Search Results - "Itani, W."

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Quantum computing for fluids: Where do we stand? by Succi, Sauro, Itani, W., Sreenivasan, K., Steijl, R.

    Published in Europhysics letters (01-10-2023)
    “…We present a pedagogical introduction to the current state of quantum computing algorithms for the simulation of classical fluids. Different strategies, along…”
    Get full text
    Journal Article
  2. 2

    J2ME end-to-end security for M-commerce by Itani, W., Kayssi, A.I.

    “…This paper shows an end-to-end application-layer security solution for wireless enterprise applications using the Java 2 Platform Micro Edition (J2ME). The…”
    Get full text
    Conference Proceeding
  3. 3

    Short Paper: PATRIOT- a Policy-Based, Multi-level Security Protocol for Safekeeping Audit Logs on Wireless Devices by Itani, W., Kayssi, A., Chehab, A.

    “…This paper presents PATRIOT (Policy-bAsed, mulTi-level secuRIty prOTocol), an optimized, policy-driven security architecture for protecting the confidentiality…”
    Get full text
    Conference Proceeding
  4. 4

    SPECSA: a scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applications by Itani, W., Kayssi, A.I.

    “…This paper presents SPECSA, a new, optimized, policy-driven security architecture for wireless enterprise applications. SPECSA is scalable, extensible,…”
    Get full text
    Conference Proceeding
  5. 5

    J2ME application-layer end-to-end security for m-commerce by Itani, Wassim, Kayssi, Ayman

    “…This paper shows an end-to-end application-layer security solution for wireless enterprise applications using the Java 2 Platform Micro Edition (J2ME). The…”
    Get full text
    Journal Article
  6. 6

    Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures by Itani, W., Kayssi, A., Chehab, A.

    “…In this paper we present PasS (privacy as a service); a set of security protocols for ensuring the privacy and legal compliance of customer data in cloud…”
    Get full text
    Conference Proceeding
  7. 7

    SPECSA: a scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applications by Itani, Wassim, Kayssi, Ayman

    Published in Computer communications (01-12-2004)
    “…This paper presents SPECSA, a new, optimized, policy-driven security architecture for wireless enterprise applications. SPECSA is scalable, extensible,…”
    Get full text
    Journal Article
  8. 8

    Energy-efficient incremental integrity for securing storage in mobile cloud computing by Itani, W, Kayssi, A, Chehab, A

    “…We present an energy-efficient protocol for ensuring the integrity of storage services in mobile cloud computing. The proposed protocol applies the concepts of…”
    Get full text
    Conference Proceeding
  9. 9

    Secure delay-tolerant communications in the presence of oppressive governments by Saab, S., Itani, W., Kayssi, A., Chehab, A., Ghali, C.

    “…In this paper, we attempt to develop a secure delay-tolerant network system that enables citizens to communicate freely in an environment where public…”
    Get full text
    Conference Proceeding
  10. 10

    Energy-efficient platform-as-a-service security provisioning in the cloud by Itani, W., Chehab, A., Kayssi, A.

    “…In this paper we present ENUAGE, a platform as a service security framework for provisioning secure and scalable multi-layered services based on the cloud…”
    Get full text
    Conference Proceeding
  11. 11

    Security analysis and solution for thwarting cache poisoning attacks in the Domain Name System by Bassil, R., Hobeica, R., Itani, W., Ghali, C., Kayssi, A., Chehab, A.

    “…The Domain Name System is a crucial part of the Internet's infrastructure, as it provides basic information that is vital for the proper operation of the…”
    Get full text
    Conference Proceeding
  12. 12

    SINE: Cache-friendly integrity for the web by Gaspard, C., Goldberg, S., Itani, W., Bertino, E., Nita-Rotaru, C.

    “…In this paper we present SINE, a cache-friendly protocol for integrity-enforced web documents. SINE operates by decoupling integrity from confidentiality and…”
    Get full text
    Conference Proceeding
  13. 13

    NISp1-09: PRIDE: Policy-Driven Web Security for Handheld Wireless Devices by Itani, W., Gaspard, C., Kayssi, A., Chehab, A.

    Published in IEEE Globecom 2006 (01-11-2006)
    “…In this paper we present PRIDE (Policy-driven web secuRity for handheld wireless DEvices) as an efficient security architecture for assuring the…”
    Get full text
    Conference Proceeding
  14. 14

    SinPack: A Security Protocol for Preventing Pollution Attacks in Network-Coded Content Distribution Networks by Itani, W, Ghali, César, El Hajj, A, Kayssi, A, Chehab, A

    “…We present SinPack, a security protocol for preventing packet pollution attacks in network-coded content distribution networks. SinPack employs a…”
    Get full text
    Conference Proceeding
  15. 15

    Formal approaches to requirements engineering: from behavior trees to alloy by Itani, W., Logrippo, L.

    “…Requirements modeling is receiving a good deal of attention from the software engineering community. However, the lack of formal representation and tool…”
    Get full text
    Conference Proceeding
  16. 16

    SECERN: A Secure Enterprise Backup and Recovery System for Mission-Critical Relational Database Servers by Itani, W., Kayssi, A., Chehab, A.

    Published in 2006 Innovations in Information Technology (01-11-2006)
    “…In this paper we present SECERN, a secure enterprise backup and recovery system for mission-critical relational database servers. SECERN operates on the…”
    Get full text
    Conference Proceeding