<script src="https://bibbase.org/service/mendeley/3f3cebd9-2c9e-33e2-9759-3b3c3deedc23/group/6d2dc4f5-aea7-35c9-874f-1d63cc94ab65?jsonp=1"></script>
<?php
$contents = file_get_contents("https://bibbase.org/service/mendeley/3f3cebd9-2c9e-33e2-9759-3b3c3deedc23/group/6d2dc4f5-aea7-35c9-874f-1d63cc94ab65");
print_r($contents);
?>
<iframe src="https://bibbase.org/service/mendeley/3f3cebd9-2c9e-33e2-9759-3b3c3deedc23/group/6d2dc4f5-aea7-35c9-874f-1d63cc94ab65"></iframe>
For more details see the documention.
To the site owner:
Action required! Mendeley is changing its API. In order to keep using Mendeley with BibBase past April 14th, you need to:
@inbook{ type = {inbook}, year = {2021}, pages = {307-331}, websites = {http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-4240-8.ch013}, publisher = {IGI Global}, city = {Hershey, PA, USA}, id = {2dee6ca9-8233-3283-b27c-3d4348f0538f}, created = {2021-01-28T21:39:34.699Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2021-01-28T22:11:15.397Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {fatih_pinarbasi_sentiment_2021}, source_type = {incollection}, private_publication = {false}, abstract = {Today, it is usual that a consumer seeks for others' feelings about their purchasing experience on the web before a simple decision of buying a product or a service. Sentiment analysis intends to help people in taking profit from the available opinionated texts on the web for their decision making, and business is one of its challenging areas. Considerable work of sentiment analysis has been achieved in English and other Indo-European languages. Despite the important number of Arabic speakers and internet users, studies in Arabic sentiment analysis are still insufficient. The current chapter vocation is to give the main challenges of Arabic sentiment together with their recent proposed solutions in the literature. The chapter flowchart is presented in a novel manner that obtains the main challenges from presented literature works. Then it gives the proposed solutions for each challenge. The chapter reaches the finding that the future tendency will be toward rule-based techniques and deep learning, allowing for more dealings with Arabic language inherent characteristics.}, bibtype = {inbook}, author = {Rahab, Hichem and Djoudi, Mahieddine and Zitouni, Abdelhafid}, editor = {Fatih Pinarbasi, undefined and M. Nurdan Taskiran, undefined}, doi = {10.4018/978-1-7998-4240-8.ch013}, chapter = {Sentiment Analysis of Arabic Documents}, title = {Natural Language Processing for Global and Local Business} }
@article{ title = {An enhanced corpus for arabic newspapers comments}, type = {article}, year = {2020}, keywords = {Arabic,Comment,K-Nearest Neighbours,Naïve Bayes,Opinion mining,Sentiment analysis,Support Vector Machines}, pages = {789-798}, volume = {17}, id = {a18837a0-85fa-33d0-8629-4f3ceb724213}, created = {2019-08-29T19:36:31.283Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2021-01-28T22:05:37.480Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {raha_iajit2020}, source_type = {article}, private_publication = {false}, abstract = {In this paper, we propose our enhanced approach to create a dedicated corpus for Algerian Arabic newspapers comments. The developed approach has to enhance an existing approach by the enrichment of the available corpus and the inclusion of the annotation step by following the Model Annotate Train Test Evaluate Revise (MATTER) approach. A corpus is created by collecting comments from web sites of three well know Algerian newspapers. Three classifiers, support vector machines, naïve Bayes, and k-nearest neighbors, were used for classification of comments into positive and negative classes. To identify the influence of the stemming in the obtained results, the classification was tested with and without stemming. Obtained results show that stemming does not enhance considerably the classification due to the nature of Algerian comments tied to Algerian Arabic Dialect. The promising results constitute a motivation for us to improve our approach especially in dealing with non Arabic sentences, especially Dialectal and French ones.}, bibtype = {article}, author = {Rahab, Hichem and Zitouni, Abdelhafid and Djoudi, Mahieddine}, doi = {10.34028/iajit/17/5/12}, journal = {International Arab Journal of Information Technology}, number = {5} }
@article{ title = {Improving Service Performance in Oversubscribed IaaS Cloud}, type = {article}, year = {2020}, volume = {12}, websites = {https://www.igi-global.com/journal/international-journal-grid-high-performance/1105}, id = {8ac68fdf-f65f-3030-a6a4-07b349727d3a}, created = {2019-08-30T19:38:54.694Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2019-08-30T19:45:12.212Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Bouaita_ijghpc2020}, source_type = {article}, private_publication = {false}, bibtype = {article}, author = {Bouaita, Riad and Zitouni, Abdelhafid and Maamri, Ramdane}, journal = {International Journal of Grid and High Performance Computing IJGHPC, , ISSN: 1938-0259, IGI Global}, number = {1}, keywords = {in press} }
@article{ title = {Ensuring user authentication and data integrity in multi-cloud environment}, type = {article}, year = {2020}, pages = {15}, volume = {10}, websites = {https://doi.org/10.1186/s13673-020-00224-y}, id = {bacc7614-7db0-31cb-a23e-1e8ff70e3b22}, created = {2021-01-29T14:17:59.744Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2021-01-29T14:17:59.744Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, source_type = {JOUR}, private_publication = {false}, abstract = {The necessity to improve security in a multi-cloud environment has become very urgent in recent years. Although in this topic, many methods using the message authentication code had been realized but, the results of these methods are unsatisfactory and heavy to apply, which, is why the security problem remains unresolved in this environment. This article proposes a new model that provides authentication and data integrity in a distributed and interoperable environment. For that in this paper, the authors first analyze some security models used in a large and distributed environment, and then, we introduce a new model to solve security issues in this environment. Our approach consists of three steps, the first step, was to propose a private virtual network to secure the data in transit. Secondly, we used an authentication method based on data encryption, to protect the identity of the user and his data, and finally, we realize an algorithm to know the integrity of data distributed on the various clouds of the system. The model achieves both identity authentication and the ability to inter-operate between processes running on different cloud’s provider. A data integrity algorithm will be demonstrated. The results of this proposed model can efficiently and safely construct a reliable and stable system in the cross-cloud environment.}, bibtype = {article}, author = {Megouache, Leila and Zitouni, Abdelhafid and Djoudi, Mahieddine}, doi = {10.1186/s13673-020-00224-y}, journal = {Human-centric Computing and Information Sciences}, number = {1} }
@article{ title = {SANA: Sentiment Analysis on Newspapers comments in Algeria}, type = {article}, year = {2019}, id = {a583de16-7d53-3168-8ee0-d4839d508345}, created = {2019-08-29T12:56:01.837Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2019-08-29T12:56:01.837Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {article}, source_type = {article}, private_publication = {false}, bibtype = {article}, author = {Rahab, Hichem and Zitouni, Abdelhafid and Djoudi, Mahieddine}, doi = {10.1016/j.jksuci.2019.04.012}, journal = {Journal of King Saud University - Computer and Information Sciences} }
@article{ title = {Multi-robot task allocation with energetic, spatial and temporal constraints}, type = {article}, year = {2019}, keywords = {Energetic constraints,Multi-robot systems,Multi-robot task allocation,Spatial constraints,Temporal constraints}, pages = {102-138}, volume = {17}, id = {aa45087e-e8c9-3a16-8ec9-ee301fbecde1}, created = {2019-08-29T12:56:01.863Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2021-01-28T22:00:10.387Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {article}, source_type = {article}, private_publication = {false}, abstract = {The Multi-Robot Task Allocation problem is the situation where some tasks and robots are given, then assignments between them must be found in order to optimize a certain measure (e.g. allocate the maximum number of tasks, etc.). We propose a generic framework to address heavily constrained MRTA problems. Some objective functions are proposed and extensively tested on ten datasets, which is our main contribution. Also, two allocation methods - exact and heuristic - are implemented, in order to compare values of adopted evaluation metrics. Performed simulations, obtained results, and comparative study show the effectiveness of the solution, even with a large number of robots and tasks.}, bibtype = {article}, author = {Zitouni, Farouq and Maamri, Ramdane and Zitouni, Abdelhafid}, journal = {International Journal of Artificial Intelligence}, number = {1} }
@article{ title = {AMACE: agent based multi-criterions adaptation in cloud environment}, type = {article}, year = {2018}, pages = {26}, volume = {8}, websites = {https://doi.org/10.1186/s13673-018-0149-2}, month = {9}, id = {59b1b57e-bdbc-31ff-aae5-245bc9fa78c0}, created = {2018-09-12T11:12:33.044Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2018-09-12T11:12:33.044Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Kemchi2018}, source_type = {article}, private_publication = {false}, abstract = {Efficient resource management in dynamic cloud computing is receiving more and more attentions. Many works are still ongoing, since federated cloud computing is an open environment. We present in this paper a flexible model, new cloud operators can join the federation or leave it. The model integrates interactions between broker agents organization, permitting a multi-criterion migration of a submitted customer request. To implement the presented flexible model, we propose AMACE (agent based multi-criterions adaptation in cloud environment) a run-time self-adaptive approach, oriented agent in dynamic cloud federation environment. The proposed approach is multi-criterion, where a various and no limited number of parameters can be considered during the self-adaptation strategy (i.e. computing the load balance of the mediator agent and geographical distance ``network delay'' between the customer and provider…). In addition, AMACE cares about maintaining run-time coherence in optimization evolution in order to guarantee a coherent system at all moment during system execution.}, bibtype = {article}, author = {Kemchi, Sofiane and Zitouni, Abdelhafid and Djoudi, Mahieddine}, doi = {10.1186/s13673-018-0149-2}, journal = {Human-centric Computing and Information Sciences}, number = {1} }
@inproceedings{ title = {Cloud Storage and Security Overview}, type = {inproceedings}, year = {2018}, keywords = {cloud computing,mobile agents,security of data}, pages = {26-33}, websites = {http://www.univ-constantine2.dz/icaase2018/}, city = {Constantine, Algeria}, id = {686a20f0-4d82-3706-9029-afceb053c117}, created = {2019-01-22T15:32:01.716Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2019-08-29T20:09:35.451Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Icaase2018}, source_type = {inproceedings}, private_publication = {false}, bibtype = {inproceedings}, author = {Arki, Oussama and Zitouni, Abdelhafid}, booktitle = {International Conference on Advanced Aspects of Software Engineering (ICAASE'18)} }
@article{ title = {A multi-agent security framework for cloud data storage}, type = {article}, year = {2018}, pages = {357-382}, volume = {14}, publisher = {IOS Press}, id = {91021e87-3469-3a7b-9b44-c7db7ecdf3fe}, created = {2019-08-29T20:19:30.946Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2019-08-30T14:07:08.014Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {arki2018multi}, source_type = {article}, private_publication = {false}, bibtype = {article}, author = {Arki, Oussama and Zitouni, Abdelhafid and Dib, Ahmed TakiEddine}, journal = {Multiagent and Grid Systems}, number = {4} }
@inbook{ type = {inbook}, year = {2017}, keywords = {Arabic comments,Machine learning,Natural Language Processing,Naïve Bayes,Newspaper,Opinion mining,Sentiment analysis,Support Vector Machines}, volume = {662}, id = {a53810e4-3c4b-3563-ba5a-9298278fe284}, created = {2017-12-01T21:57:58.750Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2019-08-29T19:54:34.352Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Rahab2018}, private_publication = {false}, abstract = {© 2018, Springer International Publishing AG. It is a challenging task to identify sentiment polarity in Arabic journals comments. Algerian daily newspapers interest more and more people in Algeria, and due to this fact they interact with it by comments they post on articles in their websites. In this paper we propose our approach to classify Arabic comments from Algerian Newspapers into positive and negative classes. Publicly-available Arabic datasets are very rare on the Web, which make it very hard to carring out studies in Arabic sentiment analysis. To reduce this gap we have created SIAAC (Sentiment polarity Identification on Arabic Algerian newspaper Comments) a corpus dedicated for this work. Comments are collected from website of well-known Algerian newspaper Echorouk. For experiments two well known supervised learning classifiers Support Vector Machines (SVM) and Naïve Bayes (NB) were used, with a set of different parameters for each one. Recall, Precision and F_measure are computed for each classifier. Best results are obtained in term of precision in both SVM and NB, also the use of bigram increase the results in the two models. Compared with OCA, a well know corpus for Arabic, SIAAC give a competitive results. Obtained results encourage us to continue with others Algerian newspaper to generalize our model.}, bibtype = {inbook}, author = {Rahab, Hichem and Zitouni, Abdelhafid and Djoudi, Mahieddine}, doi = {10.1007/978-3-319-67621-0_12}, chapter = {SIAAC: Sentiment Polarity Identification on Arabic Algerian Newspaper Comments}, title = {Advances in Intelligent Systems and Computing} }
@inproceedings{ title = {ARAACOM: Arabic Algerian corpus for opinion mining}, type = {inproceedings}, year = {2017}, keywords = {Arabic comments,Machine learning,Natural language processing,Newspaper,Opinion mining,Sentiment analysis}, pages = {1-5}, volume = {Part F1306}, id = {97258d8f-3884-369c-a38c-2cde782f4d08}, created = {2017-12-01T22:05:54.247Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2019-08-29T21:17:10.435Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Rahab2017}, private_publication = {false}, abstract = {© 2017 Association for Computing Machinery. Nowadays, it is no more needed to do an enormous effort to distribute a lot of forms to thousands of people and collect them, then convert this from into electronic format to track people opinion about some subjects. A lot of web sites can today reach a large spectrum with less effort. The majority of web sites suggest to their visitors to leave backups about their feeling of the site or events. So, this makes for us a lot of data which need powerful mean to exploit. Opinion mining in the web becomes more and more an attracting task, due the increasing need for individuals and societies to track the mood of people against several subjects of daily life (sports, politics, television,...). A lot of works in opinion mining was developed in western languages especially English, such works in Arabic language still very scarce. In this paper, we propose our approach, for opinion mining in Arabic Algerian news paper.}, bibtype = {inproceedings}, author = {Rahab, Hichem and Zitouni, Abdelhafid and Djoudi, Mahieddine}, doi = {10.1145/3129186.3129193}, booktitle = {ACM International Conference Proceeding Series} }
@inbook{ type = {inbook}, year = {2017}, pages = {250-261}, id = {3cca362e-4289-3e7e-94db-a784d812e4ff}, created = {2017-12-01T22:53:01.210Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2019-01-22T15:07:59.663Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {unknown}, source_type = {unknown}, private_publication = {false}, bibtype = {inbook}, author = {Kacha, Lynda and Zitouni, Abdelhafid}, chapter = {An Overview on Data Security in Cloud Computing} }
@inbook{ type = {inbook}, year = {2017}, pages = {62-73}, volume = {662}, id = {101ba002-d1c9-30c9-b3bb-ebf46d7736a4}, created = {2017-12-01T22:53:01.310Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2019-08-29T20:14:25.205Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {unknown}, source_type = {unknown}, private_publication = {false}, bibtype = {inbook}, author = {Arki, Oussama and Zitouni, Abdelhafid}, chapter = {A Security Framework for Cloud Data Storage (CDS) Based on Agent}, title = {Advances in Intelligent Systems and Computing} }
@inbook{ type = {inbook}, year = {2017}, pages = {50-61}, websites = {https://doi.org/10.1007/978-3-319-67621-0_5}, publisher = {Springer International Publishing}, city = {Cham}, id = {a2c8fc83-7499-3a6f-bc5b-623eacb38f5e}, created = {2017-12-02T00:12:29.841Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2019-08-29T19:57:04.927Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Bouaita2018}, source_type = {inbook}, private_publication = {false}, abstract = {Elasticity is one of the essential properties in Cloud Computing that meets changeable needs of customers, and improves resource utilization for providers. In this context, oversubscription is a very powerful technique to increase resource utilization level as much as possible, which leads to a maximization of the profit of cloud providers. In this paper, we propose an autonomous architecture based on the MAPE-K control loop and using memory oversubscription to improve operating performance in a cloud infrastructure. The overload caused by oversubscription is mitigated by the live migration technique of VMs as well as the use of the network memory of the various physical machines of the cluster through the network. This latter technique is usually used as a replacement technique for the swapping disc as it has more performance.}, bibtype = {inbook}, author = {Bouaita, Riad and Zitouni, Abdelhafid and Maamri, Ramdane}, editor = {Silhavy, Radek and Silhavy, Petr and Prokopova, Zdenka}, doi = {10.1007/978-3-319-67621-0_5}, chapter = {An Autonomous Architecture for Managing Vertical Elasticity in the IaaS Cloud Using Memory Over-Subscription}, title = {Applied Computational Intelligence and Mathematical Methods: Computational Methods in Systems and Software 2017, vol. 2} }
@inbook{ type = {inbook}, year = {2017}, pages = {44-52}, websites = {https://doi.org/10.1007/978-3-319-57141-6_5}, publisher = {Springer International Publishing}, city = {Cham}, id = {3c18e7b2-583a-35b4-92e0-39d6b0c83e40}, created = {2017-12-02T00:12:29.859Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2017-12-02T00:12:29.859Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Beldjezzar2017}, source_type = {inbook}, private_publication = {false}, abstract = {Nowadays companies are increasingly adopting the technology of cloud computing. This technology is subject to a lot of research and continuous advances are made. The use of cloud computing in the companies advantages such as: reducing costs, sharing and exchange of information between institutions, but the data in the Cloud computing are susceptible to be compromised and the companies are exposing to see their data loss. In this study, we address the subject of security in cloud computing; we expose and discuss some researches that had been proposed to secure the data stored in the cloud. And then we will present our new frameworks that ensure confidentiality of data storage in the cloud environment.}, bibtype = {inbook}, author = {Beldjezzar, Leila and Zitouni, Abdelhafid and Djoudi, Mahieddine}, editor = {Silhavy, Radek and Silhavy, Petr and Prokopova, Zdenka and Senkerik, Roman and Kominkova Oplatkova, Zuzana}, doi = {10.1007/978-3-319-57141-6_5}, chapter = {New Framework Model to Secure Cloud Data Storage}, title = {Software Engineering Trends and Techniques in Intelligent Systems: Proceedings of the 6th Computer Science On-line Conference 2017 (CSOC2017), Vol 3} }
@inproceedings{ title = {A New Framework of Authentication Over Cloud Computing}, type = {inproceedings}, year = {2017}, pages = {262-270}, id = {25ad35db-5eb3-3a2f-a945-08a1a4fd0a30}, created = {2017-12-02T00:12:29.860Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2019-08-29T20:12:37.421Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Beldjezzar_CoMeSySo017}, source_type = {inproceedings}, private_publication = {false}, bibtype = {inproceedings}, author = {Megouache, Leila and Zitouni, Abdelhafid and Djoudi, Mahieddine}, booktitle = {Silhavy R., Silhavy P., Prokopova Z. (eds) Cybernetics Approaches in Intelligent Systems. CoMeSySo 2017. Advances in Intelligent Systems and Computing, vol 661. Springer, Cham} }
@inproceedings{ title = {A Two-Tiers Framework for Cloud Data Storage (CDS) Security Based on Agent}, type = {inproceedings}, year = {2017}, pages = {814-823}, institution = {Springer}, id = {6796849b-ca54-3d63-87f3-e7a60f8713c5}, created = {2019-08-29T20:22:18.540Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2019-08-29T20:22:18.540Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {arki2017two}, source_type = {inproceedings}, private_publication = {false}, bibtype = {inproceedings}, author = {Arki, Oussama and Zitouni, Abdelhafid}, booktitle = {Interactive Mobile Communication, Technologies and Learning} }
@inproceedings{ title = {Self Organization Agent Oriented Dynamic Resource Allocation on Open Federated Clouds Environment}, type = {inproceedings}, year = {2016}, keywords = {XXL}, websites = {http://www.macc.ma/cloudtech16/program.pdf}, id = {bfb3bfe0-e697-3ed7-920c-eaed39ddc39f}, created = {2019-08-30T14:48:41.240Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2019-08-30T14:53:53.131Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {kemchi_self_2016}, source_type = {inproceedings}, private_publication = {false}, bibtype = {inproceedings}, author = {Kemchi, Sofiane and Zitouni, Abdelhafid and Djoudi, Mahieddine}, booktitle = {The 2nd International Conference on Cloud Computing Technologies and Applications, CloudTech'16, Marrakesh, Morocco.} }
@inproceedings{ title = {A cloud security framework based on trust model and mobile agent}, type = {inproceedings}, year = {2015}, keywords = {cloud computing,mobile agents,security of data,tru}, pages = {1-8}, id = {7083b004-9e0d-3562-9fc9-8def2bee2e7c}, created = {2017-12-01T22:53:02.076Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2017-12-02T09:31:34.892Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {Benabied2015}, private_publication = {false}, abstract = {Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and services are probably not fully trustworthy. Hence, data owners are uncomfortable to place their sensitive data outside their own system .i.e., in the cloud., Bringing transparency, trustworthiness and security in the cloud model, in order to fulfill client's requirements are still ongoing. To achieve this goal, our paper introduces two levels security framework: Cloud Service Provider (CSP) and Cloud Service User (CSU). Each level is responsible for a particular task of the security. The CSU level includes a proxy agent and a trust agent, dealing with the first verification. Then a second verification is performed at the CSP level. The framework incorporates a trust model to monitor users' behaviors. The use of mobile agents will exploit their intrinsic features such as mobility, deliberate localization and secure communication channel provision. This model aims to protect user's sensitive information from other internal or external users and hackers. Moreover, it can detect policy breaches, where the users are notified in order to take necessary actions when malicious access or malicious activity would occur.}, bibtype = {inproceedings}, author = {Benabied, Saddek and Zitouni, Abdelhafid and Djoudi, Mahieddine}, doi = {10.1109/CloudTech.2015.7336962}, booktitle = {Cloud Technologies and Applications (CloudTech), 2015 International Conference on} }
@article{ title = {Rigorous Description Of Design Components Functionality: An Approach Based Contract}, type = {article}, year = {2012}, pages = {187-196}, volume = {9}, id = {98c88d4b-165d-36fd-9358-f1a0d19526fe}, created = {2017-12-01T22:53:00.714Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2019-08-29T19:54:34.338Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {IJCSI}, source_type = {article}, private_publication = {false}, bibtype = {article}, author = {Zitouni, Abdelhafid}, journal = {International Journal of Computer Science Issues} }
@article{ title = {A contract-based language to specify design components}, type = {article}, year = {2011}, pages = {71-88}, volume = {5}, id = {084f99d6-5f67-3ded-a927-775a2b5017f9}, created = {2017-12-01T22:53:00.037Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2017-12-01T22:53:00.037Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {article}, source_type = {article}, private_publication = {false}, bibtype = {article}, author = {Zitouni, Abdelhafid and Boufaida, Mahmoud and Seinturier, Lionel}, journal = {International Journal of Software Engineering and its Applications} }
@inproceedings{ title = {An Efficient Modeling and Execution Framework for Complex Systems Development}, type = {inproceedings}, year = {2011}, pages = {317-331}, websites = {https://doi.org/10.1109/ICECCS.2011.38}, id = {7871aeb1-c50b-36c8-9448-0e7a60a722a0}, created = {2017-12-01T22:53:00.116Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2019-08-29T19:40:38.229Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {DBLP:conf/iceccs/PerseilPRFDBJBMBFZBSCAFMG11}, source_type = {inproceedings}, private_publication = {false}, bibtype = {inproceedings}, author = {Perseil, Isabelle and Pautet, Laurent and Rolland, Jean-François and Filali, Mamoun and Delanote, Didier and Baelen, Stefan Van and Joosen, Wouter and Berbers, Yolande and Mallet, Frédéric and Bertrand, Dominique and Faucou, Sébastien and Zitouni, Abdelhafid and Boufaida, Mahmoud and Seinturier, Lionel and Champeau, Joël and Abdoul, Thomas and Feiler, Peter H and Mraidha, Chokri and Gérard, Sébastien}, doi = {10.1109/ICECCS.2011.38}, booktitle = {16th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2011, Las Vegas, Nevada, USA, 27-29 April 2011} }
@inproceedings{ title = {Specifying Components with Compositional Patterns, LOTOS and Design By Contract}, type = {inproceedings}, year = {2010}, pages = {190-195}, id = {f35023b5-db29-3ba5-aee1-0cc6a7fdd2a0}, created = {2017-12-01T22:53:00.743Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2019-08-29T19:39:37.266Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {DBLP:conf/sede/ZitouniBS10}, source_type = {inproceedings}, private_publication = {false}, bibtype = {inproceedings}, author = {Zitouni, Abdelhafid and Boufaida, Mahmoud and Seinturier, Lionel}, booktitle = {ISCA 19th International Conference on Software Engineeringand Data Engineering (SEDE-2010) June 16-18, 2010, Hilton Fisherman's Wharf, San Francisco, CA, USA} }
@inproceedings{ title = {Contract-based approach to analyze software components}, type = {inproceedings}, year = {2008}, pages = {237-242}, institution = {IEEE}, id = {d16e02de-d36c-3057-ac2c-33029d90bd09}, created = {2019-08-29T20:25:06.168Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2019-08-29T20:25:06.168Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {zitouni2008contract}, source_type = {inproceedings}, private_publication = {false}, bibtype = {inproceedings}, author = {Zitouni, Abdelhafid and Seinturier, Lionel and Boufaida, Mahmoud}, booktitle = {13th IEEE International Conference on Engineering of Complex Computer Systems (iceccs 2008)} }
@inproceedings{ title = {Un Framework pour l'utilisation des design patterns dans le développement des systèmes d'information}, type = {inproceedings}, year = {2005}, id = {81f90997-40a0-3f79-8601-c0c945e42030}, created = {2017-12-02T09:31:34.455Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2017-12-02T09:31:34.455Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {CIIA05}, source_type = {inproceedings}, private_publication = {false}, bibtype = {inproceedings}, author = {Zitouni, Abdelhafid}, booktitle = {Congrès International en Informatique Appliquée, CIIA'05, Bordj Bou Arréridj, Algérie.} }
@inproceedings{ title = {Un Framework pour l'utilisation des design patterns par intégration du langage de spécification Lotos}, type = {inproceedings}, year = {2004}, id = {79724816-f066-33d4-9bbc-4d65cd9c54e4}, created = {2017-12-02T09:31:34.447Z}, file_attached = {false}, profile_id = {3f3cebd9-2c9e-33e2-9759-3b3c3deedc23}, group_id = {6d2dc4f5-aea7-35c9-874f-1d63cc94ab65}, last_modified = {2017-12-02T09:31:34.447Z}, read = {false}, starred = {false}, authored = {false}, confirmed = {true}, hidden = {false}, citation_key = {SNIB04}, source_type = {inproceedings}, private_publication = {false}, bibtype = {inproceedings}, author = {Zitouni, Abdelhafid}, booktitle = {4eme Séminaire National sur l'Informatique de Biskra (SNIB'04), Biskra - Algérie} }