default search action
Khalifa Toumi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin:
Blockchain based distributed trust management in IoT and IIoT: a survey. J. Supercomput. 80(15): 21867-21919 (2024) - 2023
- [j10]Souad BelMannoubi, Haifa Touati, Mohamed Hadded, Khalifa Toumi, Oyunchimeg Shagdar, Farouk Kamoun:
A comprehensive survey on blockchain-based C-ITS applications: Classification, challenges, and open issues. Veh. Commun. 43: 100607 (2023) - 2021
- [j9]Azza Allouch, Omar Cheikhrouhou, Anis Koubâa, Khalifa Toumi, Mohamed Khalgui, Tuan Nguyen Gia:
UTM-Chain: Blockchain-Based Secure Unmanned Traffic Management for Internet of Drones. Sensors 21(9): 3049 (2021) - [c23]Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin:
Blockchain based Privacy Aware Distributed Access Management Framework for Industry 4.0. WETICE 2021: 51-56 - 2020
- [j8]Kalpana Singh, Omar Dib, Clément Huyart, Khalifa Toumi:
A novel credential protocol for protecting personal attributes in blockchain. Comput. Electr. Eng. 83: 106586 (2020) - [j7]Mohamed Hadded, Khalifa Toumi, Anis Laouiti, Paul Mühlethaler:
A Trust Framework for Centralized TDMA Scheduling Mechanism in Vehicular Ad hoc Networks. Int. J. Interdiscip. Telecommun. Netw. 12(4): 74-87 (2020) - [j6]Omar Dib, Clément Huyart, Khalifa Toumi:
A novel data exploitation framework based on blockchain. Pervasive Mob. Comput. 61: 101104 (2020) - [c22]Asma Lahbib, Abderrahim Ait Wakrime, Anis Laouiti, Khalifa Toumi, Steven Martin:
An Event-B Based Approach for Formal Modelling and Verification of Smart Contracts. AINA 2020: 1303-1318 - [c21]Antoine Durand, Guillaume Hébert, Khalifa Toumi, Gérard Memmi, Emmanuelle Anceaume:
The StakeCube blockchain : Instantiation, Evaluation & Applications. BCCA 2020: 9-15
2010 – 2019
- 2019
- [c20]Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin:
DRMF: A Distributed Resource Management Framework for Industry 4.0 Environments. NCA 2019: 1-9 - [c19]Asma Lahbib, Khalifa Toumi, Anis Laouiti, Alexandre Laubé, Steven Martin:
Blockchain based trust management mechanism for IoT. WCNC 2019: 1-8 - 2018
- [j5]Khalifa Toumi, Mohamed H. E. Aouadi, Ana R. Cavalli, Wissam Mallouli, Jordi Puiggalí Allepuz, Pol Valletb Montfort:
A Framework for Testing and Monitoring Security Policies: Application to an Electronic Voting System. Comput. J. 61(8): 1109-1122 (2018) - [c18]Ibrahim Tariq Javed, Khalifa Toumi, Noël Crespi:
N-Combat: A Nuisance Call Combating Framework for Internet Telephony. TrustCom/BigDataSE 2018: 112-117 - 2017
- [j4]Ibrahim Tariq Javed, Khalifa Toumi, Noël Crespi:
TrustCall: A Trust Computation Model for Web Conversational Services. IEEE Access 5: 24376-24388 (2017) - [c17]Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Khalifa Toumi, Hervé Debar:
Adaptive Policy-driven Attack Mitigation in SDN. XDOMO@EuroSys 2017: 4:1-4:6 - [c16]Asma Lahbib, Khalifa Toumi, Sameh Elleuch, Anis Laouiti, Steven Martin:
Link reliable and trust aware RPL routing protocol for Internet of Things. NCA 2017: 235-240 - [c15]Fabien Charmet, Richard Waldinger, Gregory Blanc, Christophe Kiennert, Khalifa Toumi:
Preserving confidentiality during the migration of virtual SDN topologies: A formal approach. NCA 2017: 453-457 - [c14]Ibrahim Tariq Javed, Khalifa Toumi, Noël Crespi:
ProtectCall: Call Protection Based on User Reputation. TrustCom/BigDataSE/ICESS 2017: 660-667 - 2016
- [j3]Khalifa Toumi, César Andrés, Ana R. Cavalli:
Formal framework for defining trust in multi-organisation environment. Int. J. Auton. Adapt. Commun. Syst. 9(1/2): 164-178 (2016) - [j2]Khalifa Toumi, Hela Sfar, Joaquín García-Alfaro:
Reputation trust mechanism under the organizational-based access control model. Secur. Commun. Networks 9(18): 5295-5310 (2016) - [c13]Ibrahim Tariq Javed, Khalifa Toumi, Noël Crespi, Amir Mohammadinejad:
Br2Br: A Vector-Based Trust Framework for WebRTC Calling Services. HPCC/SmartCity/DSS 2016: 522-529 - [c12]Khalifa Toumi, Muhammad Sabir Idrees, Fabien Charmet, Reda Yaich, Gregory Blanc:
Usage Control Policy Enforcement in SDN-Based Clouds: A Dynamic Availability Service Use Case. HPCC/SmartCity/DSS 2016: 578-585 - 2015
- [c11]Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli:
An Active Testing Tool for Security Testing of Distributed Systems. ARES 2015: 735-740 - 2014
- [b1]Khalifa Toumi:
A trust framework for multi-organization environments. (Un système de confiance pour les environnements multi-organisationnels). Telecom & Management SudParis, Évry, Essonne, France, 2014 - [j1]Khalifa Toumi, Ana R. Cavalli, César Andrés:
Validation of a Trust Approach in Multi-Organization Environments. Int. J. Secur. Softw. Eng. 5(1): 1-18 (2014) - [c10]Khalifa Toumi, Fabien Autrel, Ana R. Cavalli, Sammy Haddad:
ISER: A Platform for Security Interoperability of Multi-source Systems. CRiSIS 2014: 230-238 - [c9]Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli:
A Formal Approach to Automatic Testing of Security Policies Specified in XACML. FPS 2014: 367-374 - [c8]Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli:
On Modeling and Testing Security Properties of Vehicular Networks. ICST Workshops 2014: 42-50 - [c7]Khalifa Toumi, Wissam Mallouli, Edgardo Montes de Oca, César Andrés, Ana R. Cavalli:
How to Evaluate Trust Using MMT. NSS 2014: 484-492 - [i1]Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli:
Testing Security Policies for Distributed Systems: Vehicular Networks as a Case Study. CoRR abs/1410.5789 (2014) - 2013
- [c6]Khalifa Toumi, César Andrés, Ana R. Cavalli:
Security Properties in Virtual Organizations. HPCC/EUC 2013: 238-245 - [c5]Khalifa Toumi, César Andrés, Ana R. Cavalli:
Trust Ontology Based on Access Control Parameters in Multi-organization Environments. SITIS 2013: 285-292 - 2012
- [c4]Khalifa Toumi, César Andrés, Ana R. Cavalli, Mazen El Maarabani:
A vector based model approach for defining trust in Multi-Organization Environments. CRiSIS 2012: 1-8 - [c3]Khalifa Toumi, Ana R. Cavalli, Mazen El Maarabani:
Role based interoperability security policies in collaborative systems. CTS 2012: 471-477 - [c2]Khalifa Toumi, César Andrés, Ana R. Cavalli:
Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments. ICISS 2012: 89-103 - 2010
- [c1]Khalifa Toumi, Mouna Ayari, Leïla Azouz Saïdane, Mathieu Bouet, Guy Pujolle:
HAT: HIP Address Translation protocol for Hybrid RFID/IP Internet of Things communication. ICWUS 2010: 13-19
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 23:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint