Search Results - "Ouaddah, Aafaf"

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Access control in the Internet of Things: Big challenges and new opportunities by Ouaddah, Aafaf, Mousannif, Hajar, Abou Elkalam, Anas, Ait Ouahman, Abdellah

    “…In this paper, an extensive state of the art review of different access control solutions in IoT within the Objectives, Models, Architecture and Mechanisms…”
    Get full text
    Journal Article
  2. 2

    FairAccess: a new Blockchain‐based access control framework for the Internet of Things by Ouaddah, Aafaf, Abou Elkalam, Anas, Ait Ouahman, Abdellah

    Published in Security and communication networks (01-12-2016)
    “…Security and privacy are huge challenges in Internet of Things (IoT) environments, but unfortunately, the harmonization of the IoT‐related standards and…”
    Get full text
    Journal Article
  3. 3

    Machine learning in identity and access management systems: Survey and deep dive by Aboukadri, Sara, Ouaddah, Aafaf, Mezrioui, Abdellatif

    Published in Computers & security (01-04-2024)
    “…The evolution of identity and access management (IAM) has been driven by the expansion of online services, cloud computing, and the Internet of Things (IoT)…”
    Get full text
    Journal Article
  4. 4

    IoT-Gov: A structured framework for internet of things governance by Sedrati, Anass, Mezrioui, Abdellatif, Ouaddah, Aafaf

    “…The rise of artificial intelligence and smart devices with decision-making capabilities has highlighted the critical need for governance in the field of IoT…”
    Get full text
    Journal Article
  5. 5

    Drawing the Boundaries Between Blockchain and Blockchain-Like Systems: A Comprehensive Survey on Distributed Ledger Technologies by Bellaj, Badr, Ouaddah, Aafaf, Bertin, Emmanuel, Crespi, Noel, Mezrioui, Abdellatif

    Published in Proceedings of the IEEE (01-03-2024)
    “…Bitcoin's success as a global cryptocurrency has paved the way for the emergence of blockchain, a revolutionary category of distributed systems. However, the…”
    Get full text
    Journal Article
  6. 6

    IoT-Gov: an IoT governance framework using the blockchain by Sedrati, Anass, Ouaddah, Aafaf, Mezrioui, Abdellatif, Bellaj, Badr

    Published in Computing (01-10-2022)
    “…Internet of Things (IoT) has become an essential technology in different daily life domains including health, industry and finance among many others. The…”
    Get full text
    Journal Article
  7. 7

    BTrust: A New Blockchain-Based Trust Management Protocol for Resource Sharing by Bellaj, Badr, Ouaddah, Aafaf, Bertin, Emmanuel, Crespi, Noel, Mezrioui, Abdellatif, Bellaj, Khalid

    Published in Journal of network and systems management (01-10-2022)
    “…The emergence of blockchain technology and cryptocurrencies opened the possibility for building novel peer-to-peer (P2P) resource allocation and sharing…”
    Get full text
    Journal Article
  8. 8

    Access control in IoT: Survey & state of the art by Ouaddah, Aafaf, Mousannif, Hajar, Abou Elkalam, Anas, Ait Ouahman, Abdellah

    “…The goal of this paper is to survey access control models, protocols and frameworks in IoT. We provide a literature overview and discuss in a qualitative way…”
    Get full text
    Conference Proceeding
  9. 9

    Machine Learning based Identity and Access Management Systems (ML I&AM): a Taxonomy by Aboukadri, Sara, Ouaddah, Aafaf, Mezrioui, Abdellatif

    “…Identity and access management (I&AM) systems are at the heart of every organization that is conscious of its own operations. Major corporations and software…”
    Get full text
    Conference Proceeding
  10. 10

    Drawing the boundaries between Blockchain and Blockchain-like systems: A Comprehensive Survey on Distributed Ledger Technologies by Bellaj, Badr, Ouaddah, Aafaf, Crespi, Noel, Mezrioui, Abdelatif, Bertin, Emmanuel

    Published 26-09-2024
    “…Bitcoin's global success has led to the rise of blockchain, but many systems labeled as "blockchain" deviate from its core principles, adding complexity to the…”
    Get full text
    Journal Article
  11. 11

    Exploring blockchain-based Self Sovereign Identity Systems: challenges and comparative analysis by Eddine, Bahya Nassr, Ouaddah, Aafaf, Mezrioui, Abdellatif

    “…This paper highlights the challenges that an Identity Management System (IdM) must overcome and gives a comparative analysis of three Self-Sovereign Identity…”
    Get full text
    Conference Proceeding
  12. 12

    SOK: A Comprehensive Survey on Distributed Ledger Technologies by Bellaj, Badr, Ouaddah, Aafaf, Bertin, Emmanuel, Crespi, Noel, Mezrioui, Abdellatif

    “…In recent years, Blockchain arose as a key technology in building autonomous decentralised financial systems. Its ability to digitize trust enables building…”
    Get full text
    Conference Proceeding
  13. 13

    GBTrust: Leveraging Edge Attention in Graph Neural Networks for Trust Management in P2P Networks by Bellaj, Badr, Ouaddah, Aafaf, Mezrioui, Abdelattif, Crespi, Noel, Bertin, Emmanuel

    “…Trust is an important factor in the success of P2P networks. It is needed to ensure that nodes in the network can be trusted to behave honestly and to deliver…”
    Get full text
    Conference Proceeding
  14. 14

    A Transpilation-Based Approach to Writing Secure Access Control Smart Contracts by Bellaj, Badr, Ouaddah, Aafaf, Crespi, Noel, Mezrioui, Abdellatif, Bertin, Emmanuel

    “…In blockchain space, access control is a crucial aspect of smart contract development, as it guarantees that only authorized users can execute specific…”
    Get full text
    Conference Proceeding
  15. 15

    DCEA: A Reference model for Distributed Ledger Technologies by Bellaj, Badr, Ouaddah, Aafaf, Bertin, Emmanuel, Crespi, Noel, Mezrioui, Abdellatif

    “…Bitcoin's notable success at operating autonomously as a global peer-to-peer network opened the door to a new revolutionary class of distributed systems:…”
    Get full text
    Conference Proceeding
  16. 16

    Security analysis and proposal of new access control model in the Internet of Thing by Ouaddah, Aafaf, Bouij-Pasquier, Imane, Abou Elkalam, Anas, Ait Ouahman, Abdellah

    “…The Internet of Things (IoT) represents a concept where the barriers between the real world and the cyber-world are progressively annihilated through the…”
    Get full text
    Conference Proceeding
  17. 17

    Access control models in IoT: The road ahead by Ouaddah, Aafaf, Mousannif, Hajar, Ait Ouahman, Abdellah

    “…In this paper, we survey access control models, protocols and frameworks in IoT. We briefly provide a literature overview and discuss in a qualitative way the…”
    Get full text
    Conference Proceeding Journal Article