Ghita Kouadri Mostéfaoui

Learn More
The great enthusiasm which accompanies the wide adoption of handled devices and remote services is very often attenuated by the number and frequency of security problems encountered by users and services providers. The ubiquitous (pervasive) nature of such applications has brought new security vulnerabilities. Security in pervasive computing is thus, still(More)
The dynamic nature of the Internet poses various challenges to the successful execution of composite Web services. Failures are samples of these challenges. It needs to be addressed for the smooth progress of Web service composition. Unfortunately, the de facto standard for modeling composition namely BPEL is not equipped with mechanisms that let Web(More)
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and off for denying access. This access policy is principally based on the user's identity and is static over time. As applications become more pervasive, security policies must become(More)
Making Web services context-aware is a challenge. This is like making Web service expose appropriate behaviors in response to changes detected in the environment. Context awareness requires a review and extension of the current execution model of Web services. This paper discusses the seamless combination of context and policy to manage behaviors that Web(More)
SUMMARY The MaDViWorld project represents an original attempt to define an appropriate software architecture for supporting massively distributed virtual world systems. A non-massively distributed virtual world system is typically engineered as a client–server application for which a single server or more rarely a small cluster of servers contain all the(More)
This paper discusses the Aspect-oriented Framework for Web services (AoF4WS) that supports on-demand context-sensitive security in Web services. Flexible security schemes are needed in many Web services applications where authentication, authorization, etc., can no longer be used in their current form. Security mechanisms are to be customized to the(More)