Load balancing cloud computing: state of art A Khiyaita, H El Bakkali, M Zbakh, D El Kettani 2012 National Days of Network Security and Systems, 106-109, 2012 | 198 | 2012 |
[Retracted] SmartMedChain: A Blockchain‐Based Privacy‐Preserving Smart Healthcare Framework D El Majdoubi, H El Bakkali, S Sadki Journal of Healthcare Engineering 2021 (1), 4145512, 2021 | 56 | 2021 |
A new technique ensuring privacy in big data: K-anonymity without prior value of the threshold k Z El Ouazzani, H El Bakkali Procedia Computer Science 127, 52-59, 2018 | 40 | 2018 |
A classification of non-cryptographic anonymization techniques ensuring privacy in big data Z El Ouazzani, H El Bakkali International Journal of Communication Networks and Information Security 12 …, 2020 | 28 | 2020 |
Towards smart blockchain-based system for privacy and security in a smart city environment D El Majdoubi, H El Bakkali, S Sadki 2020 5th international conference on cloud computing and artificial …, 2020 | 25 | 2020 |
Virtualization in Cloud Computing: Existing solutions and new approach M Alouane, H El Bakkali 2016 2nd International Conference on Cloud Computing Technologies and …, 2016 | 24 | 2016 |
The Systematic Literature Review of Privacy‐Preserving Solutions in Smart Healthcare Environment D El Majdoubi, H El Bakkali, S Sadki, Z Maqour, A Leghmid Security and Communication Networks 2022 (1), 5642026, 2022 | 23 | 2022 |
A new reputation algorithm for evaluating trustworthiness in e-commerce context H Rahimi, H El Bakkali 2013 National Security Days (JNS3), 1-6, 2013 | 23 | 2013 |
A predicate calculus logic for the PKI trust model analysis H El Bakkali, BI Kaitouni Proceedings IEEE International Symposium on Network Computing and …, 2001 | 19 | 2001 |
Security, privacy and trust in cloud computing: A comparative study M Alouane, H El Bakkali 2015 International Conference on Cloud Technologies and Applications …, 2015 | 18 | 2015 |
A logic-based reasoning about PKI trust model HEB B.I. Kaitouni Sixth IEEE Symposium on Computers and Communications, 42-48., 2001 | 18* | 2001 |
Dynamic vulnerability detection approaches and tools: State of the Art O Zaazaa, H El Bakkali 2020 Fourth International Conference On Intelligent Computing in Data …, 2020 | 17 | 2020 |
Virtualization in cloud computing: NoHype vs HyperWall new approach M Alouane, H El Bakkali 2016 International conference on electrical and information technologies …, 2016 | 17 | 2016 |
A comparative study of PKI trust models Z El Uahhabi, H El Bakkali 2014 International Conference on Next Generation Networks and Services (NGNS …, 2014 | 15 | 2014 |
Application‐Level Unsupervised Outlier‐Based Intrusion Detection and Prevention O Iraqi, H El Bakkali Security and Communication Networks 2019 (1), 8368473, 2019 | 14 | 2019 |
Towards negotiable privacy policies in mobile healthcare S Sadki, H El Bakkali Fifth international conference on the innovative computing technology …, 2015 | 13 | 2015 |
State of the art of Trust and Reputation Systems in E-Commerce Context H Rahimi, HE Bekkali arXiv preprint arXiv:1710.10061, 2017 | 12 | 2017 |
An approach for privacy policies negotiation in mobile health-cloud environments S Sadki, H El Bakkali 2015 international conference on cloud technologies and applications …, 2015 | 12 | 2015 |
PPAMH: A novel privacy-preserving approach for mobile healthcare S Sadki, H El Bakkali The 9th international conference for internet technology and secured …, 2014 | 12 | 2014 |
Enhancing Workflow Systems Resiliency by Using Delegation and Priority Concepts. H El Bakkali J. Digit. Inf. Manag. 11 (4), 267-276, 2013 | 12 | 2013 |