a…”
    Get full text
    Journal Article
  3. 3

    An automated framework for continuous development and testing of access control systems by Daoudagh, Said, Lonetti, Francesca, Marchetti, Eda

    “…Automated testing in DevOps represents a key factor for providing fast release of new software features assuring quality delivery. In this paper, we introduce…”
    Get full text
    Journal Article
  4. 4

    XACMET: XACML Testing & Modeling: An automated model-based testing solution for access control systems by Daoudagh, Said, Lonetti, Francesca, Marchetti, Eda

    Published in Software quality journal (01-03-2020)
    “…In the context of access control systems, testing activity is among the most adopted means to assure that sensible information or resources are correctly…”
    Get full text
    Journal Article
  5. 5

    Towards enhanced monitoring framework with smart predictions by Calabrò, Antonello, Daoudagh, Said, Marchetti, Eda

    Published in Logic journal of the IGPL (25-03-2024)
    “…Abstract Context: Predicting security and trust vulnerabilities and issues is crucial for IoT interconnected systems and ecosystems, especially when…”
    Get full text
    Journal Article
  6. 6

    XACMET: XACML Testing & Modeling by Daoudagh Said, Lonetti Francesca, Marchetti Eda

    Published in Software quality journal (01-03-2020)
    “…In the context of access control systems, testing activity is among the most adopted means to assure that sensible information or resources are correctly…”
    Get full text
    Journal Article
  7. 7

    An automated model-based test oracle for access control systems by Bertolino, Antonia, Daoudagh, Said, Lonetti, Francesca, Marchetti, Eda

    “…In the context of XACML-based access control systems, an intensive testing activity is among the most adopted means to assure that sensible information or…”
    Get full text
    Conference Proceeding
  8. 8

    Similarity testing for access control by Bertolino, Antonia, Daoudagh, Said, El Kateb, Donia, Henard, Christopher, Le Traon, Yves, Lonetti, Francesca, Marchetti, Eda, Mouelhi, Tejeddine, Papadakis, Mike

    Published in Information and software technology (01-02-2015)
    “…•A new approach for access control test prioritization based on similarity.•Two XACML similarity metrics, one of them exploiting the XACML policy…”
    Get full text
    Journal Article
  9. 9

    Testing of PolPA-based usage control systems by Bertolino, Antonia, Daoudagh, Said, Lonetti, Francesca, Marchetti, Eda, Martinelli, Fabio, Mori, Paolo

    Published in Software quality journal (01-06-2014)
    “…The implementation of an authorization system is a critical and error-prone activity that requires a careful verification and testing process. As a matter of…”
    Get full text
    Journal Article
  10. 10

    2HCDL: Holistic Human-Centered Development Lifecycle by Daoudagh, Said, Marchetti, Eda, Aktouf, Oum-El-Kheir

    Published 08-04-2024
    “…The recent events affecting global society continuously highlight the need to change the development lifecycle of complex systems by promoting human-centered…”
    Get full text
    Journal Article
  11. 11

    Predictive Simulation for Building Trust Within Service-Based Ecosystems by Cioroaica, Emilia, Daoudagh, Said, Marchetti, Eda

    “…Modern vehicles extend their system components outside the typical physical body, relying on functionalities provided by off-board resources within complex…”
    Get full text
    Conference Proceeding
  12. 12

    An automated model-based test oracle for access control systems by Bertolino, Antonia, Daoudagh, Said, Lonetti, Francesca, Marchetti, Eda

    Published 08-09-2018
    “…Proceedings of the 13th International Workshop on Automation of Software Test, pp. 2-8. ACM, 2018 In the context of XACML-based access control systems, an…”
    Get full text
    Journal Article
  13. 13

    Assessment of Access Control Systems Using Mutation Testing by Daoudagh, Said, Lonetti, Francesca, Marchetti, Eda

    “…In modern pervasive applications, it is important to validate access control mechanisms that are usually defined by means of the standard XACML language…”
    Get full text
    Conference Proceeding
  14. 14

    XACMUT: XACML 2.0 Mutants Generator by Bertolino, Antonia, Daoudagh, Said, Lonetti, Francesca, Marchetti, Eda

    “…Testing of security policies is a critical activity and mutation analysis is an effective approach for measuring the adequacy of a test suite. In this paper,…”
    Get full text
    Conference Proceeding
  15. 15

    An Automated Testing Framework of Model-Driven Tools for XACML Policy Specification by Bertolino, Antonia, Daoudagh, Said, Lonetti, Francesca, Marchetti, Eda

    “…Access Control is among the most important security mechanisms to put in place in order to secure applications. XACML is the de facto standard for storing and…”
    Get full text
    Conference Proceeding
  16. 16

    Automatic XACML Requests Generation for Policy Testing by Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E.

    “…Access control policies are usually specified by the XACML language. However, policy definition could be an error prone process, because of the many…”
    Get full text
    Conference Proceeding
  17. 17

    A toolchain for model-based design and testing of access control systems by Daoudagh, Said, El Kateb, Donia, Lonetti, Francesca, Marchetti, Eda, Mouelhi, Tejeddine

    “…In access control systems, aimed at regulating the accesses to protected data and resources, a critical component is the Policy Decision Point (PDP), which…”
    Get full text
    Conference Proceeding
  18. 18

    A Toolchain for Designing and Testing XACML Policies by Bertolino, Antonia, Busch, Marianne, Daoudagh, Said, Koch, Nora, Lonetti, Francesca, Marchetti, Eda

    “…In modern pervasive application domains, such as Service Oriented Architectures (SOAs) and Peer-to-Peer (P2P) systems, security aspects are critical. Justified…”
    Get full text
    Conference Proceeding
  19. 19

    Testing of PolPA authorization systems by Bertolino, Antonia, Daoudagh, Said, Lonetti, Francesca, Marchetti, Eda, Martinelli, Fabio, Mori, Paolo

    “…The implementation of an authorization system is a difficult and error-prone activity that requires a careful verification and testing process. In this paper,…”
    Get full text
    Conference Proceeding
  20. 20

    Testing of PolPA authorization systems by Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E., Martinelli, F., Mori, P.

    “…The implementation of an authorization system is a difficult and error-prone activity that requires a careful verification and testing process. In this paper,…”
    Get full text
    Conference Proceeding