default search action
Slim Kallel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j28]Amal Abid, Saoussen Cheikhrouhou, Slim Kallel, Mohamed Jmaiel:
A privacy-preserving traceability system for self-sovereign identity-based inter-organizational business processes. Comput. Stand. Interfaces 92: 103930 (2025) - 2024
- [j27]Amal Abid, Saoussen Cheikhrouhou, Slim Kallel, Zahir Tari, Mohamed Jmaiel:
A Smart Contract-Based Access Control Framework For Smart Healthcare Systems. Comput. J. 67(2): 407-422 (2024) - [e7]Slim Kallel, Zakaria Benzadri, Ahmed Hadj Kacem:
Proceedings of the Tunisian-Algerian Joint Conference on Applied Computing (TACC 2023), Sousse, Tunisia, November 8-10, 2023. CEUR Workshop Proceedings 3642, CEUR-WS.org 2024 [contents] - 2023
- [j26]Rawya Mars, Saoussen Cheikhrouhou, Slim Kallel, Ahmed Hadj Kacem:
A survey on automation approaches of smart contract generation. J. Supercomput. 79(14): 16065-16097 (2023) - [c49]Ahlem Makni, Rawya Mars, Saoussen Cheikhrouhou, Slim Kallel, Mohamed Sellami:
A survey on event log extraction from blockchain. TACC 2023: 159-169 - [e6]Slim Kallel, Mohamed Jmaiel, Mohammad Zulkernine, Ahmed Hadj Kacem, Frédéric Cuppens, Nora Cuppens:
Risks and Security of Internet and Systems - 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13857, Springer 2023, ISBN 978-3-031-31107-9 [contents] - [e5]Chafia Bouanaka, Mohammed Nassim Lacheheub, Meriem Belguidoum, Faiza Belala, Mohamed Jmaiel, Ahmed Hadj Kacem, Ismael Bouassida Rodriguez, Slim Kallel:
Proceedings of the Tunisian-Algerian Joint Conference on Applied Computing (TACC 2022) Laboratoire Mixte d'Excellence Scientifique Tuniso-Algérien, Constantine, Algeria, December 13-14, 2022. CEUR Workshop Proceedings 3333, CEUR-WS.org 2023 [contents] - 2022
- [j25]Mehdi Ahmed-Nacer, Slim Kallel, Faiez Zalila, Philippe Merle, Walid Gaaloul:
Model-Driven Simulation of Elastic OCCI Cloud Resources. Comput. J. 65(5): 1144-1166 (2022) - [j24]Saoussen Cheikhrouhou, Zakaria Maamar, Rawya Mars, Slim Kallel:
A time interval-based approach for business process fragmentation over cloud and edge resources. Serv. Oriented Comput. Appl. 16(4): 263-278 (2022) - [j23]Amal Abid, Saoussen Cheikhrouhou, Slim Kallel, Mohamed Jmaiel:
NovidChain: Blockchain-based privacy-preserving platform for COVID-19 test/vaccine certificates. Softw. Pract. Exp. 52(4): 841-867 (2022) - [c48]Rawya Mars, Saoussen Cheikhrouhou, Slim Kallel, Mohamed Sellami, Ahmed Hadj Kacem:
Towards a Secure Cross-Blockchain Smart Contract Architecture. CRiSIS 2022: 127-132 - [c47]Amal Abid, Saoussen Cheikhrouhou, Slim Kallel, Mohamed Jmaiel:
A Blockchain-Based Self-Sovereign Identity Approach for Inter-Organizational Business Processes. FedCSIS 2022: 685-694 - [e4]Bo Luo, Mohamed Mosbah, Frédéric Cuppens, Lotfi Ben Othmane, Nora Cuppens, Slim Kallel:
Risks and Security of Internet and Systems - 16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 12-13, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13204, Springer 2022, ISBN 978-3-031-02066-7 [contents] - [e3]Ahmed Hadj Kacem, Slim Kallel, Faiza Belala, Meriem Belguidoum, Mohamed Jmaiel, Ismael Bouassida Rodriguez:
Proceedings of the Tunisian-Algerian Joint Conference on Applied Computing (TACC 2021), Tabarka, Tunisia, December 18-20, 2021. CEUR Workshop Proceedings 3067, CEUR-WS.org 2022 [contents] - 2021
- [j22]Slim Kallel, Saoussen Cheikhrouhou, Zakaria Maamar, Nawal Guermouche, Mohamed Jmaiel:
From generating process views over inter-organizational business processes to achieving their temporal consistency. Computing 103(7): 1305-1331 (2021) - [j21]Slim Kallel, Zakaria Maamar, Mohamed Sellami, Noura Faci, Ahmed Ben Arab, Walid Gaaloul, Thar Baker:
Restriction-based fragmentation of business processes over the cloud. Concurr. Comput. Pract. Exp. 33(7): 1 (2021) - [j20]Slim Kallel, Frédéric Cuppens, Nora Boulahia-Cuppens, Ahmed Hadj Kacem, Lotfi Ben Othmane:
Special issue on risk and security of smart systems. J. Inf. Secur. Appl. 61: 102925 (2021) - [j19]Fairouz Fakhfakh, Slim Kallel, Saoussen Cheikhrouhou:
Formal Verification of Cloud and Fog Systems: A Review and Research Challenges. J. Univers. Comput. Sci. 27(4): 341-363 (2021) - [j18]Abderrahim Ait Wakrime, Souha Boubaker, Slim Kallel, Emna Guermazi, Walid Gaaloul:
A Formal Model for Configurable Business Process with Optimal Cloud Resource Allocation. J. Univers. Comput. Sci. 27(7): 693-713 (2021) - [j17]Rania Ben Halima, Slim Kallel, Mehdi Ahmed-Nacer, Walid Gaaloul:
Optimal business process deployment cost in cloud resources. J. Supercomput. 77(2): 1579-1611 (2021) - [c46]Rawya Mars, Amal Abid, Saoussen Cheikhrouhou, Slim Kallel:
A Machine Learning Approach for Gas Price Prediction in Ethereum Blockchain. COMPSAC 2021: 156-165 - [c45]Amal Abid, Saoussen Cheikhrouhou, Slim Kallel, Mohamed Jmaiel:
Temporal Constraints in Smart Contract-Based Process Execution: A Case Study of Organ Transfer by Healthcare Delivery Drone. TACC 2021: 1-13 - [c44]Mohamed Hedi Fourati, Saoussen Cheikhrouhou, Slim Kallel, Mohamed Jmaiel:
TUNisia-Italy Cross-Border Environment Net platform for emergency response (NETTUNIT): project presentation and early results. TACC 2021: 127-137 - 2020
- [j16]Saoussen Cheikhrouhou, Slim Kallel, Ikbel Guidara, Zakaria Maamar:
Business process specification, verification, and deployment in a mono-cloud, multi-edge context. Comput. Sci. Inf. Syst. 17(1): 293-313 (2020) - [j15]Imen Graja, Slim Kallel, Nawal Guermouche, Saoussen Cheikhrouhou, Ahmed Hadj Kacem:
A comprehensive survey on modeling of cyber-physical systems. Concurr. Comput. Pract. Exp. 32(15) (2020) - [j14]Rania Ben Halima, Slim Kallel, Walid Gaaloul, Zakaria Maamar, Mohamed Jmaiel:
Toward a correct and optimal time-aware cloud resource allocation to business processes. Future Gener. Comput. Syst. 112: 751-766 (2020) - [c43]Amal Abid, Saoussen Cheikhrouhou, Slim Kallel, Mohamed Jmaiel:
How blockchain helps to combat trust crisis in COVID-19 pandemic?: poster abstract. SenSys 2020: 764-765 - [e2]Slim Kallel, Frédéric Cuppens, Nora Cuppens-Boulahia, Ahmed Hadj Kacem:
Risks and Security of Internet and Systems, 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings. Lecture Notes in Computer Science 12026, Springer 2020, ISBN 978-3-030-41567-9 [contents] - [e1]Mohamed Jmaiel, Mounir Mokhtari, Bessam Abdulrazak, Hamdi Aloulou, Slim Kallel:
The Impact of Digital Technologies on Public Health in Developed and Developing Countries - 18th International Conference, ICOST 2020, Hammamet, Tunisia, June 24-26, 2020, Proceedings. Lecture Notes in Computer Science 12157, Springer 2020, ISBN 978-3-030-51516-4 [contents]
2010 – 2019
- 2019
- [j13]Imen Graja, Slim Kallel, Nawal Guermouche, Saoussen Cheikhrouhou, Ahmed Hadj Kacem:
Modelling and verifying time-aware processes for cyber-physical environments. IET Softw. 13(1): 36-48 (2019) - [c42]Racem Bougacha, Abderrahim Ait Wakrime, Slim Kallel, Rahma Ben Ayed, Simon Collart Dutilleul:
A Model-based Approach for the Modeling and the Verification of Railway Signaling System. ENASE 2019: 367-376 - [c41]Abderrahim Ait Wakrime, Souha Boubaker, Slim Kallel, Walid Gaaloul:
A SAT-Based Formal Approach for Verifying Business Process Configuration. Innovate-Data 2019: 47-62 - [c40]Fairouz Fakhfakh, Ahemd Neji, Saoussen Cheikhrouhou, Slim Kallel:
Optimizing the Performance of Timed-Constrained Business Processes in Cloud-Fog Environment. MEDI Workshops 2019: 78-90 - 2018
- [j12]Sahar Kallel, Chouki Tibermacine, Slim Kallel, Ahmed Hadj Kacem, Christophe Dony:
Specification and automatic checking of architecture constraints on object oriented programs. Inf. Softw. Technol. 101: 16-31 (2018) - [j11]Zakaria Maamar, Noura Faci, Slim Kallel, Mohamed Sellami, Emir Ugljanin:
Software agents meet internet of things. Internet Technol. Lett. 1(3) (2018) - [c39]Rania Ben Halima, Imen Zouaghi, Slim Kallel, Walid Gaaloul, Mohamed Jmaiel:
Formal Verification of Temporal Constraints and Allocated Cloud Resources in Business Processes. AINA 2018: 952-959 - [c38]Saoussen Cheikhrouhou, Nesrine Chabouh, Slim Kallel, Zakaria Maamar:
Formal Specification and Verification of Cloud Resource Allocation Using Timed Petri-Nets. MEDI Workshops 2018: 40-49 - [c37]Rania Ben Halima, Slim Kallel, Walid Gaaloul, Mohamed Jmaiel:
Scheduling Business Process Activities for Time-Aware Cloud Resource Allocation. OTM Conferences (1) 2018: 445-462 - 2017
- [j10]Slim Kallel, Khalil Drira, Mohamed Jmaiel:
Introduction to the Special Section on Adaptive and Reconfigurable Distributed Systems. Comput. Electr. Eng. 63: 257-259 (2017) - [j9]Sihem Loukil, Slim Kallel, Mohamed Jmaiel:
An approach based on runtime models for developing dynamically adaptive systems. Future Gener. Comput. Syst. 68: 365-375 (2017) - [c36]Rania Ben Halima, Slim Kallel, Walid Gaaloul, Mohamed Jmaiel:
Optimal Cost for Time-Aware Cloud Resource Allocation in Business Process. SCC 2017: 314-321 - [c35]Imen Graja, Slim Kallel, Nawal Guermouche, Ahmed Hadj Kacem:
Modeling and verification of temporal properties in cyber-physical systems. CCNC 2017: 325-330 - [c34]Imen Graja, Aicha Mechim, Slim Kallel, Nawal Guermouche, Ahmed Hadj Kacem:
Demonstrating BPMN4CPS: Modeling anc verification of cyber-physical systems. CCNC 2017: 593 - [c33]Imen Graja, Slim Kallel, Nawal Guermouche, Ahmed Hadj Kacem:
Verification of the Consistency of Time-Aware Cyber-Physical Processes. ICSOC Workshops 2017: 67-79 - [c32]Ismael Bouassida Rodriguez, Slim Kallel, Mohamed Jmaiel, Khalil Drira:
AROSA 2017: Summary Report. WETICE 2017: 28-29 - 2016
- [j8]Slim Kallel, Ismael Bouassida Rodriguez, Khalil Drira:
Adaptive and reconfigurable software systems and architectures. J. Syst. Softw. 122: 342-343 (2016) - [c31]Imen Graja, Slim Kallel, Nawal Guermouche, Ahmed Hadj Kacem:
Time patterns for cyber-physical systems. ISCC 2016: 1208-1211 - [c30]Rania Ben Halima, Slim Kallel, Kais Klai, Walid Gaaloul, Mohamed Jmaiel:
Formal Verification of Time-Aware Cloud Resource Allocation in Business Process. OTM Conferences 2016: 400-417 - [c29]Slim Kallel, Khalil Drira, Mohamed Jmaiel:
Arosa Track Report. WETICE 2016: 12-13 - [c28]Imen Graja, Slim Kallel, Nawal Guermouche, Ahmed Hadj Kacem:
BPMN4CPS: A BPMN Extension for Modeling Cyber-Physical Systems. WETICE 2016: 152-157 - 2015
- [j7]Slim Kallel, Mohamed Jmaiel, Sumitra Reddy:
Enabling Technologies: Infrastructure for Collaborative Enterprises. Comput. J. 58(3): 355 (2015) - [j6]Saoussen Cheikhrouhou, Slim Kallel, Nawal Guermouche, Mohamed Jmaiel:
The temporal perspective in business process modeling: a survey and research challenges. Serv. Oriented Comput. Appl. 9(1): 75-85 (2015) - [c27]Slim Kallel, Ismael Bouassida Rodriguez, Mohamed Jmaiel:
AROSA 2015 Track Report: Adaptive and Reconfigurable Service-Oriented and Component-Based Applications and Architectures. WETICE 2015: 21-22 - 2014
- [c26]Saoussen Cheikhrouhou, Slim Kallel, Nawal Guermouche, Mohamed Jmaiel:
Enhancing Formal Specification and Verification of Temporal Constraints in Business Processes. IEEE SCC 2014: 701-708 - [c25]Sihem Loukil, Slim Kallel, Mohamed Jmaiel:
Middleware for Dynamically Adaptive Systems. ARCS 2014: 72-84 - [c24]Sihem Loukil, Slim Kallel, Ismael Bouassida Rodriguez, Mohamed Jmaiel:
Monitoring of Quality of Service in Dynamically Adaptive Systems. ICAIS 2014: 121-130 - [c23]Rahma Bouaziz, Slim Kallel, Bernard Coulette:
An Approach for Security Patterns Application in Component Based Models. ICCSA (5) 2014: 283-296 - [c22]Saoussen Cheikhrouhou, Slim Kallel, Nawal Guermouche, Mohamed Jmaiel:
On Enabling Time-Aware Consistency of Collaborative Cross-Organisational Business Processes. ICSOC 2014: 351-358 - [c21]Khalil Drira, Slim Kallel, Ismael Bouassida Rodriguez:
Track Report of Adaptive and Reconfigurable Service-Oriented and Component-Based Applications and Architectures (AROSA 2014). WETICE 2014: 36-37 - [c20]Rahma Bouaziz, Slim Kallel, Bernard Coulette:
A Collaborative Process for Developing Secure Component Based Applications. WETICE 2014: 306-311 - [c19]Saoussen Cheikhrouhou, Slim Kallel, Mohamed Jmaiel:
Toward a Verification of Time-Centric Business Process Models. WETICE 2014: 326-331 - 2013
- [j5]Sihem Loukil, Slim Kallel, Bechir Zalila, Mohamed Jmaiel:
AO4AADL: Aspect oriented extension for AADL. Central Eur. J. Comput. Sci. 3(2): 43-68 (2013) - [j4]Sihem Loukil, Slim Kallel, Mohamed Jmaiel:
Managing Architectural Reconfiguration at Runtime. Int. J. Web Portals 5(1): 55-72 (2013) - [c18]Sihem Loukil, Slim Kallel, Mohamed Jmaiel:
Verifying Runtime Architectural Reconfiguration of Dynamically Adaptive Systems. EUROMICRO-SEAA 2013: 169-176 - [c17]Saoussen Cheikhrouhou, Slim Kallel, Nawal Guermouche, Mohamed Jmaiel:
Time-Aware Automatic Process View Generation. ICEBE 2013: 126-131 - [c16]Saoussen Cheikhrouhou, Slim Kallel, Nawal Guermouche, Mohamed Jmaiel:
A Survey on Time-aware Business Process Modeling. ICEIS (3) 2013: 236-242 - [c15]Inaya Yahya, Sameh Hbaieb Turki, Anis Charfi, Slim Kallel, Rafik Bouaziz:
An Aspect-Oriented Approach to Enforce Security Properties in Business Processes. ICSOC Workshops 2013: 344-355 - [c14]Saoussen Cheikhrouhou, Slim Kallel, Nawal Guermouche, Mohamed Jmaiel:
Toward a Time-centric modeling of Business Processes in BPMN 2.0. iiWAS 2013: 154 - [c13]Sihem Loukil, Slim Kallel, Mohamed Jmaiel:
Runtime Adaptation of Component Based Systems. NETYS 2013: 284-288 - [c12]Khalil Drira, Slim Kallel, Ismael Bouassida Rodriguez:
AROSA Track Report. WETICE 2013: 42-43 - [c11]Rahma Bouaziz, Slim Kallel, Bernard Coulette:
An Engineering Process for Security Patterns Application in Component Based Models. WETICE 2013: 231-236 - 2012
- [j3]Slim Kallel, Mohamed Hadj Kacem, Mohamed Jmaiel:
Modeling and enforcing invariants of dynamic software architectures. Softw. Syst. Model. 11(1): 127-149 (2012) - [c10]Slim Kallel, Monia Loulou, Molka Rekik, Ahmed Hadj Kacem:
MDA-Based Approach for Implementing Secure Mobile Agent Systems. AOSE 2012: 56-72 - [c9]Molka Rekik, Slim Kallel, Monia Loulou, Ahmed Hadj Kacem:
Modeling Secure Mobile Agent Systems. KES-AMSTA 2012: 330-339 - [c8]Mohamed Jmaiel, Slim Kallel:
AROSA Track Report: Adaptive and Reconfigurable Service-Oriented and Component-Based Applications and Architectures. WETICE 2012: 28-29 - 2011
- [b1]Slim Kallel:
Specifying and monitoring non-functional properties. Darmstadt University of Technology, Germany, 2011, pp. 1-150 - 2010
- [c7]Sihem Loukil, Slim Kallel, Bechir Zalila, Mohamed Jmaiel:
Toward an Aspect Oriented ADL for Embedded Systems. ECSA 2010: 489-492
2000 – 2009
- 2009
- [j2]Slim Kallel, Anis Charfi, Mira Mezini, Mohamed Jmaiel, Andreas Sewe:
A holistic approach for access control policies: from formal specification to aspect-based enforcement. Int. J. Inf. Comput. Secur. 3(3/4): 337-354 (2009) - [c6]Slim Kallel, Anis Charfi, Tom Dinkelaker, Mira Mezini, Mohamed Jmaiel:
Specifying and Monitoring Temporal Properties in Web Services Compositions. ECOWS 2009: 148-157 - [c5]Houssem Aloulou, Monia Loulou, Slim Kallel, Ahmed Hadj Kacem:
RDyMASS: Reliable and Dynamic Enforcement of Security Policies for Mobile Agent Systems. DPM/SETOP 2009: 237-252 - [c4]Slim Kallel, Anis Charfi, Mira Mezini, Mohamed Jmaiel, Karl Klose:
From Formal Access Control Policies to Runtime Enforcement Aspects. ESSoS 2009: 16-31 - 2008
- [c3]Slim Kallel, Anis Charfi, Mira Mezini, Mohamed Jmaiel:
Aspect-based enforcement of formal delegation policies. CRiSIS 2008: 9-17 - 2007
- [c2]Slim Kallel, Anis Charfi, Mira Mezini, Mohamed Jmaiel:
Combining Formal Methods and Aspects for Specifying and Enforcing Architectural Invariants. COORDINATION 2007: 211-230 - [c1]Slim Kallel, Anis Charfi, Mohamed Jmaiel:
Using Aspects for Enforcing Formal Architectural Invariants. FACS 2007: 5-21 - 2006
- [j1]Amira Regayeg, Slim Kallel, Ahmed Hadj Kacem, Mohamed Jmaiel:
ForMAAD Method: An Experimental Design for Air Traffic Control. Int. Trans. Syst. Sci. Appl. 1(4): 327-334 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint