Lotfi ben Othmane
Cited by
Cited by
An Entity-centric Approach for Privacy and Identity Management in Cloud Computing
P Angin, B Bhargava, R Ranchal, N Singh, M Linderman, L Ben Othmane, ...
Reliable Distributed Systems, 2010 29th IEEE Symposium on, 177-183, 2010
Protection of Identity Information in Cloud Computing without Trusted Third Party
R Ranchal, B Bhargava, LB Othmane, L Lilien, A Kim, M Kang, ...
Reliable Distributed Systems, 2010 29th IEEE Symposium on, 368-372, 2010
Extending the Agile Development Process to Develop Acceptably Secure Software
L Ben Othmane, P Angin, H Weffers, B Bhargava
IEEE Transactions on Dependable and Secure Computing 11 (6), 497 - 509, 2014
Protecting Privacy of Sensitive Data Dissemination Using Active Bundles
L Ben Othmane, L Lilien
Privacy, Security, Trust and the Management of e-Business, 2009. CONGRESS'09 …, 2009
A Survey of Security and Privacy in Connected Vehicles
L ben Othmane, H Weffers, MM Mohamad, M Wolf
Wireless Sensor and Mobile Ad-Hoc Networks, 217-247, 2015
Secdevops: Is it a marketing buzzword?-mapping research on security in devops
V Mohan, LB Othmane
2016 11th International Conference on Availability, Reliability and Security …, 2016
Active Bundles for Protecting Confidentiality of Sensitive Data Throughout Their Lifecycle
L ben Othmane
Western Michigan University, 2010
A Simulation Study of Ad Hoc Networking of UAVs with Opportunistic Resource Utilization Networks
LT Lilien, L Ben Othmane, P Angin, A DeCarlo, RM Salih, B Bhargava
Journal of Network and Computer Applications, 2014
Secure Information Sharing in Digital Supply Chains
B Bhargava, R Ranchal, LB Othmane
Proceedings of IEEE IACC, 2013
Towards Extended Safety in Connected Vehicles
L ben Othmane, A Al-Fuqaha, E ben Hamida, M van den Brand
16th International IEEE Conference on Intelligent Transportation Systems …, 2013
Incorporating attacker capabilities in risk estimation and mitigation
L Ben Othmane, R Ranchal, R Fernando, B Bhargava, E Bodden
Computers & Security 51, 41-61, 2015
Literature Review of the Challenges of Developing Secure Software Using the Agile Approach
H Oueslati, MM Rahman, L ben Othmane
Proc. of the 10th International Conference on Availability, Reliability and …, 2015
An End-to-End Security Auditing Approach for Service Oriented Architectures
M Azarmi, B Bhargava, P Angin, R Ranchal, N Ahmed, A Sinclair, ...
31st IEEE International Symposium on Reliable Distributed Systems (SRDS 2012), 2012
Consumer oriented privacy preserving access control for electronic health records in the cloud
R Fernando, R Ranchal, B An, L ben Othmane, B Bhargava
IEEE cloud, 2016
Using Assurance Cases to Develop Iteratively Security Features Using Scrum
L Othmane, P Angin, B Bhargava
The First International Workshop on Software Assurance (SAW 2014 )--Proc …, 2014
Factors impacting the effort required to fix security vulnerabilities
L ben Othmane, G Chehrazi, E Bodden, P Tsalovski, AD Brucker, ...
International Conference on Information Security, 102-119, 2015
Incorporating lab experience into computer security courses
L ben Othmane, V Bhuse, LT Lilien
2013 World Congress on Computer and Information Technology (WCCIT), 1-4, 2013
Time for Addressing Software Security Issues: Prediction Models and Impacting Factors
LB Othmane, G Chehrazi, E Bodden, P Tsalovski, AD Brucker
Data Science and Engineering 2 (2), 107–124, 2017
Likelihood of Threats to Connected Vehicles
L Othmane, R Fernando, R Ranchal, B Bhargava, E Bodden
International Journal of Next-Generation Computing 5 (3), 290-303, 2014
Protecting Patients’ Electronic Health Records Using Enhanced Active Bundles
RM Salih, L Lilien, L Othmane
6th International Conference on Pervasive Computing Technologies for Healthcare, 2012
The system can't perform the operation now. Try again later.
Articles 1–20