About
119
Publications
19,733
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
612
Citations
Introduction
I work on Blockchain-Based Supply Chain platforms, Dynamic collaboration, Smart Contract Formal verification . lightweight cryptography solutions proposed with the aim of integrating human and IoT security in systems’ design phase.
Publications
Publications (119)
Purpose: The integration of AI with blockchain technology is investigated in this study to address challenges in IoT-based supply chains, specifically focusing on latency, scalability, and data consistency. Background: Despite the potential of blockchain technology, its application in supply chains is hindered by significant limitations such as lat...
Blockchain provides several advantages, including decentralization, data integrity, traceability, and immutability. However, despite its advantages, blockchain suffers from significant limitations, including scalability, resource greediness, governance complexity, and some security related issues. These limitations prevent its adoption in mainstrea...
Over the last few decades, researchers have become increasingly interested in machine learning. The field has progressed from classical techniques to neural networks (NNs) and fuzzy neural networks. A novel approach that employs an algebraic model has recently emerged, which enables data conceptualization through generalization and formalization. T...
Le problème croissant des pénuries de médicaments au sein de la chaîne d’approvisionnement pharmaceutique est devenu une préoccupation mondiale cruciale, posant des menaces importantes à la santé publique et à l’intégrité des systèmes de santé. Cet article propose un examen approfondi de l’origine des pénuries de médicaments, qui affectent une larg...
Algebraic machine learning is a novel parameter-free model that has demonstrated impressive accuracy in challenging tasks such as the MNIST dataset and N-Queens completion. However, its utilization of two semi-lattices can lead to significant computational demands. To tackle this issue, a solution has been proposed that employs a single semi-lattic...
Fingerprint-based biometric systems are widely used because of their advantages against conventional authentication systems based on passwords and tokens. However, a major limitation is that individuals’ fingerprint information cannot be easily changed if compromised. The fuzzy vault is a promising technique that secures fingerprint data by generat...
Although data mining is very relevant to the medical sector, it has also raised privacy concerns since it is applied to sensitive data, which undoubtedly affects citizens' rights and freedoms, which are strictly regulated by the EU through the General Data Protection Regulation (GDPR). This concern creates a big gap between the data owner and the d...
0000−0003−3234−8653] , Ziad Doughan 1[0000−0002−7566−7710] , Layth Sliman 2[0000−0003−3369−7302] , and Ali Haidar 1[0000−0001−8065−3658] Abstract. With the advancement of Machine Learning, recommender systems have emerged with the aim of improving the user experience in a world where data and available alternatives are tremendously growing. Employi...
A Smart Contract (SC) is a piece of code executed on the blockchain to automatically trigger transactions upon the occurrence of predefined events. Due to the intrinsic features regarding traceability and data immutability, many companies started using blockchain Smart Contracts to perform collaborative processes. Despite their promising features,...
With the advancement of Machine Learning, recommender systems have emerged with the aim of improving the user experience in a world where data and available alternatives are tremendously growing. Employing Natural Language Processing with such systems can provide them with a sense of empowerment, given that most of the users’ opinions are reflected...
Elliptic Curve Digital Signature Algorithm (ECDSA) is a crucial au-
thentication component of many modern internet and communica-
tion systems. It is used in different domains such as cryptocurrency,
IoT, e-health, e-banking, e-governance, etc. Due to the spread of
open, distributed and collaborative systems brought by the sharing
economy, the surg...
Many today’s companies use Smart Contracts to represent and execute their business processes. Smart contracts are self-executed programs running over blockchain. In this context, composite smart contracts are used to represent collaborative business processes. A composite smart contract is a smart contract that needs to execute other contracts usin...
A Service Level Agreement (SLA) is an agreement between clients and providers in the context of a particular service provision. In fact, trust between the consumer and the service provider (SP) is a real issue, especially when there is a violation of the SLA. Usually, the consumer is unable to prove or determine a violation. Therefore, traditional...
Very few organizations can afford the necessary infrastructure for genomic data analytic, which requires a very large amount of storage and computational resources. In this context, cloud computing platforms can be adopted as a practical solution for storage and computations. However, sharing such sensitive information with cloud providers can lead...
In recent years, Blockchain technology has proved
its efficiency in many domains. A smart contract is a software
component allowing exposing services via the Blockchain network. Smart contracts are small programs that automatically
execute the terms of an agreement when predetermined terms
and conditions are reached. With the increasing growth in
t...
Blockchain brings many added values to modern business systems. However, Blockchain-based applications with massive IoT devices experience some limitations. The limitations are due to the linear structure and the consensus algorithms used in Blockchain that consume the participating nodes' considerable resources. In addition, IoT devices are genera...
In this article, we study the NP-Hard combinatorial optimization problem of the minimum initial marking (MIM) computation in labeled Petri net (L-PN) while considering a sequence of labels to minimize the resource consumption in a flexible manufacturing system (FMS), and we propose an approach based on the ant colony optimization (ACO) precisely th...
Conventional cryptographic methods are not appropriate for IoT environments due to the specific IoT devices constraints, such as memory usage, time and computational costs. This leads to the emergence of the lightweight cryptography field. This paper investigates the different lightweight cryptographic design methods and proposes an IoT-based crypt...
Modern IT technologies shaped the shift in economic models with many advantages on cost, optimization, and time to market. This economic shift has increased the need for transparency and traceability in supply chain platforms to achieve trust among partners. Distributed ledger technology (DLT) is proposed to enable supply chains systems with trust...
IOTA is a distributed ledger technology (DLT) platform proposed for the internet of things (IoT) systems in order to tackle the limitations of Blockchain in terms of latency, scalability, and transaction cost. The main concepts used in IOTA to reach this objective are a directed acyclic graph (DAG) based ledger, called Tangle, used instead of the c...
Data transparency is essential in the modern supply chain to improve trust and boost collaboration among partners. In this context, Blockchain is a promising technology to provide full transparency across the entire supply chain. However, Blockchain was originally designed to provide full transparency and uncontrolled data access. This leads many m...
Authors are invited to submit a manuscript to the 3rd IEEE International Workshop on Smart & Sustainable Mobility & Logistics in Smart Cities - SSMLS 2021 (at COMPSAC 2021). Deadline for submission (Extended): May 1, 2021
A multi‐biometric system uses different modalities to identify individuals more accurately.
The authors analyse fusion efficiency of a significant number of multi‐biometric fusion schemes. To do so, the study applies different functions that are generated using genetic programming (GP) on the 2000 multi‐biometric instances produced by the fusion of...
The use of blockchain (BC) technology for IoT-based collaboration platforms is still hindered by its inherent properties, namely, the need for ever-increasing storage and the low scalability. In this paper, we investigate the interoperability requirements between BC and tangle distributed technologies. We propose a new decentralization architecture...
Ensuring the correctness of smart contracts is of paramount importance to achieve trust and continuity in the Blockchain-based business process execution. Due to the immutable nature of distributed ledger technology on the blockchain, a smart contract should work as intended before using it. Any bugs or errors will become permanent once published a...
This paper presents the design and implementation of a new platform that takes into consideration the requirements and constraints resulting from the industrial context based on IoT. This platform combines the “Tangle” and “Blockchain” techniques. Tangle is primarily designed to address scale-up issues and the relatively high cost (time and resourc...
To achieve trust and continuity in the smart contracts-based business process execution, the verification of such smart contracts is mandatory. A blockchain-based smart contract should work as intended before using it. Due to the immutable nature of blockchain, any bugs or errors will become permanent once published and could lead to huge economic...
System analysis is a crucial activity throughout component-based architecture design. It enables detecting and correcting errors in the early stage of the system development life cycle. In this paper, we consider system analysis in UML2.0 component-based architectural design phase. This is done by proposing a Model Driven Engineering (MDE) tool cal...
Authors are invited to submit a manuscript to the 2nd IEEE International Workshop on Smart & Sustainable Mobility & Logistics in Smart Cities - SSMLS 2020 (at COMPSAC 2020). Deadline for submission (Extended): April 24, 2020
Motivation:
As a result of the worldwide health care system digitalization trend, the produced healthcare data is estimated to reach as much as 2314 Exabytes of new data generated in 2020. The ongoing development of intelligent systems aims to provide better reasoning and to more efficiently use the data collected. This use is not restricted retro...
Computing the minimum initial marking (MIM) in labeled Petri nets (PN) while considering a sequence of labels constitutes a difficult problem. The existing solutions of such a problem suffer from diverse limitations. In this paper, we proposed a new approach to automatically compute the MIM in labeled PNs in a timely fashion. We adopted a genetic-b...
System analysis is a crucial activity throughout component-based architecture design. It enables detecting and correcting errors in the early stage of the system development life cycle. In this article, we consider system analysis in UML2.0 component-based architectural design phase. This is done by proposing a model-driven engineering (MDE) tool c...
Service Component Architectures (SCA) is widely used for the integration of heterogeneous applications. This heterogeneity, added to the distributed aspect of SCA, can be a source of behavioral mismatches. In this paper, we present a new approach for behavioral verification of SCA software architectures. More precisely , we propose a translation of...
So far, many cryptography systems adapted to Internet of Things (IoT) paradigm have been introduced. However, in these approaches, the constraint of images exchange has not been taken into consideration. In fact, image content is characterized by the correlation between its elements e.g. pixels. Correlation impacts negatively the security. Actually...
A uni-biometric system suffers from unbalanced accuracy because of image quality, features extraction weakness, matching algorithm and limited degrees of freedom. This can be overcome by using multiple evidences of the same identity (Multi-biometrics fusion). In a previous work, we proposed new fusion functions based on arithmetic operators and sea...
Computing the minimum initial marking (MIM) in labeled Petri nets (PN) while considering a sequence of labels constitutes a difficult problem. The existing solutions of such a problem suffer from diverse limitations. In this paper, we proposed a new approach to automatically compute the MIM in labeled PNs in a timely fashion. We adopted a simulated...
In this paper, an approach for verifying data exchange requirements in the context of IoT with regard to resource constraints is described. The verification is done using Event-B method. The security requirements are defined based on the correlation concept. The capacity requirements are defined as a set of constraints on the exchanged data. The pr...
Web systems verification is a crucial activity throughout the systems development life cycle, especially in the phase of service-component architectural design. Indeed, this activity allows the detection and consequently the correction of errors early in Web systems development life cycle. In this paper, we discuss the behavioral verification probl...
AC (Access Control) is the process of ensuring that an authenticated user accesses only what he or she is authorized to do with respect to certain models and security policies. In business collaboration systems, services are designed to conduct actions requested by a customer, using service provider's infrastructure. In such context, the agreement...
With the spread of Internet of Things (IoT), ensuring security and privacy proves essential. However, given the limited computation resources of IoT objects, the mechanisms and techniques used to secure data exchange in these environments should consider many constraints such as power consumption, size, execution time … etc. To cope with these cons...
Typically an ontology matching technique is a combination of much different type of matchers operating at various abstraction levels such as structure, semantic, syntax, instance etc. An ontology matching technique which employs matchers at all possible abstraction levels is expected to give, in general, best results in terms of precision, recall a...
Context: Open standards are urgently needed for enabling software interoperability in Cloud Computing. Open Cloud Computing Interface (OCCI) provides a set of best design principles to create interoperable REST management APIs. Although OCCI is the only standard addressing the management of any kind of cloud resources, it does not support a range o...
Several Lightweight cryptosystems were specially designed for constrained-devices. For this reason many papers have been comparing and assessing existing Lightweight cryptosystems. Our contribution; compared to those papers; is to analyse the recently and popular Lightweight cryptosystems using actual devices used in IoT context namely the Raspberr...
In recent years, the Unified Modeling Language (UML) has emerged as a de facto industrial standard for modeling Component-Based Software (CBS). However, in order to ensure the safety and vivacity of UML CBS, many approaches have been proposed to verify the concurrency between interconnected components. But, rare are the works that tackle concurrenc...
There is a need for further research in the area of ontology evaluation specifically dealing with ontology development exploiting concept maps. The existing literature on ontology evaluation primarily emphasis on ontology formalisation as well as on performing logical inferences, which is usually not directly relevant for concept maps as they are c...
Cloud environments have been increasingly used to deploy and run software while providing a high level performance with a low operating cost. Most of the existing software applications are nowadays distributed as Package-based Free and Open Source (PFOS) applications. Different requirements must be considered while configuring PFOS software. These...
Cyber-attacks have become more complex and unpredictable. Due to their devastating impacts, choosing the appropriate response has become a priority for corporations. This paper introduces an incident response system based on a supervised machine learning model. It offers a framework to process alerts and enhance them to classify and defend against...
In this paper, we introduce a new chaff-points generation method in fuzzy vault fingerprint. Our method is based on squares boundaries and Knapsack problem. Chaff-points generation process consists of creating a set of chaff points similar to authentic minutiae feature representation. Squares based chaff-points generation consist of delimiting a sq...