Keywords: Formal methods, Security, XACML, XQuery Update, Trust management.
Biography Ryma Abassi has obtained a PhD degree in ICT from the Higher School of Communication of Tunis (Sup’Com) in March 2010. She obtained a master degree in Telecommunication from Sup’Com in December 2005 as well as an engineer diploma from the National Institute of Applied Science and Technology of Tunis (INSAT) in February 2004.
Since September 2010, Dr Abassi is an assistant professor in the Higher Institute of Technological Studies in Communication of Tunis where she is responsible of several courses for the network security option.
Dr Abassi’s actual research interests include security policies modeling, validation, verification and test, XACML, XML updates, trust management, etc.
Dr Abassi has published several papers in international journals and conferences.
Publications
Biography Ryma Abassi has obtained a PhD degree in ICT from the Higher School of Communication of Tunis (Sup’Com) in March 2010. She obtained a master degree in Telecommunication from Sup’Com in December 2005 as well as an engineer diploma from the National Institute of Applied Science and Technology of Tunis (INSAT) in February 2004.
Since September 2010, Dr Abassi is an assistant professor in the Higher Institute of Technological Studies in Communication of Tunis where she is responsible of several courses for the network security option.
Dr Abassi’s actual research interests include security policies modeling, validation, verification and test, XACML, XML updates, trust management, etc.
Dr Abassi has published several papers in international journals and conferences.
Publications
Author | Title | Year | Journal/Proceedings | Reftype | DOI/URL |
---|---|---|---|---|---|
Abassi, R. | Formalismes et techniques pour la manipulation et la gestion des politiques de sécurité
[BibTeX]
|
2010 | School: Higher School of Communication of Tunis (Sup'Com) | phdthesis | |
BibTeX:
@phdthesis{, author = {Ryma Abassi}, title = {Formalismes et techniques pour la manipulation et la gestion des politiques de sécurité}, school = {Higher School of Communication of Tunis (Sup'Com)}, year = {2010} } |
|||||
Abassi, R. & Fatmi, S.G.E. | Dealing with Delegation Management in Security Policies
[BibTeX]
|
2010 | the Second International Conference on Engineering Systems Management & Applications, ICESMA2010 | inproceedings | |
BibTeX:
@inproceedings{, author = {Ryma Abassi and Sihem Guemara El Fatmi}, title = {Dealing with Delegation Management in Security Policies}, booktitle = {the Second International Conference on Engineering Systems Management & Applications, ICESMA2010}, year = {2010} } |
|||||
Abassi, R. & Fatmi, S.G.E. | Dealing with Multi Security Policies in Communication Networks
[BibTeX]
|
2010 | MASAU Journal of Computing | article | |
BibTeX:
@article{, author = {Ryma Abassi and Sihem Guemara El Fatmi}, title = {Dealing with Multi Security Policies in Communication Networks}, journal = {MASAU Journal of Computing}, year = {2010} } |
|||||
Abassi, R. & Fatmi, S.G.E. | A Generic Model for Delegation in Security Policies
[BibTeX]
|
2009 | the first International Conference on Communications and Networking, ComNet | inproceedings | |
BibTeX:
@inproceedings{, author = {Ryma Abassi and Sihem Guemara El Fatmi}, title = {A Generic Model for Delegation in Security Policies}, booktitle = {the first International Conference on Communications and Networking, ComNet}, year = {2009} } |
|||||
Abassi, R. & Fatmi, S.G.E. | S-Promela: An Executable Specification Security Policies Language
[BibTeX]
|
2009 | the first International Conference on Communications and Networking, ComNet | inproceedings | |
BibTeX:
@inproceedings{, author = {Ryma Abassi and Sihem Guemara El Fatmi}, title = {S-Promela: An Executable Specification Security Policies Language}, booktitle = {the first International Conference on Communications and Networking, ComNet}, year = {2009} } |
|||||
Abassi, R. & Fatmi, S.G.E. | Formal Test Cases Generation for Security Policies
[BibTeX]
|
2009 | the Tunisia - Japan Workshop on Symbolic Computation in Software Science, SCSS, pp. 22-24 | inproceedings | |
BibTeX:
@inproceedings{, author = {Ryma Abassi and Sihem Guemara El Fatmi}, title = {Formal Test Cases Generation for Security Policies}, booktitle = {the Tunisia - Japan Workshop on Symbolic Computation in Software Science, SCSS}, year = {2009}, pages = {22-24} } |
|||||
Abassi, R. & Fatmi, S.G.E. | Towards a Test Cases Generation Method for Security Policies
[BibTeX]
|
2009 | the Sixteenth International Conference on Telecommunications, ICT | inproceedings | |
BibTeX:
@inproceedings{, author = {Ryma Abassi and Sihem Guemara El Fatmi}, title = {Towards a Test Cases Generation Method for Security Policies}, booktitle = {the Sixteenth International Conference on Telecommunications, ICT}, year = {2009} } |
|||||
Abassi, R. & Fatmi, S.G.E. | Dealing with Multi Security Policies in Communication Networks
[BibTeX]
|
2009 | The Fifth International Conference on Networking and Services ICNS, pp. 282-287 | inproceedings | |
BibTeX:
@inproceedings{, author = {Ryma Abassi and Sihem Guemara El Fatmi}, title = {Dealing with Multi Security Policies in Communication Networks}, booktitle = {The Fifth International Conference on Networking and Services ICNS}, year = {2009}, pages = {282-287} } |
|||||
Abassi, R. & Fatmi, S.G.E. | Executable Security Policies: Specification and Validation of Security Policies
[BibTeX]
|
2009 | International Journal of Wireless & Mobile Networks (IJWMN) Vol. Vol 1(1) |
article | |
BibTeX:
@article{, author = {Ryma Abassi and Sihem Guemara El Fatmi}, title = {Executable Security Policies: Specification and Validation of Security Policies}, journal = {International Journal of Wireless & Mobile Networks (IJWMN)}, year = {2009}, volume = {Vol 1}, number = {1} } |
|||||
Abassi, R. & Fatmi, S.G.E. | A Novel Validation Method for Firewall Security Policy
[BibTeX]
|
2009 | Journal of Information Assurance and Security (JIAS), pp. 329-337 | article | |
BibTeX:
@article{, author = {Ryma Abassi and Sihem Guemara El Fatmi}, title = {A Novel Validation Method for Firewall Security Policy}, journal = {Journal of Information Assurance and Security (JIAS)}, year = {2009}, pages = {329-337} } |
|||||
Abassi, R. & Fatmi, S.G.E. | Towards an Automated Firewall Security Policies Validation Process
[BibTeX]
|
2008 | Third International Conference on Risks and Security of Internet and Systems, CRISIS, pp. 267-272 | inproceedings | |
BibTeX:
@inproceedings{, author = {Ryma Abassi and Sihem Guemara El Fatmi}, title = {Towards an Automated Firewall Security Policies Validation Process}, booktitle = {Third International Conference on Risks and Security of Internet and Systems, CRISIS}, year = {2008}, pages = {267-272} } |
|||||
Abassi, R. & Fatmi, S.G.E. | An Automated Validation Method for Security Policies: the firewall case
[BibTeX]
|
2008 | the Fourth International Conference in Information and Security, IAS, pp. 291-294 | inproceedings | |
BibTeX:
@inproceedings{, author = {Ryma Abassi and Sihem Guemara El Fatmi}, title = {An Automated Validation Method for Security Policies: the firewall case}, booktitle = {the Fourth International Conference in Information and Security, IAS}, year = {2008}, pages = {291-294} } |
|||||
Abassi, R. & Fatmi, S.G.E. | A Model for Specification and Validation of Security Policies in Communication Networks: the firewall case
[BibTeX]
|
2008 | Ares, pp. 467-473 | inproceedings | |
BibTeX:
@inproceedings{, author = {Ryma Abassi and Sihem Guemara El Fatmi}, title = {A Model for Specification and Validation of Security Policies in Communication Networks: the firewall case}, booktitle = {Ares}, year = {2008}, pages = {467-473} } |
|||||
Abassi, R., Mejri, M. & Fatmi, S.G.E. | Specification, Verification and Optimization of a Security Network Configuration
[BibTeX]
|
2009 | Tunisia - Japan Workshop on Symbolic Computation in Software Science, SCSS | inproceedings | |
BibTeX:
@inproceedings{, author = {Ryma Abassi and Mohamed Mejri and Sihem Guemara El Fatmi}, title = {Specification, Verification and Optimization of a Security Network Configuration}, booktitle = {Tunisia - Japan Workshop on Symbolic Computation in Software Science, SCSS}, year = {2009} } |
|||||
Abassi, R., Mejri, M. & Fatmi, S.G.E. | Security Policies specification and Validation : a Process Algebra based Method
[BibTeX]
|
2008 | the second International Conference of E-Medical Systems, E-Medisys | inproceedings | |
BibTeX:
@inproceedings{, author = {Ryma Abassi and Mohamed Mejri and Sihem Guemara El Fatmi}, title = {Security Policies specification and Validation : a Process Algebra based Method}, booktitle = {the second International Conference of E-Medical Systems, E-Medisys}, year = {2008} } |
|||||
Ryma Abassi, florent jacquemard, M.R.S.G. e.F. | XML Access Control: from XACML to Annotated Schemas
[BibTeX]
|
2010 | the second International Conference on Communications and Networking, Comnet | inproceedings | |
BibTeX:
@inproceedings{, author = {Ryma Abassi, florent jacquemard, Mickael Rusinovich, Sihem Guemara el Fatmi}, title = {XML Access Control: from XACML to Annotated Schemas}, booktitle = {the second International Conference on Communications and Networking, Comnet}, year = {2010} } |