Kamel Adi, Ph.D.

2002 Universite Laval (Canada) 
Computer Science
"Kamel Adi"


Sign in to add mentor
Mourad Debbabi grad student 2002 Universite Laval (Canada)
 (Formal specification and analysis of security protocols.)
BETA: Related publications


You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Shaikh RA, Adi K, Logrippo L. (2016) A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets International Journal of Information Security. 1-23
Hamouid K, Adi K. (2015) Efficient certificateless web-of-trust model for public-key authentication in MANET Computer Communications. 63: 24-39
Boulares S, Adi K, Logrippo L. (2015) Information flow-based security levels assessment for access control systems Lecture Notes in Business Information Processing. 209: 105-121
Bouhaddi M, Radjef MS, Adi K. (2015) A game approach for an efficient intrusion detection system in mobile Ad Hoc networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8930: 131-146
Khamadja S, Adi K, Logrippo L. (2013) Designing flexible access control models for the cloud Sin 2013 - Proceedings of the 6th International Conference On Security of Information and Networks. 225-232
Khamadja S, Adi K, Logrippo L. (2013) An access control framework for hybrid policies Sin 2013 - Proceedings of the 6th International Conference On Security of Information and Networks. 282-286
Khambhammettu H, Boulares S, Adi K, et al. (2013) A framework for risk assessment in access control systems Computers and Security. 39: 86-103
Hamouid K, Adi K. (2012) Self-certified based trust establishment scheme in ad-hoc networks 2012 5th International Conference On New Technologies, Mobility and Security - Proceedings of Ntms 2012 Conference and Workshops
Stepien B, Khambhammettu H, Adi K, et al. (2012) CatBAC: A generic framework for designing and validating hybrid access control models Ieee International Conference On Communications. 6721-6726
Boulaiche A, Bouzayani H, Adi K. (2012) A quantitative approach for intrusions detection and prevention based on statistical n-gram models Procedia Computer Science. 10: 450-457
See more...