Lotfi ben Othmane
Cited by
Cited by
An Entity-centric Approach for Privacy and Identity Management in Cloud Computing
P Angin, B Bhargava, R Ranchal, N Singh, M Linderman, L Ben Othmane, ...
Reliable Distributed Systems, 2010 29th IEEE Symposium on, 177-183, 2010
Protection of Identity Information in Cloud Computing without Trusted Third Party
R Ranchal, B Bhargava, LB Othmane, L Lilien, A Kim, M Kang, ...
Reliable Distributed Systems, 2010 29th IEEE Symposium on, 368-372, 2010
Secdevops: Is it a marketing buzzword?-mapping research on security in devops
V Mohan, LB Othmane
2016 11th international conference on availability, reliability and security …, 2016
Extending the Agile Development Process to Develop Acceptably Secure Software
L Ben Othmane, P Angin, H Weffers, B Bhargava
IEEE Transactions on Dependable and Secure Computing 11 (6), 497 - 509, 2014
A Survey of Security and Privacy in Connected Vehicles
L ben Othmane, H Weffers, MM Mohamad, M Wolf
Wireless Sensor and Mobile Ad-Hoc Networks, 217-247, 2015
Protecting Privacy of Sensitive Data Dissemination Using Active Bundles
L Ben Othmane, L Lilien
Privacy, Security, Trust and the Management of e-Business, 2009. CONGRESS'09 …, 2009
Secure Information Sharing in Digital Supply Chains
B Bhargava, R Ranchal, LB Othmane
Proceedings of IEEE IACC, 2013
Active Bundles for Protecting Confidentiality of Sensitive Data Throughout Their Lifecycle
L ben Othmane
Western Michigan University, 2010
Literature Review of the Challenges of Developing Secure Software Using the Agile Approach
H Oueslati, MM Rahman, L ben Othmane
Proc. of the 10th International Conference on Availability, Reliability and …, 2015
A Simulation Study of Ad Hoc Networking of UAVs with Opportunistic Resource Utilization Networks
LT Lilien, L Ben Othmane, P Angin, A DeCarlo, RM Salih, B Bhargava
Journal of Network and Computer Applications, 2014
Towards Extended Safety in Connected Vehicles
L ben Othmane, A Al-Fuqaha, E ben Hamida, M van den Brand
16th International IEEE Conference on Intelligent Transportation Systems …, 2013
Incorporating attacker capabilities in risk estimation and mitigation
L Ben Othmane, R Ranchal, R Fernando, B Bhargava, E Bodden
Computers & Security 51, 41-61, 2015
Identification of dependency-based attacks on node. js
B Pfretzschner, L ben Othmane
Proceedings of the 12th International Conference on Availability …, 2017
Epics: A framework for enforcing security policies in composite web services
R Ranchal, B Bhargava, P Angin, L ben Othmane
IEEE Transactions on Services Computing, 2018
Time for Addressing Software Security Issues: Prediction Models and Impacting Factors
LB Othmane, G Chehrazi, E Bodden, P Tsalovski, AD Brucker
Data Science and Engineering 2 (2), 107–124, 2017
BP: Security concerns and best practices for the automation of software deployment processes - an industrial case study
V Mohan, L ben Othmane, A Kres
IEEE Cybersecurity Development Conference (SecDev), 2018
Threats to Validity in Empirical Software Security Research
DS Cruzes, L ben Othmane
Empirical Research for Software Security: Foundations and Experience, 2017
An End-to-End Security Auditing Approach for Service Oriented Architectures
M Azarmi, B Bhargava, P Angin, R Ranchal, N Ahmed, A Sinclair, ...
31st IEEE International Symposium on Reliable Distributed Systems (SRDS 2012), 2012
Consumer oriented privacy preserving access control for electronic health records in the cloud
R Fernando, R Ranchal, B An, L ben Othmane, B Bhargava
IEEE cloud, 2016
Factors impacting the effort required to fix security vulnerabilities
L Othmane, G Chehrazi, E Bodden, P Tsalovski, AD Brucker, P Miseldine
International Conference on Information Security, 102-119, 2015
The system can't perform the operation now. Try again later.
Articles 1–20