Wassim Itani
Wassim Itani
Associate Professor of Electrical and Computer Engineering, Beirut Arab University
Verified email at bau.edu.lb
TitleCited byYear
Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures
W Itani, A Kayssi, A Chehab
2009 Eighth IEEE International Conference on Dependable, Autonomic and …, 2009
3512009
Energy-efficient incremental integrity for securing storage in mobile cloud computing
W Itani, A Kayssi, A Chehab
2010 International Conference on Energy Aware Computing, 1-2, 2010
842010
J2ME application-layer end-to-end security for m-commerce
W Itani, A Kayssi
Journal of Network and Computer Applications 27 (1), 13-32, 2004
552004
Sine: Cache-friendly integrity for the web
C Gaspard, S Goldberg, W Itani, E Bertino, C Nita-Rotaru
2009 5th IEEE Workshop on Secure Network Protocols, 7-12, 2009
292009
J2ME end-to-end security for M-commerce
W Itani, AI Kayssi
2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003. 3, 2015-2020, 2003
292003
SPECSA: a scalable, policy-driven, extensible, and customizable security architecture for wireless enterprise applications
W Itani, A Kayssi
Computer communications 27 (18), 1825-1839, 2004
232004
CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks
A Tajeddine, A Kayssi, A Chehab, I Elhajj, W Itani
Sensors 15 (2), 3299-3333, 2015
212015
PUMAP: A PUF-based ultra-lightweight mutual-authentication RFID protocol
R Bassil, W El-Beaino, W Itani, A Kayssi, A Chehab
International Journal of RFID Security and Cryptography 1 (1/2), 58-66, 2012
182012
ServBGP: BGP-inspired autonomic service routing for multi-provider collaborative architectures in the cloud
W Itani, C Ghali, R Bassil, A Kayssi, A Chehab
Future Generation Computer Systems 32, 99-117, 2014
132014
Reputation as a Service: A System for Ranking Service Providers in Cloud Systems
W Itani, C Ghali, A Kayssi, A Chehab
Security, Privacy and Trust in Cloud Systems, 375-406, 2014
122014
Security analysis and solution for thwarting cache poisoning attacks in the Domain Name System
R Bassil, R Hobeica, W Itani, C Ghali, A Kayssi, A Chehab
Telecommunications (ICT), 2012 19th International Conference on, 1-6, 2012
112012
Power management in virtualized data centers: state of the art
A Al-Dulaimy, W Itani, A Zekri, R Zantout
Journal of Cloud Computing 5 (1), 6, 2016
102016
Accountable Reputation Ranking Schemes for Service Providers in Cloud Computing.
W Itani, C Ghali, AI Kayssi, A Chehab
CLOSER, 49-55, 2011
102011
An enterprise policy-based security protocol for protecting relational database network objects
W Itani, A Kayssi, A Chehab
Proceedings of the 2006 international conference on Wireless communications …, 2006
102006
Energy-efficient platform-as-a-service security provisioning in the cloud
W Itani, A Chehab, A Kayssi
2011 International Conference on Energy Aware Computing, 1-6, 2011
92011
PETRA: a secure and energy-efficient software update protocol for severely-constrained network devices
W Itani, A Kayssi, A Chehab
Proceedings of the 5th ACM symposium on QoS and security for wireless and …, 2009
82009
SNUAGE: an efficient platform-as-a-service security framework for the cloud
W Itani, A Kayssi, A Chehab
Cluster Computing 16 (4), 707-724, 2013
72013
BGP-inspired autonomic service routing for the cloud
W Itani, C Ghali, R Bassil, A Kayssi, A Chehab
Proceedings of the 27th Annual ACM Symposium on Applied Computing, 406-411, 2012
72012
Job submission in the cloud: energy aware approaches
A Al-Dulaimy, R Zantout, W Itani, A Zekri
Proceedings of the World Congress on Engineering and Computer Science 1, 2016
62016
Job classification in cloud computing: the classification effects on energy efficiency
A Aldulaimy, R Zantout, A Zekri, W Itani
2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing …, 2015
62015
The system can't perform the operation now. Try again later.
Articles 1–20