Yehia ElRakaiby
TitleCited byYear
Normative multi-agent systems
G Andrighetto, G Governatori, P Noriega, LWN van der Torre
Normative Multi-Agent Systems 4, 2013
1042013
Formal enforcement and management of obligation policies
Y Elrakaiby, F Cuppens, N Cuppens-Boulahia
Data & Knowledge Engineering 71 (1), 127-147, 2012
422012
Semantic context aware security policy deployment
S Preda, F Cuppens, N Cuppens-Boulahia, JG Alfaro, L Toutain, ...
Proceedings of the 4th International Symposium on Information, Computer, andá…, 2009
232009
Formalization and management of group obligations
Y El Rakaiby, F Cuppens, N Cuppens-Boulahia
2009 IEEE International Symposium on Policies for Distributed Systems andá…, 2009
212009
Testing obligation policy enforcement using mutation analysis
Y Elrakaiby, T Mouelhi, Y Le Traon
2012 IEEE Fifth International Conference on Software Testing, Verificationá…, 2012
142012
From contextual permission to dynamic pre-obligation: An integrated approach
Y Elrakaiby, F Cuppens, N Cuppens-Boulahia
2010 International Conference on Availability, Reliability and Security, 70-78, 2010
132010
Security@Runtime: A Flexible MDE Approach to Enforce Fine-grained Security Policies
Y Elrakaiby, M Amrani, Y Le Traon
International Symposium on Engineering Secure Software and Systems, 19-34, 2014
102014
Normative reasoning and consequence
J Broersen, S Cranefield, Y Elrakaiby, D Gabbay, D Grossi, E Lorini, ...
Dagstuhl Follow-Ups 4, 2013
92013
Formal specification and management of security policies with collective group obligations
F Cuppens, N Cuppens-Boulahia, Y Elrakaiby
Journal of Computer Security 21 (1), 149-190, 2013
72013
From state-based to event-based contextual security policies
Y El Rakaiby, F Cuppens, N Cuppens-Boulahia
2009 Fourth International Conference on Digital Information Management, 1-7, 2009
62009
Using argumentation to explain ambiguity in requirements elicitation interviews
Y Elrakaiby, A Ferrari, P Spoletini, S Gnesi, B Nuseibeh
2017 IEEE 25th International Requirements Engineering Conference (RE), 51-60, 2017
42017
Interactivity for reactive access control
Y ElRakaiby, F Cuppens, N Cuppens-Boulahia
Sar Ssi 257, 2008
42008
Automatic derivation of context descriptions
C Jung, D Feth, Y Elrakaiby
2015 IEEE International Multi-Disciplinary Conference on Cognitive Methodsá…, 2015
32015
Towards a full support of obligations in XACML
D El Kateb, Y ElRakaiby, T Mouelhi, I Rubab, Y Le Traon
International Conference on Risks and Security of Internet and Systems, 213-221, 2014
32014
Dynamic analysis of usage control policies
Y Elrakaiby, J Pang
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-13, 2014
22014
Access control enforcement testing
D El Kateb, Y ElRakaiby, T Mouelhi, Y Le Traon
Proceedings of the 8th International Workshop on Automation of Software Testá…, 2013
22013
From state-based to event-based security policies
Y El Rakaiby, F Cuppens, N Cuppens-Boulahia
3rd International Workshop on Context Modeling and Management for Smartá…, 2009
22009
CaRE: A refinement calculus for requirements engineering based on argumentation semantics
Y Elrakaiby, A Ferrari, J Mylopoulos
2018 IEEE 26th International Requirements Engineering Conference (RE), 364-369, 2018
12018
Reasoning on Robot Knowledge from Discrete and Asynchronous Observations
P Ziafati, Y Elrakaiby, M van Zee, M Dastani, JJ Meyer, L van der Torre, ...
2014 AAAI Spring Symposium Series, 2014
12014
A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications
Y Elrakaiby, Y Le Traon
2013 International Conference on Availability, Reliability and Security, 367-374, 2013
12013
The system can't perform the operation now. Try again later.
Articles 1–20