Using hierarchical timed coloured petri nets in the formal study of TRBAC security policies

H Ben Attia, L Kahloul, S Benhazrallah… - International Journal of …, 2020 - Springer
Abstract Role-Based Access Control (RBAC) is one of the most used models in designing
and implementation of security policies, in large networking systems. Basic RBAC model …

APIA: An architecture for policy-aware intentional agents

J Meyer, D Inclezan - arXiv preprint arXiv:2109.08287, 2021 - arxiv.org
This paper introduces the APIA architecture for policy-aware intentional agents. These
agents, acting in changing environments, are driven by intentions and yet abide by domain …

DISARM: A social distributed agent reputation model based on defeasible logic

K Kravari, N Bassiliades - Journal of Systems and Software, 2016 - Elsevier
Agents act in open and thus risky environments with limited or no human intervention.
Making the appropriate decision about who to trust in order to interact with is not only …

Using description logic and Abox abduction to capture medical diagnosis

M Obeid, Z Obeid, A Moubaiddin, N Obeid - … AIE 2019, Graz, Austria, July 9 …, 2019 - Springer
Medical diagnosis can be defined as the detection of a disease by examining a patient's
signs, symptoms and history. Diagnostic reasoning can be viewed as a process of testing …

An intelligent digital colour image watermarking approach based on wavelets and general regression neural networks

HV Dang, W Kinsner - 2012 IEEE 11th International …, 2012 - ieeexplore.ieee.org
In this paper, we propose a new intelligent, robust and adaptive digital watermarking
technique for colour images based on the combination of discrete wavelet transform (DWT) …

A reflection on learning from data: epistemology issues and limitations

A Hammoudeh, S Tedmori, N Obeid - arXiv preprint arXiv:2107.13270, 2021 - arxiv.org
Although learning from data is effective and has achieved significant milestones, it has many
challenges and limitations. Learning from data starts from observations and then proceeds …

On ontology-based diagnosis and defeasibility

N Obeid, E Rawashdeh, E Alduweib… - 2016 International …, 2016 - ieeexplore.ieee.org
We aim in this paper to integrate a nonmonotonic rule system (defeasible logic) with
description logic-based ontologies. This can help us in building defeasible medical …

A temporal modal defeasible logic for formalizing social commitments in dialogue and argumentation models

A Moubaiddin, I Salah, N Obeid - Applied Intelligence, 2018 - Springer
In this paper, we extend a temporal defeasible logic with a modal operator Committed to
formalize commitments that agents undertake as a consequence of communicative actions …

Algebraic model for handling access control policies

KE Sabri, H Hiary - Procedia Computer Science, 2016 - Elsevier
Confidentiality of information is an important aspect that developers should take into
consideration when building systems. One way to achieve confidentiality is to define access …

ABAC conceptual graph model for composite web services

D Nabil, H Slimani, H Nacer, D Aissani… - 2018 IEEE 5th …, 2018 - ieeexplore.ieee.org
The Web service technology provides an environment in which heterogeneous components
can collaborate together to achieve a common goal. However, the opening of Web services …