Hassan RAZOUKI

Work place: LMACS Laboratory, Faculty of Science and Technology, University Sultan Moulay Slimane, Beni Mellal, Morocco

E-mail: razouki.hassan@gmail.com

Website:

Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Computer Networks, Information Security, Network Security

Biography

Dr. H. Razouki completed his PhD in Computer Science at the University of Sultan Moulay Slimane, Morocco in 2017. Currently, he is an professor of computer science within the ministry of national education, professional formation, Higher Education and Scientific Research. His research interests are related to mobile agent system, and computer security. He has published more than 10 research papers at national and international journals, conference and proceedings.

Author Articles
Security Policy Modelling in the Mobile Agent System

By Hassan RAZOUKI

DOI: https://doi.org/10.5815/ijcnis.2019.10.04, Pub. Date: 8 Oct. 2019

The mobile agent security problem limits the use of mobile agent technology and hinders its extensibility and application because the constantly progressed complexity and extension at the level of systems and applications level increase the difficulty to implement a common security system as well as an anticipated security policy.
Ontology is considered one of the most important solutions to the problem of heterogeneity. In this context, our work consists of constructing mobile agent domain security ontology (MASO) in order to eliminate semantic differences between security policies in this domain. We use the OWL language under the protected software to construct this ontology. Then, we chose the WS-Policy standard to model security policies, these policies are structured in forms of security requirements and capabilities. To determine the level of semantic correspondence between security policies we are developing an algorithm called "Matching-algorithm" with Java language and two APIs (Jena API and Jdom API) to manipulate the MASO ontology and security policies.

[...] Read more.
Other Articles