Ezedin Barka
Ezedin Barka
Associate Professor of Information Security, UAEU
Verified email at uaeu.ac.ae
Cited by
Cited by
Framework for role-based delegation models
E Barka, R Sandhu
Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00 …, 2000
A role-based delegation model and some extensions
E Barka, R Sandhu
Proceedings of the 23rd National Information Systems Security Conference 4 …, 2000
Role-based delegation model/hierarchical roles (RBDM1)
E Barka, R Sandhu
20th Annual Computer Security Applications Conference, 396-404, 2004
Mobility analysis in vehicular ad hoc network (VANET)
L Zhang, A Lakas, H El-Sayed, E Barka
Journal of Network and Computer Applications 36 (3), 1050-1056, 2013
Integrating usage control with SIP-based communications
E Barka, A Lakas
Journal of Computer Systems, Networks, and Communications 2008, 2008
Method and apparatus for enhancing patient compliance during inspiration measurements
IIKN Knapp, AM Cohen
US Patent 6,740,046, 2004
Securing the web of things with role-based access control
E Barka, SS Mathew, Y Atif
International Conference on Codes, Cryptology, and Information Security, 14-26, 2015
UAV-assisted technique for the detection of malicious and selfish nodes in VANETs
CA Kerrache, A Lakas, N Lagraa, E Barka
Vehicular Communications 11, 1-11, 2018
Towards a national trauma registry for the United Arab Emirates
S Shaban, HO Eid, E Barka, FM Abu-Zidan
BMC research notes 3 (1), 1-6, 2010
Framework for role-based delegation models
ES Barka
George Mason University, 2002
Impact of security on the performance of Wireless-Local Area Networks
E Barka, M Boulmalf, A Alteniji, H Al Suwaidi, H Khazaimy, M Al Mansouri
2006 Innovations in Information Technology, 1-5, 2006
Revocation in VANETs: A survey
H Al Falasi, E Barka
2011 International Conference on Innovations in Information Technology, 214-219, 2011
On the Impact of Security on the Performance of WLANs.
E Barka, M Boulmalf
JCM 2 (4), 10-17, 2007
Analysis of the effect of security on data and voice traffic in WLAN
M Boulmalf, E Barka, A Lakas
Computer Communications 30 (11-12), 2468-2477, 2007
A trusted lightweight communication strategy for flying named data networking
E Barka, CA Kerrache, R Hussain, N Lagraa, A Lakas, SH Bouk
Sensors 18 (8), 2683, 2018
Firewall filtering rules analysis for anomalies detection
A Bouhoula, Z Trabelsi, E Barka, MA Benelbahri
International Journal of Security and Networks 3 (3), 161-172, 2008
Framework for agent-based role delegation
E Barka, R Sandhu
2007 IEEE International Conference on Communications, 1361-1367, 2007
Towards a trusted unmanned aerial system using blockchain for the protection of critical infrastructure
E Barka, CA Kerrache, H Benkraouda, K Shuaib, F Ahmad, F Kurugollu
Transactions on Emerging Telecommunications Technologies, e3706, 2019
A new machine learning-based collaborative ddos mitigation mechanism in software-defined network
SS Mohammed, R Hussain, O Senko, B Bimaganbetov, JY Lee, ...
2018 14th International Conference on Wireless and Mobile Computing …, 2018
Impact of encryption on the throughput of infrastructure WLAN IEEE 802.11 g
E Barka, M Boulmalf
2007 IEEE Wireless Communications and Networking Conference, 2691-2697, 2007
The system can't perform the operation now. Try again later.
Articles 1–20