This page has only limited features, please log in for full access.

Dr. Layth Sliman
efrei paris

Basic Info

Basic Info is private.

Research Keywords & Expertise

0 Cryptanalysis
0 Enterprise Collaboration
0 Security Architecture Design
0 Risk Based Approach To IT Infrastructure
0 Blockchain

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 09 July 2021 in Sensors
Reads 0
Downloads 0

IOTA is a distributed ledger technology (DLT) platform proposed for the internet of things (IoT) systems in order to tackle the limitations of Blockchain in terms of latency, scalability, and transaction cost. The main concepts used in IOTA to reach this objective are a directed acyclic graph (DAG) based ledger, called Tangle, used instead of the chain of blocks, and a new validation mechanism that, instead of relying on the miners as it is the case in Blockchain, relies on participating nodes that cooperate to validate the new transactions. Due to the different IoT capabilities, IOTA classifies these devices into full and light nodes. The light nodes are nodes with low computing resources which seek full nodes’ help to validate and attach its transaction to the Tangle. The light nodes are manually connected to the full nodes by using the full node IP address or the IOTA client load balancer. This task distribution method overcharges the active full nodes and, thus, reduces the platform’s performance. In this paper, we introduce an efficient mechanism to distribute the tasks fairly among full nodes and hence achieve load balancing. To do so, we consider the task allocation between the nodes by introducing an enhanced resource allocation scheme based on the weight least connection algorithm (WLC). To assess its performance, we investigate and test different implementation scenarios. The results show an improved balancing of data traffic among full nodes based on their weights and number of active connections.

ACS Style

Houssein Hellani; Layth Sliman; Abed Samhat; Ernesto Exposito. Computing Resource Allocation Scheme for DAG-Based IOTA Nodes. Sensors 2021, 21, 4703 .

AMA Style

Houssein Hellani, Layth Sliman, Abed Samhat, Ernesto Exposito. Computing Resource Allocation Scheme for DAG-Based IOTA Nodes. Sensors. 2021; 21 (14):4703.

Chicago/Turabian Style

Houssein Hellani; Layth Sliman; Abed Samhat; Ernesto Exposito. 2021. "Computing Resource Allocation Scheme for DAG-Based IOTA Nodes." Sensors 21, no. 14: 4703.

Journal article
Published: 02 July 2021 in Logistics
Reads 0
Downloads 0

Data transparency is essential in the modern supply chain to improve trust and boost collaboration among partners. In this context, Blockchain is a promising technology to provide full transparency across the entire supply chain. However, Blockchain was originally designed to provide full transparency and uncontrolled data access. This leads many market actors to avoid Blockchain as they fear for their confidentiality. In this paper, we highlight the requirements and challenges of supply chain transparency. We then investigate a set of supply chain projects that tackle data transparency issues by utilizing Blockchain in their core platform in different manners. Furthermore, we analyze the projects’ techniques and the tools utilized to customize transparency. As a result of the projects’ analyses, we identified that further enhancements are needed to set a balance between the data transparency and process opacity required by different partners, to ensure the confidentiality of their processes and to control access to sensitive data.

ACS Style

Houssein Hellani; Layth Sliman; Abed Samhat; Ernesto Exposito. On Blockchain Integration with Supply Chain: Overview on Data Transparency. Logistics 2021, 5, 46 .

AMA Style

Houssein Hellani, Layth Sliman, Abed Samhat, Ernesto Exposito. On Blockchain Integration with Supply Chain: Overview on Data Transparency. Logistics. 2021; 5 (3):46.

Chicago/Turabian Style

Houssein Hellani; Layth Sliman; Abed Samhat; Ernesto Exposito. 2021. "On Blockchain Integration with Supply Chain: Overview on Data Transparency." Logistics 5, no. 3: 46.

Journal article
Published: 30 June 2021 in Journal of Information Security and Applications
Reads 0
Downloads 0

Conventional cryptographic methods are not appropriate for IoT environments due to the specific IoT devices constraints, such as memory usage, time and computational costs. This leads to the emergence of the lightweight cryptography field. This paper investigates the different lightweight cryptographic design methods and proposes an IoT-based cryptographic method, called Ultra-Lightweight method (ULM), to enhance the performance, memory usage and security of IoT devises. The proposed method is based on three methods (i.e, bitslice, WTS and involutive), and thus accumulating their various advantages such as, memory use, efficiency and security. To validate our proposal, a cryptosystem is designed using ULM method. The designed cryptosystem is benchmarked based on the following metrics: performance (by measuring its execution time and the number of clock cycles needed to run it), the quantity of used memory (by measuring ROM and RAM consumption), and security level (by measuring its diffusion and confusion levels along with its resistance to linear and differential attacks). The results show that the cryptosystem designed using the proposed method outperforms existing methods in terms of memory use, security and performance.

ACS Style

Layth Sliman; Tasnime Omrani; Zahir Tari; Abed Ellatif Samhat; Rhouma Rhouma. Towards an ultra lightweight block ciphers for Internet of Things. Journal of Information Security and Applications 2021, 61, 102897 .

AMA Style

Layth Sliman, Tasnime Omrani, Zahir Tari, Abed Ellatif Samhat, Rhouma Rhouma. Towards an ultra lightweight block ciphers for Internet of Things. Journal of Information Security and Applications. 2021; 61 ():102897.

Chicago/Turabian Style

Layth Sliman; Tasnime Omrani; Zahir Tari; Abed Ellatif Samhat; Rhouma Rhouma. 2021. "Towards an ultra lightweight block ciphers for Internet of Things." Journal of Information Security and Applications 61, no. : 102897.

Review
Published: 15 September 2020 in Transactions on Petri Nets and Other Models of Concurrency XV
Reads 0
Downloads 0

Ensuring the correctness of smart contracts is of paramount importance to achieve trust and continuity in the Blockchain-based business process execution. Due to the immutable nature of distributed ledger technology on the blockchain, a smart contract should work as intended before using it. Any bugs or errors will become permanent once published and could lead to huge economic losses. To avoid such problems, verification is required to check the correctness and the security of the smart contract. In this paper, we consider the smart contracts and we investigate the verification of the correctness of the Blockchain-based smart contracts using formal verification methods. We provide an overview of the formal verification of smart contracts and we present the used methods, tools and approaches. We show a description of each method as well as its advantages and limitations.

ACS Style

Mouhamad Almakhour; Layth Sliman; Abed Ellatif Samhat; Abdelhamid Mellouk. On the Verification of Smart Contracts: A Systematic Review. Transactions on Petri Nets and Other Models of Concurrency XV 2020, 94 -107.

AMA Style

Mouhamad Almakhour, Layth Sliman, Abed Ellatif Samhat, Abdelhamid Mellouk. On the Verification of Smart Contracts: A Systematic Review. Transactions on Petri Nets and Other Models of Concurrency XV. 2020; ():94-107.

Chicago/Turabian Style

Mouhamad Almakhour; Layth Sliman; Abed Ellatif Samhat; Abdelhamid Mellouk. 2020. "On the Verification of Smart Contracts: A Systematic Review." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 94-107.

Review article
Published: 08 August 2020 in Pervasive and Mobile Computing
Reads 0
Downloads 0

To achieve trust and continuity in the smart contracts-based business process execution, the verification of such smart contracts is mandatory. A blockchain-based smart contract should work as intended before using it. Due to the immutable nature of blockchain, any bugs or errors will become permanent once published and could lead to huge economic losses. To avoid such problems, verification is required to check the correctness and the security of the smart contract. In this survey, we consider the smart contracts and we investigate smart contacts formal verification methods. We also investigate the security assurance for smart contracts using vulnerabilities detection methods. In this context, we provide a detailed overview of the different approaches to verify the smart contracts and we present the used methods and tools. We show a description of each method as well as its advantages and limitations and we draw several conclusions.

ACS Style

Mouhamad Almakhour; Layth Sliman; Abed Ellatif Samhat; Abdelhamid Mellouk. Verification of smart contracts: A survey. Pervasive and Mobile Computing 2020, 67, 101227 .

AMA Style

Mouhamad Almakhour, Layth Sliman, Abed Ellatif Samhat, Abdelhamid Mellouk. Verification of smart contracts: A survey. Pervasive and Mobile Computing. 2020; 67 ():101227.

Chicago/Turabian Style

Mouhamad Almakhour; Layth Sliman; Abed Ellatif Samhat; Abdelhamid Mellouk. 2020. "Verification of smart contracts: A survey." Pervasive and Mobile Computing 67, no. : 101227.

Journal article
Published: 17 January 2020 in IEEE Access
Reads 0
Downloads 0

Computing the minimum initial marking (MIM) in labeled Petri nets (PN) while considering a sequence of labels constitutes a difficult problem. The existing solutions of such a problem suffer from diverse limitations. In this paper, we proposed a new approach to automatically compute the MIM in labeled PNs in a timely fashion. We adopted a genetic-based algorithm to model the MIM problem. The choice of such an algorithm is justified by the nature of the MIM process which belongs to the NP-hard class. We experimentally showed the effectiveness of our approach and empirically studied the initial marking quality in particular.

ACS Style

Hichem Kmimech; Achraf Jabeur Telmoudi; Layth Sliman; Lotfi Nabli. Genetic-Based Approach for Minimum Initial Marking Estimation in Labeled Petri Nets. IEEE Access 2020, 8, 22854 -22861.

AMA Style

Hichem Kmimech, Achraf Jabeur Telmoudi, Layth Sliman, Lotfi Nabli. Genetic-Based Approach for Minimum Initial Marking Estimation in Labeled Petri Nets. IEEE Access. 2020; 8 (99):22854-22861.

Chicago/Turabian Style

Hichem Kmimech; Achraf Jabeur Telmoudi; Layth Sliman; Lotfi Nabli. 2020. "Genetic-Based Approach for Minimum Initial Marking Estimation in Labeled Petri Nets." IEEE Access 8, no. 99: 22854-22861.

Conference paper
Published: 28 October 2019 in Communications in Computer and Information Science
Reads 0
Downloads 0

So far, many cryptography systems adapted to Internet of Things (IoT) paradigm have been introduced. However, in these approaches, the constraint of images exchange has not been taken into consideration. In fact, image content is characterized by the correlation between its elements e.g. pixels. Correlation impacts negatively the security. Actually, using correlation, one can disclose data content once he/she has recognized a part of it. In this paper, we introduce a new cryptography system that takes into consideration correlation issue. Furthermore, our system allows reducing significantly memory use and time consumption, which are critical factor in IoT dedicated cryptosystems.

ACS Style

Tasnime Omrani; Layth Sliman. A New Lightweight Encryption Approach for Correlated Content Exchange in Internet of Things. Communications in Computer and Information Science 2019, 161 -171.

AMA Style

Tasnime Omrani, Layth Sliman. A New Lightweight Encryption Approach for Correlated Content Exchange in Internet of Things. Communications in Computer and Information Science. 2019; ():161-171.

Chicago/Turabian Style

Tasnime Omrani; Layth Sliman. 2019. "A New Lightweight Encryption Approach for Correlated Content Exchange in Internet of Things." Communications in Computer and Information Science , no. : 161-171.

Conference paper
Published: 24 September 2019 in Communications in Computer and Information Science
Reads 0
Downloads 0

A uni-biometric system suffers from unbalanced accuracy because of image quality, features extraction weakness, matching algorithm and limited degrees of freedom. This can be overcome by using multiple evidences of the same identity (Multi-biometrics fusion). In a previous work, we proposed new fusion functions based on arithmetic operators and search the best ones using Genetic Programming on the XM2VTS score database. The objective function is based on the Half Total Error Rate (HTER) (a threshold dependent metrics), from the Expected Performance Curve (EPC), of fused matching scores. In this paper, we select ten functions from the generated ones and apply them on matching scores of different biometric systems, which are provided by the bio-secure database. This database provide 24 streams that we use to generate 1000 multi-biometric combinations that we, then, use to conduct our comparative study. Since the result of fusion can be biased and requires a good quality assessment to evaluate the degree of reliability of a processed scheme, we use quality weights on the proposed functions and we compare the results with existing approaches. The proposed quality weights help to reduce the Equal Error Rate (EER a threshold-independent metric) since the obtained matching scores are results of different fusions of instances, sensors and evidences. The EER range is optimized along the tested functions. To confirm that our proposed functions give better score results than the existing functions based on arithmetic rules, we perform multiple statistical significance tests to check the reliability of our experimentation.

ACS Style

Saliha Artabaz; Layth Sliman. Study of Score Fusion and Quality Weighting in the Bio-Secure DS2 Database. Communications in Computer and Information Science 2019, 252 -261.

AMA Style

Saliha Artabaz, Layth Sliman. Study of Score Fusion and Quality Weighting in the Bio-Secure DS2 Database. Communications in Computer and Information Science. 2019; ():252-261.

Chicago/Turabian Style

Saliha Artabaz; Layth Sliman. 2019. "Study of Score Fusion and Quality Weighting in the Bio-Secure DS2 Database." Communications in Computer and Information Science , no. : 252-261.

Conference paper
Published: 21 September 2019 in Business Information Systems
Reads 0
Downloads 0

In this paper, an approach for verifying data exchange requirements in the context of IoT with regard to resource constraints is described. The verification is done using Event-B method. The security requirements are defined based on the correlation concept. The capacity requirements are defined as a set of constraints on the exchanged data. The proposed approach starts by formalizing the data exchange process. Second, it extends this formalization with the data exchange security and capacity requirements. The consistency of each model and the relationship between an abstract model and its refinements are obtained by formal proofs. Finally, we use ProB model-checker to trace possible design errors.

ACS Style

Imed Abbassi; Layth Sliman; Mohamed Graiet; Walid Gaaloul. On the Verification of Data Encryption Requirements in Internet of Things Using Event-B. Business Information Systems 2019, 147 -156.

AMA Style

Imed Abbassi, Layth Sliman, Mohamed Graiet, Walid Gaaloul. On the Verification of Data Encryption Requirements in Internet of Things Using Event-B. Business Information Systems. 2019; ():147-156.

Chicago/Turabian Style

Imed Abbassi; Layth Sliman; Mohamed Graiet; Walid Gaaloul. 2019. "On the Verification of Data Encryption Requirements in Internet of Things Using Event-B." Business Information Systems , no. : 147-156.

Conference paper
Published: 08 February 2019 in Communications in Computer and Information Science
Reads 0
Downloads 0

Web systems verification is a crucial activity throughout the systems development life cycle, especially in the phase of service-component architectural design. Indeed, this activity allows the detection and consequently the correction of errors early in Web systems development life cycle. In this paper, we discuss the behavioral verification problem on the SCDL/WS-BPEL service-component architectures. To do so, the Wright formal ADL and the Ada concurrent language were used as a target models. To achieve this, a set of systematic translation rules are proposed. This allows the verification of the standard behavioral properties using the Wr2fdr tool. In addition, using an Ada dynamic analysis tool, we could detect the potential behavioral properties such as the deadlock of an Ada concurrent program.

ACS Style

Taoufik Sakka Rouis; Mohamed Tahar Bhiri; Mourad Kmimech; Layth Sliman. A Generic Approach for the Verification of Static and Dynamic Behavioral Properties of SCDL/WS-BPEL Service-Component Architectures. Communications in Computer and Information Science 2019, 381 -389.

AMA Style

Taoufik Sakka Rouis, Mohamed Tahar Bhiri, Mourad Kmimech, Layth Sliman. A Generic Approach for the Verification of Static and Dynamic Behavioral Properties of SCDL/WS-BPEL Service-Component Architectures. Communications in Computer and Information Science. 2019; ():381-389.

Chicago/Turabian Style

Taoufik Sakka Rouis; Mohamed Tahar Bhiri; Mourad Kmimech; Layth Sliman. 2019. "A Generic Approach for the Verification of Static and Dynamic Behavioral Properties of SCDL/WS-BPEL Service-Component Architectures." Communications in Computer and Information Science , no. : 381-389.

Journal article
Published: 02 November 2018 in Information and Software Technology
Reads 0
Downloads 0

Context: Open standards are urgently needed for enabling software interoperability in Cloud Computing. Open Cloud Computing Interface (OCCI) provides a set of best design principles to create interoperable REST management APIs. Although OCCI is the only standard addressing the management of any kind of cloud resources, it does not support a range of best principles related to REST design. This often worsens REST API quality by decreasing their understandability and reusability. Objective: We aim at assisting cloud developers to enhance their REST management APIs by providing a compliance evaluation of OCCI and REST best principles and a recommendation support to comply with these principles. Method: First, we leverage patterns and anti-patterns to drive respectively the good and poor practices of OCCI and REST best principles. Then, we propose a semantic-based approach for defining and detecting REST and OCCI (anti)patterns and providing a set of correction recommendations to comply with both REST and OCCI best principles. We validated this approach by applying it on cloud REST APIs and evaluating its accuracy, usefulness and extensibility. Results: We found that our approach accurately detects OCCI and REST(anti)patterns and provides useful recommendations. According to the compliance results, we reveal that there is no widespread adoption of OCCI principles in existing APIs. In contrast, these APIs have reached an acceptable level of maturity regarding REST principles. Conclusion: Our approach provides an effective and extensible technique for defining and detecting OCCI and REST (anti)patterns in Cloud REST APIs. Cloud software developers can benefit from our approach and defined principles to accurately evaluate their APIs from OCCI and REST perspectives. This contributes in designing interoperable, understandable, and reusable Cloud management APIs. Thank to the compliance analysis and the recommendation support, we also contribute to improving these APIs, which make them more straightforward.

ACS Style

Hayet Brabra; Achraf Mtibaa; Fabio Petrillo; Philippe Merle; Layth Sliman; Naouel Moha; Walid Gaaloul; Yann-Gaël Guéhéneuc; Boualem Benatallah; Faïez Gargouri. On semantic detection of cloud API (anti)patterns. Information and Software Technology 2018, 107, 65 -82.

AMA Style

Hayet Brabra, Achraf Mtibaa, Fabio Petrillo, Philippe Merle, Layth Sliman, Naouel Moha, Walid Gaaloul, Yann-Gaël Guéhéneuc, Boualem Benatallah, Faïez Gargouri. On semantic detection of cloud API (anti)patterns. Information and Software Technology. 2018; 107 ():65-82.

Chicago/Turabian Style

Hayet Brabra; Achraf Mtibaa; Fabio Petrillo; Philippe Merle; Layth Sliman; Naouel Moha; Walid Gaaloul; Yann-Gaël Guéhéneuc; Boualem Benatallah; Faïez Gargouri. 2018. "On semantic detection of cloud API (anti)patterns." Information and Software Technology 107, no. : 65-82.

Conference paper
Published: 01 June 2018 in 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)
Reads 0
Downloads 0

Security, Safety and Confidentiality in IoT for Collaborative Business Technologies (SSCIoT) is a track of the 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE-2018). SSCIoT aims to present mature research results or work-in-progress in all areas focuses security in IoT architecture based on business process, Business Analytics, Data fusion, Physical infrastructures of information systems and other fields. This report summarizes the content of accepted papers for oral presentation in SSCIoT track.

ACS Style

Layth Sliman; Hachemi Nabil Dellys. Security, Safety and Confidentiality in IoT for Collaborative Business Technologies (SSCIoT Track of WETICE 2018). 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) 2018, 179 -180.

AMA Style

Layth Sliman, Hachemi Nabil Dellys. Security, Safety and Confidentiality in IoT for Collaborative Business Technologies (SSCIoT Track of WETICE 2018). 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE). 2018; ():179-180.

Chicago/Turabian Style

Layth Sliman; Hachemi Nabil Dellys. 2018. "Security, Safety and Confidentiality in IoT for Collaborative Business Technologies (SSCIoT Track of WETICE 2018)." 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) , no. : 179-180.

Conference paper
Published: 22 March 2018 in Advances in Intelligent Systems and Computing
Reads 0
Downloads 0

In recent years, the Unified Modeling Language (UML) has emerged as a de facto industrial standard for modeling Component-Based Software (CBS). However, in order to ensure the safety and vivacity of UML CBS, many approaches have been proposed to verify the concurrency between interconnected components. But, rare are the works that tackle concurrency verification inside atomic components. In this paper, our purpose was the verification of the concurrency inside UML2.0 atomic components endowed with behavioral specifications described by protocol state machines (PSM). To achieve this, we propose to translate the UML2.0/PSM source component to an Ada concurrent program. Using an Ada formal analysis tool such as FLAVERS or INCA tools, we could detect the potential behavioral concurrency properties such as the deadlock of an Ada concurrent program.

ACS Style

Taoufik Sakka Rouis; Mohamed Tahar Bhiri; Mourad Kmimech; Layth Sliman. UML2ADA for Early Verification of Concurrency Inside the UML2.0 Atomic Components. Advances in Intelligent Systems and Computing 2018, 10 -20.

AMA Style

Taoufik Sakka Rouis, Mohamed Tahar Bhiri, Mourad Kmimech, Layth Sliman. UML2ADA for Early Verification of Concurrency Inside the UML2.0 Atomic Components. Advances in Intelligent Systems and Computing. 2018; ():10-20.

Chicago/Turabian Style

Taoufik Sakka Rouis; Mohamed Tahar Bhiri; Mourad Kmimech; Layth Sliman. 2018. "UML2ADA for Early Verification of Concurrency Inside the UML2.0 Atomic Components." Advances in Intelligent Systems and Computing , no. : 10-20.

Journal article
Published: 01 March 2018 in Measurement
Reads 0
Downloads 0
ACS Style

Rizwan Iqbal; Masrah Azrifah Azmi Murad; Layth Sliman; Clay Palmeira da Silva. A mathematical evaluation for measuring correctness of domain ontologies using concept maps. Measurement 2018, 118, 73 -82.

AMA Style

Rizwan Iqbal, Masrah Azrifah Azmi Murad, Layth Sliman, Clay Palmeira da Silva. A mathematical evaluation for measuring correctness of domain ontologies using concept maps. Measurement. 2018; 118 ():73-82.

Chicago/Turabian Style

Rizwan Iqbal; Masrah Azrifah Azmi Murad; Layth Sliman; Clay Palmeira da Silva. 2018. "A mathematical evaluation for measuring correctness of domain ontologies using concept maps." Measurement 118, no. : 73-82.

Conference paper
Published: 01 February 2018 in 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
Reads 0
Downloads 0

Chaff-points generation is one of the most important steps in the fuzzy vault encryption process. This phase is time and computational resource consuming. Several methods were proposed in the literature to optimize this step for resource constrained environments. The challenge is to generate the desired number of chaff-points in a minimum and homogeneous time and a minimum amount of computational re-sources. In this paper, we propose a new chaff-points generation method based on genetic algorithm and non-fixed squares boundaries for resource constrained devices. The obtained results showed that our method gives the desired number of chaff-points in a better time than other methods.

ACS Style

Hachemi Nabil Dellys; Karima Benatchba; Layth Sliman; Yen Wei Chen. Chaff-Points Generation Method Based on Adaptive Genetic Algorithms and Non-Fixed Size Squares Boundaries for Resource Constrained Devices. 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2018, 1 -4.

AMA Style

Hachemi Nabil Dellys, Karima Benatchba, Layth Sliman, Yen Wei Chen. Chaff-Points Generation Method Based on Adaptive Genetic Algorithms and Non-Fixed Size Squares Boundaries for Resource Constrained Devices. 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS). 2018; ():1-4.

Chicago/Turabian Style

Hachemi Nabil Dellys; Karima Benatchba; Layth Sliman; Yen Wei Chen. 2018. "Chaff-Points Generation Method Based on Adaptive Genetic Algorithms and Non-Fixed Size Squares Boundaries for Resource Constrained Devices." 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS) , no. : 1-4.

Conference paper
Published: 20 October 2017 in Computer Vision
Reads 0
Downloads 0

Cloud environments have been increasingly used to deploy and run software while providing a high level performance with a low operating cost. Most of the existing software applications are nowadays distributed as Package-based Free and Open Source (PFOS) applications. Different requirements must be considered while configuring PFOS software. These requirements can be classified into two classes: dependency and capacity requirements. In this paper, we proposed a novel approach to ensure the correctness of elastic composite PFOS applications. Our approach is based on Event-B and combines proof-based models with model checking to provide a more complete verification. It starts by abstractly specifying the main concepts of PFOS software, and then refining them through multiple steps to model the elastic composite PFOS software and its correctness requirements. The consistency of each model and the relationship between an abstract model and its refinements are obtained by formal proofs. Finally, we used the ProB model-checker to trace possible design errors.

ACS Style

Imed Abbassi; Mohamed Graiet; Sindyana Jlassi; Abir Elkhalfa; Layth Sliman. A Formal Approach for Correct Elastic Package-Based Free and Open Source Software Composition in Cloud. Computer Vision 2017, 732 -750.

AMA Style

Imed Abbassi, Mohamed Graiet, Sindyana Jlassi, Abir Elkhalfa, Layth Sliman. A Formal Approach for Correct Elastic Package-Based Free and Open Source Software Composition in Cloud. Computer Vision. 2017; ():732-750.

Chicago/Turabian Style

Imed Abbassi; Mohamed Graiet; Sindyana Jlassi; Abir Elkhalfa; Layth Sliman. 2017. "A Formal Approach for Correct Elastic Package-Based Free and Open Source Software Composition in Cloud." Computer Vision , no. : 732-750.

Conference paper
Published: 19 August 2017 in Advances in Intelligent Systems and Computing
Reads 0
Downloads 0

With the spread of Internet of Things (IoT), ensuring security and privacy proves essential. However, given the limited computation resources of IoT objects, the mechanisms and techniques used to secure data exchange in these environments should consider many constraints such as power consumption, size, execution time … etc. To cope with these constraints, new lightweight encryption systems have been proposed. This work is intended to compare some recently proposed lightweight cryptosystem in order to identify and suggest the necessary recommendations to achieve an ultra-lightweight cryptosystem adapted to IoT environment.

ACS Style

Tasnime Omrani; Layth Sliman; Rabei Becheikh; Safya Belghith; Belgacem Ben Hedia. Towards an Ultra-lightweight Cryptosystem for IoT. Advances in Intelligent Systems and Computing 2017, 614 -621.

AMA Style

Tasnime Omrani, Layth Sliman, Rabei Becheikh, Safya Belghith, Belgacem Ben Hedia. Towards an Ultra-lightweight Cryptosystem for IoT. Advances in Intelligent Systems and Computing. 2017; ():614-621.

Chicago/Turabian Style

Tasnime Omrani; Layth Sliman; Rabei Becheikh; Safya Belghith; Belgacem Ben Hedia. 2017. "Towards an Ultra-lightweight Cryptosystem for IoT." Advances in Intelligent Systems and Computing , no. : 614-621.

Conference paper
Published: 01 June 2017 in 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)
Reads 0
Downloads 0

Currently, much research looks at treating the behavior properties beginning with the architectural design phase in SCA (Software Component Architectures) based applications. In this paper,we propose to map SCA onto the Wright ADL in order to verify the behavioral consistency of SCA software architectures. To achieve this goal, we suggest translating this source software architecture into a Wright configuration. Using Wr2fdr tool, this Wright configuration can be automatically translated to a CSP specification acceptable by the FDR2 model-checker.

ACS Style

Wael Chargui; Taoufik Sakka Rouis; Mourad Kmimech; Mohamed Tahar Bhiri; Layth Sliman; Badran Raddaoui. Behavioral Verification of Service Component Architecture. 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) 2017, 239 -241.

AMA Style

Wael Chargui, Taoufik Sakka Rouis, Mourad Kmimech, Mohamed Tahar Bhiri, Layth Sliman, Badran Raddaoui. Behavioral Verification of Service Component Architecture. 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE). 2017; ():239-241.

Chicago/Turabian Style

Wael Chargui; Taoufik Sakka Rouis; Mourad Kmimech; Mohamed Tahar Bhiri; Layth Sliman; Badran Raddaoui. 2017. "Behavioral Verification of Service Component Architecture." 2017 IEEE 26th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE) , no. : 239-241.

Conference paper
Published: 23 February 2017 in Advances in Intelligent Systems and Computing
Reads 0
Downloads 0

In this paper, we introduce a new chaff-points generation method in fuzzy vault fingerprint. Our method is based on squares boundaries and Knapsack problem. Chaff-points generation process consists of creating a set of chaff points similar to authentic minutiae feature representation. Squares based chaff-points generation consist of delimiting a square boundary around each chaff-point in such a way that a square must never overlap with other squares. Unlike the typical squares method where chaff-points and their boundaries are generated sequentially, in our proposal, the referred chaff-points are generated all together then the knapsack problem formulation is used along with 0/1 dynamic programing resolution to determine if each chaff-point respects the constraints. The experiments results show that the chaff-points generation based on Knapsack method generates the referred number of chaff-points with reduced computing time, and especially, a smaller standard deviation in comparison to the sequential squares chaff-points generation.

ACS Style

Hachemi Nabil Dellys; Layth Sliman; Saliha Artabaz; Karima Benatchba; Mouloud Koudil. Chaff-Points Generation Using Knapsack Problem Resolution in Fingerprint Fuzzy Vault. Advances in Intelligent Systems and Computing 2017, 507 -516.

AMA Style

Hachemi Nabil Dellys, Layth Sliman, Saliha Artabaz, Karima Benatchba, Mouloud Koudil. Chaff-Points Generation Using Knapsack Problem Resolution in Fingerprint Fuzzy Vault. Advances in Intelligent Systems and Computing. 2017; ():507-516.

Chicago/Turabian Style

Hachemi Nabil Dellys; Layth Sliman; Saliha Artabaz; Karima Benatchba; Mouloud Koudil. 2017. "Chaff-Points Generation Using Knapsack Problem Resolution in Fingerprint Fuzzy Vault." Advances in Intelligent Systems and Computing , no. : 507-516.

Conference paper
Published: 23 February 2017 in Advances in Intelligent Systems and Computing
Reads 0
Downloads 0

Cyber-attacks have become more complex and unpredictable. Due to their devastating impacts, choosing the appropriate response has become a priority for corporations. This paper introduces an incident response system based on a supervised machine learning model. It offers a framework to process alerts and enhance them to classify and defend against sophisticated attacks. Our method helps security analysts handle alerts and apply the most appropriate response mechanisms, thanks to a high level of abstraction of attack description and supervised learning model. The proposed system is flexible and takes into account several attack properties in order to simplify attack handling and aggregate defense mechanisms. The originality of our work is the ability of this system to provide a response to an attack the system face for the first time.

ACS Style

Samih Souissi; Ahmed Serhrouchni; Layth Sliman; Benoit Charroux. Security Incident Response: Towards a Novel Decision-Making System. Advances in Intelligent Systems and Computing 2017, 667 -676.

AMA Style

Samih Souissi, Ahmed Serhrouchni, Layth Sliman, Benoit Charroux. Security Incident Response: Towards a Novel Decision-Making System. Advances in Intelligent Systems and Computing. 2017; ():667-676.

Chicago/Turabian Style

Samih Souissi; Ahmed Serhrouchni; Layth Sliman; Benoit Charroux. 2017. "Security Incident Response: Towards a Novel Decision-Making System." Advances in Intelligent Systems and Computing , no. : 667-676.