HomeContactLoginFrançais | A+ A - |  
Security Research Laboratory
Coming soon ...
2009/20/12
Defense of a thesis of Ibrahim Keita:
Sécurité des services web. Directeur de recherche: Kamel Adi, Michal Iglewski
2009/20/12
Soutenance de mémoire de maîtrise de Ibrahim Keita:
Sécurité des services web. Directeur de recherche: Kamel Adi, Michal Iglewski

 

Publications

Édition de livre

  • Kamel Adi, D. Amyot et L. Logrippo (éditeurs) Actes du 5ième colloque sur les Nouvelles Technologies de la Répartition (NOTERE 2005), Gatineau, Canada, août 2005. ISBN 2-9809043-0-9.
  • Kamel Adi, L. Logrippo, M. Mejri. Actes du Workshop on Practice and Theory of Access Control Technologies (WPTACT’2005). Montréal, Canada, janvier 2005.

Articles dans des revues internationales

  • Dini, Petre, Alexandre Clemm, Thomas Gray, Fuchun Lin , Luigi Logrippo, Stephan Reiff-Marganiec. Policy-enabled Mechanisms for Feature Interactions: Reality, Expectations, Challenges. Computer Networks 45 2004. 5 (2004) : 585 - 603.
  • Hamouid, Khaled, Kamel Adi. Secure and Robust threshold Key Management (SRKM) scheme for ad hoc networks. Security and Communication Networks. Wiley InterScience, 2009.
  • Crespo, Rui G., M. Carvalho, Luigi Logrippo. Distributed Resolution of Feature Interactions for Internet Applications. Computer Networks 51. 2 (2007) : 382-397.
  • Xu, Yiqun, Luigi Logrippo, Jacques Sincennes. Detecting Feature Interactions in CPL. Journal of Network and Computer Applications 30. 2 (2007) : 775-799.
  • Kamel Adi, Daniel Amyot, Luigi Logrippo. New Technologies in Distributed Systems (editorial). Annals of Telecommunications 61. 2006.
  • Kamel Adi, Liviu Pene et Luke Sullivan. Games for Non-Repudiation Protocol Correctness. Accepté pour publication dans International Journal of Wireless and Mobile Computing. 2006.
  • Gorse, Nicolas, Luigi Logrippo, Jacques Sincennes. Formal Detection of Feature Interactions with Logic Programming and LOTOS.. Journal on Software and System Modelling 5. 2 (2006) : 121-134.
  • Jiang, Dongmei, Ramiro Liscano, Luigi Logrippo. Personalization of Internet Telephony Services with SIP and Extended CPL. Computer Communications 29. 18 (2006) : 3766-3779.
  • Amyot, Daniel, Luigi Logrippo, Michael Weiss. Generation of test purposes from Use Case Maps . Computer Networks 49. 5 (2005) : 643-660.
  • Amyot, Daniel, Tom Gray, Ramiro Liscano, Luigi Logrippo, Jacques Sincennes. Interactive Conflict Detection and Resolution for Personalized Features. Journal of Communications and Networks 7. 3 (2005) : 353-366.
  • Dini, Petre, Alexandre Clemm, Thomas Gray, Fuchun Lin , Luigi Logrippo, Stephan Reiff-Marganiec. Policy-enabled Mechanisms for Feature Interactions: Reality, Expectations, Challenges. Computer Networks 45 2004. 5 (2004) : 585 - 603.
  • Kamel Adi, M. Debbabi et M. Mejri. A New Logic for Electronic Commerce Protocols. International journal of Theoretical Computer Science (TCS) 291. (2003) : 223-283.
  • Kamel Adi et M. Debbabi. Abstract Interpretation for Proving Secrecy Properties in Security Protocols. Electronic Notes in Theoretical Computer Science (ENTCS) 55. 1 (2002) : 29-53.

Articles dans des conférences internationales

  • Kamel Adi, Yacine Bouzida, Ikhlass Hattak, Luigi Logrippo, Serge Mankovski. Typing for Conflict Detection in Access Control Policies. 4th International MCETECH Conference on e-Technologies, Lecture Notes in Business Information Processing. Springer. 2009.
  • Hamouid, Khaled, Kamel Adi. Robust Key Management Scheme for Certification in Mobile Ad-hoc Networks. IEEE Symposium on Computers and Communications , 7 pages. 2009.
  • Ji, Ma, Orgun Mehmet , Sattar Abdul, Kamel Adi. Temporalised Epistemic Logic for Reasoning about Agent-Based Systems. IEEE Workshop on Logics for Intelligent Agents and Multi-Agent Systems, 2009.
  • Mejri, Mohamed, Kamel Adi. Formal Specification and Analysis of Firewalls. 8th International Conference on Software Methodologies, Tools and Techniques, 10 pages. 2009.
  • Ould-Slimane, Hakima, Mohamed Mejri, Kamel Adi. Using Edit Automata for Rewriting-Based Security Enforcement. 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC'2009). Research Advances in Database and Information Systems Security, Lecture Notes in Computer Science , Springer. 14 pages. 2009.
  • Wael, Hassan, Nadéra Slimani, Kamel Adi, Luigi Logrippo. A validation method for model transformation. International conference on ASM, B and Z. ABZ, Lecture Notes in Computer Science. Springer. 2009.
  • Kamel Adi, Lamia Hamza, Liviu Pene. Formal Modeling for Security Behavior Analysis of Computer Systems. Montreal Conference on e-technologies, IEEE. 2008.
  • Kamel Adi, Liviu Pene. Formal Reasoning for Security Protocol Correctness. New Trends in Software Methodologies Tools and Techniques, IOS Press. 2008.
  • Boulaiche, Ammar, Kamel Adi. Honeyd Detection via Abnormal Behaviors Generated by the ARPD Deamon. International Conference on Security and Cryptography - SECRYPT'2008, Portugal. INSTICC Press. 2008.
  • Hamza, Lamia, Kamel Adi. Formal Technique for Discovering Complex Attacks in Computer Systems . New Trends in Software Methodologies Tools and Techniques, IOS Press. 2007.
  • Langar, Mahjoub, Mohamed Mejri, Kamel Adi. Formal Approach for Security Policy Enforcement in Concurrent Programs. International Conference on Security and Management, 2007.
  • Hamza, Lamia, Kamel Adi, Karim El Guemhioui. Automatic generation of attack scenarios for intrusion detection systems. International Conference on Internet and Web Applications and Services, Gosier, Guadeloupe. IEEE Computer Society Press. CD-ROM. 2006.
  • Liviu, Pene, Kamel Adi. Calculus for Distributed Firewall Specification and Verification. The 5th International Conference on Software Methodologies, Tools and Techniques, IOS Press. 2006.
  • Mahjoub, Langar, Mohamed Mejri, Kamel Adi. Formal Monitor For Concurrent Programs. Practice and Theory of IT Security, 2006.
  • Ould-Slimane, Hakima, Mohamed Mejri, Kamel Adi. Enforcing Security Policies on Programs.. The 5th International Conference on Software Methodologies, Tools and Techniques., IOS Press, 2006.
  • Kamel Adi, Adnane El-Kabbal, Liviu Pene. Distributed Firewall Verification with Mobile Ambients. Workshop on Practice and Theory of Access Control Technologies. WPTACT'05, Montréal, 2005.
  • Kamel Adi, Adnane El-Kabbal, Mohamed Mejri. Un Système de Types pour l'Analyse des Pare-feux. 4ème Conférence sur la Sécurité et Architectures Réseaux, Batz sur Mer (France), 2005.
  • Kamel Adi, Liviu Pene. Secrecy Correctness for Security Protocols. International Conference on Distributed Frameworks for Multimedia Applications. DFMA'2005, Besançon. IEEE Computer Society. 2005.
  • Kamel Adi et Luke Sullivan. Access control based on dynamic monitoring for detecting software malicious behaviors. Workshop on New Challenges for Access Control. NCAC'2005. Ottawa, 2005.
  • Kamel Adi, A. El-Kabbal, M. Mejri. Un Système de Types pour l'Analyse des Pare-feux. 4ème Conférence sur la Sécurité et Architectures Réseaux. Batz sur Mer (France), 2005.
  • Kamel Adi et Luke Sullivan. Sufficient Conditions for Ensuring Probabilistic Fairness in Exchange Protocols. 7th International Symposium on Programming and Systems, ISPS'2005. Alger, 2005.
  • Kamel Adi et Liviu Pene. Secrecy Correctness for Security Protocols. International Conference on Distributed Frameworks for Multimedia Applications DFMA'2005. proc. publié par IEEE Computer Society. Besançon, 2005.
  • Kamel Adi, A. ElKabbal, Liviu Pene. Distributed Firewall Verification with Mobile Ambients. Workshop on Practice and Theory of Access Control Technologies. WPTACT'05. Montréal. 2005.
  • Kamel Adi, M. Debbabi et Liviu Pene. Abstract Interpretation for Secrecy Correctness in E-Commerce Protocols. Montreal Conference on e-technologies, MCETECH'2005. Montréal, 2005.
  • Kamel Adi et Liviu Pene. Abstract Trace-Based Model for Security Protocol Correctness. Session Poster. Security Analysis and Modelling, SAM'04. Ottawa, 2004.
  • Kamel Adi et M. Debbabi. A game semantics approach for security protocols. 6th International Symposium on Programming and Systems, ISPS'2003. Alger, 2003.
  • Kamel Adi et M. Debbabi. Abstract Interpretation for Proving Secrecy Properties in Security Protocols. Workshop on Logical Aspects of Cryptographic Protocol Verification. WLACPV'2001. Paris, 2001.
  • Kamel Adi, M. Debbabi et M. Mejri. A New Logic for Electronic Commerce Protocols. 8th International Conference on Algebraic Methodology and Software Technology (AMAST). Iowa City, 2000.
  • Bert, D., R. Echahed et Kamel Adi. Resolution of Goals with the functional and logic programming language LPG : impact of abstract interpretation. 5th International Conference on Algebraic ethodology and Software Technology, AMAST'96. Munich, 1996.

Rapports de recherche

  • Kamel Adi, A. Felty, L. Loggripo et B. Stépien. Evaluation of Current Research in Firewall Analysis. Rapport de recherche. Département de la défence nationale. Canada.
  • Kamel Adi. Formal Specification and Analysis of Security Protocols. Thèse de Ph. D. Université Laval. Canada.
  • M. Debbabi, Kamel Adi, F. Massicote, M. Mejri et H. Chambaz. Comparative Analysis of Security APIs. Rapport de recherche. Département de la défence nationale. Canada.
  • Kamel Adi, M. Debbabi et M. Mejri. A Finite, Complete and Sound Tableau- Based system For a New Logic for E-Commerce Protocols. Rapport de recherche, Université Laval.
  • Kamel Adi. An optimal Abstract Continuation Passing Style. Mémoire de DEA, Université Pierre et Marie Curie, Paris, France.
  • Kamel Adi. L' évaluation partielle dans les langages logiques. Mémoire d'ingénieur. Univesité d'Alger. Algérie.
© Security Research Laboratory, 2010 - - Computer Sciences Department - Université du Québec en Outaouais
XHTML CSS