Publications

JOURNAL PAPERS

    1. Wassim El-Hajj, Hazem M. Hajj, Ezedin Barka, Zaher Dawy, Omar El Hmaissy, Dima Ghaddar, and Youssef Aitour, “Optimal WiMax Planning with Security Considerations” Security and Communication Networks SI on WiMax Security and Applications, 2009, Digital Object Identifier (DOI) = 10.1002/sec.128, http://dx.doi.org/10.1002/sec.128.
    2. Ezedin Barka and Abderrahaman Lakas.  Integrating Usage Control with SIP-Based Communications. Journal of Computer Systems, Networks, and Communications
      Volume 2008 (2008), Article ID 380468, 8 pages
      doi:10.1155/2008/380468
    3. Adel Bouhoula, Zouheir Trabelsi, Ezedin Barka, Mohammed-Anis Benelbahri. FIREWALL FILTERING RULES ANALYSIS FOR ANOMALIES DETECTION. International Journal of Security and Networks (IJSN), Vo.3 No.3. 2008.
    4. Mohammed Boulmalf, Ezedin Barka, and Abderrahmane Lakas. ANALYSIS OF THE EFFECT OF SECURITY ON DATA AND VOICE TRAFFIC IN WLAN. Computer Communications “Elsevier Journal”.   Volume 30, Issue 11-12 (September 2007).  Pages 2468-2477.  
    5. Ezedin Barka and Mohammed Boulmalf. ON THE IMPACT OF SECURITY ON THE PERFORMANCE OF WLANs, Journal of Communications (JCM), Vol. 2, No. 4, Pages 10-17, June 2007.
    6. Emad Eldin Mohamed and Ezedin Barka. A NEW ACCESS CONTROL ARCHITECTURE FOR OVERLAY MULTICAST COMMUNICATIONS. Computer Communications (Elsevier Science).  Under review.

    CONFERENCE PAPERS

    1. Ezedin E. Barka, Emad Eldin Mohamed.  SECURING HIERARCICAL MULTICAST COMMUNICATIONS USING ROLES. The ACM International Wireless Communication and Mobile Computing Conference (IWCMC'09), June 21–24, 2009, Leipzig, Germany.
    2. Sami Shaban, Hani Eid, Ezedin Barka, Fikri AbuZidan. Technical development and evolution of a trauma registry in the UAE. International Conference, Trauma Management, Critical Care and Prevention, 16-19 Feb 2009, Al-Ain, UAE
    3. Fikri M. Abu-Zidan, Hani O. Eid, Karl Lunsjo, Fawaz Torab, Sami Shaban, and Ezedin Barka. ESTABLISHMENT OF A ROAD TRAFFIC ACCIDENT INJURY REGISTRY IN AL –AIN CITY. In the Proceedings of the 9th Annual UAE. University conference, Al Ain, United Arab Emirates. April, 2008.
    4. Leila Ismail and Ezedin Barka. KEY DISTRIBUTION FRAMEWORK FOR A MOBILE AGNET PLATFORM. THE IEEE International Conference on NEXT GENERATION MOBILE APPLICATIONS, SERVICES and TECHNOLOGIES (NGMAST 2008), 16-19 September 2008, Cardiff, Wales, UK. 
    5. Ezedin Barka, Khaled Shuaib, and H.Chamas. IMPACT OF IPSec ON THE PERFORMANCE OF THE IEEE 802.16 “WiMax” WIRELESS NETWORKS. The Second IFIP International Conference On New Technologies, Mobility and Security (NTMS’2008), 5-7 November 2008, Tangier, Morocco. 
    6. Ezedin Barka and Ravi Sandhu. AGENT_BASED ROLE DELEGATION MODEL (ARBDM). The IEEE International Conference on Communications (ICC 2007), Glasgow, Scotland. 24-28 June 2007.
    7. Abderrahmane Lakas, Mohamed Adel Serhani, and Ezedin Barka.  A FRAMEWORK FOR INTEGRATING SIP-BASED COMMUNICATION SERVICES AND WEB SERVICES. In the Proceedings of the 8th Annual UAE.University conference, Al Ain, United Arab Emirates. April, 2007.
    8. Ezedin Barka and Mohammed Boulmalf. IMPACT OF ENCRYPTION ON THE THROUGHPUT OF INFRASTRUCTUE WLAN IEEE 802.11g. The IEEE Wireless Communications and Networking Conference (WCNC 2007), Hong Kong. 11 – 15 March 2007.
    9. Ezedin Barka and Mohammed Boulmalf, Amal Alteniji, Hanadi Al Suwaidi, Huda Khazaimy, and Meera Al Mansouri.  IMPACT OF SECURITY ON THE PERFORMANCE OF AD HOC WLANS.  Innovation in Information Technology (IIT'06), Dubai, UAE. 19-21 November 2006. 
    10. Ezedin Barka and Zuhair Trabulsi.  SECURITY THREATS, ATTACKS, AND COUNTERMEASURES WITH IN THE UAE UNIVERSITY NETWORK.  The Scientific Symposium on Social and Security Impact on the Internet, Abu-Dhabi, UAE.  6-7 November 2006.
    11. Emad Eldin Mohamed and Ezedin Barka.  PLAYING CRYPTOGRAPHY: AN E-LEARNING APPROACH.  The 9th International Conference on Interactive Computer Aided Learning ICL 2006.  Villach, Austria. 27 – 29 September, 2006
    12. Ezedin Barka, Emad Eldin Mohamed, and Kadhim Hayawi. END-TO-END SECURITY SOLUTIONS FOR WLAN: A performance Analysis of the Underlying Encryption Algorithms in the Lightweight Devices. In the Proceedings of the ACM sponsored IWCMC 2006 Conference, Vancouver, Canada, July 3-6, 2006,
    13. Ezedin Barka,  Emad Eldin Mohamed and Kadhim Hayawi. ENHANCEMENT OF END-TO-END SECURITY SOLUTIONS FOR WLAN: In the Proceedings of the 7th Annual UAEU conference, Al Ain, United Arab Emirates. April, 2006.
    14. A. Lakas, K. Shuaib, E. Barka and S. Akhtar, “AN INTEGRARTED ARCHITECTURE FOR UBIQUITOUS MILITARY COMPOUND NETWROKS”, In the Proceedings of the 9th World Multi-conference on Systemics, Cybernetics and Informatics (WMSCI 2005) Orlando, USA. 10-13 July, 2005.
    15. Alaaeldin A. Aly and Ezedin Barka. TRACKING AND TRACING SPOOFED IP PACKETS TO THEIR SOURCES. In the Proceedings of the 6th Annual UAEU conference, Al Ain, United Arab Emirates. April, 2005.
    16. Ezedin Barka, Alaa Aly, Wadhah Kudaimi, and Kadhem Hayawi. IMPLEMENTAION OF ROLE-BASED DELEGATION MODELS. In the Proceedings of the 6th Annual UAEU conference, Al Ain, United Arab Emirates. April, 2005.
    17. Ezedin Barka and Ravi Sandhu. ROLE-BASED DELEGATION MODEL/HIERACHICAL ROLES (RBDM1). In the Proceedings of 20th Annual Computer Security Application Conference, Tucson, AZ, December 6-10 2004.
    18. Ezedin Barka and Ravi Sandhu. FRAMEWORK FOR ROLE-BASED DELEGATION MODELS. In Proceedings of 16th Annual Computer Security Application Conference, New Orleans, LA, December 11-15 2000
    19. Ezedin Barka and Ravi Sandhu. A ROLE-BASED DELEGATION MODEL AND SOME EXTENTIONS. In the Proceedings of 23rd National Information Systems Security Conference, Pages 101-114, Baltimore, Oct. 16-19, 2000 
    20. Alaaeldin A. Aly and Ezedin Barka. TRACKING AND TRACING SPOOFED IP PACKETS TO THEIR SOURCES. In the proceedings of the 6th Annual UAEU conference, Al Ain, United Arab Emirates. April, 2005.