Publications

Export 91 results:
Sort by: Author Title Type [ Year  (Desc)]
2018
Anber, H., A. Salah, and A. A. A. El-Aziz, "Analysis of Major Events in Egypt based on Twitter", Journal of Computers, vol. 13, issue 3, 2018.
2017
HadeelElsayedElsherbeiny, A. A. Abd El-Aziz, and N. Ramadan, "Decision Support for Requirements Prioritization Using Data Analysis", Egyptian Computer Science Journal (ISSN-1110-2586), vol. 41, issue 2, 2017.
Abd El-Aziz, A. A., "XML Security Technologies", Journal of Computers, vol. 12, issue 5, pp. 426-469, 2017. Abstract

n/a

2016
Ahmed El Azab, A. A. Abd El-Aziz, and M. A. Mahmood, "Effectiveness of Web Usage Mining Techniques in Business Application", Advances in Data Mining and Database Management (ADMDM) Book Series, IGI Global, 2016. Abstract

n/a

Anber, H., A. Salah, and A. A. Abd El-Aziz, "A Literature Review on Twitter Data Analysis", International Journal of Computer and Electrical Engineering,vol 8(3), 2016: Journal of Computers, 2016. Abstract

n/a

HadeelElsayedElsherbeiny, A. A. Abd El-Aziz, and N. Ramadan, "A Survey on Attempts to Enhance Requirements Engineering Process", CiiT International Journal of Software Engineering and Technology, vol. 8, issue 6, 2016. Abstract

n/a

Abd El-Aziz, A. A., "A Time-Stamp Based Algorithm for Decrypting the Encrypted XML Documents Partially", Jökull journal, vol. 66, no. 2, 2016. Abstract

n/a

Badawy, M., A. A. Abd El-Aziz, and H. A. Hefny, "Analysis of Learning Objectives for Higher Education Textbooks using Text Mining", 12th International Computer Engineering Conference Boundless Smart Societies Faculty of Engineering, Cairo University: IEEEXplore, 2016. Abstract
n/a
Badawy, M., A. A. Abd El-Aziz, H. Hefny, A. M. Idress, and S. Hossam, "A Survey on Exploring Key Performance Indicators", Future Computing and Informatics Journal, 10.1016/j.fcij.2016.04.001, 2016, 2016. Abstract
n/a
2015
Abd El-Aziz, A. A., and A. Kannan, "Enhanced RBAC Profile for XACML", International Conference on Information Systems and Technologies "ICIST'2015" , Istanbul, Turkey, 21 March, 2015. Abstract

n/a

Rekaby, F., A. A. Abd El-Aziz, M. A, Mahmood, and H. Hefny, "An Approach For Securing Software as a Service Model of Cloud Computing", The 2015 International Conference on Grid & Cloud Computing and Applications, 2015. Abstract

n/a

Gamal, M. M., A. A. Abd El-Aziz, M. A, Mahmood, and H. Hefny, "A Literature Survey on Mapping between Fuzzy XML Databases and Relational or Object Oriented Databases", The Third World Conference on Complex Systems( WCCS15), November 23-25, 2015 in Marrakech-Morocco: IEEEXplore, 2015. Abstract

n/a

Y, G., A. A. Abd El-Aziz, M. A, Mahmood, and H. Hefny, "Survey on Securing a Querying process by Blocking SQL injection", The Third World Conference on Complex Systems( WCCS15) November 23-25, 2015 in Marrakech-Morocco.: IEEExplore, 2015. Abstract

n/a

Rekaby, F., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "An Approach For Securing Software as a Service Model of Cloud Computing", The 2015 International Conference on Grid & Cloud Computing and Applications, 2015. Abstract
n/a
Rekaby, F., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "An Approach For Securing Software as a Service Model of Cloud Computing", The 2015 International Conference on Grid & Cloud Computing and Applications, 2015. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "Enhanced RBAC Profile for XACML", International Conference on Information Systems and Technologies "ICIST'2015" (Istanbul, Turkey), 2015, 2015. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "Enhanced RBAC Profile for XACML", International Conference on Information Systems and Technologies "ICIST'2015" (Istanbul, Turkey), 2015, 2015. Abstract
n/a
Rekaby, F., A. A. Abd El-Aziz, M. A, Mahmood, and H. Hefny, "Federated Cloud Computing Security using FS-Broadcast Encryption HIBE", The 11th International Computer Engineering Conference. Today Information Society What’s next? Faculty of Engineering, Cairo University Cairo, EGYPT December 29-30, 2015, 2015. Abstract
n/a
Rekaby, F., A. A. Abd El-Aziz, M. A, Mahmood, and H. Hefny, "Federated Cloud Computing Security using FS-Broadcast Encryption HIBE", The 11th International Computer Engineering Conference. Today Information Society What’s next? Faculty of Engineering, Cairo University Cairo, EGYPT December 29-30, 2015, 2015. Abstract
n/a
Rekaby, F., A. A. Abd El-Aziz, M. A, Mahmood, and H. Hefny, "Federated Cloud Computing Security using FS-Broadcast Encryption HIBE", The 11th International Computer Engineering Conference. Today Information Society What’s next? Faculty of Engineering, Cairo University Cairo, EGYPT December 29-30, 2015, 2015. Abstract
n/a
Gamal, M. M., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A Literature Survey on Mapping between Fuzzy XML Databases and Relational or Object Oriented Databases", The Third World Conference on Complex Systems( WCCS15), November 23-25, 2015 in Marrakech-Morocco: IEEEXplore, 2015. Abstract
n/a
Gamal, M. M., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A Literature Survey on Mapping between Fuzzy XML Databases and Relational or Object Oriented Databases", The Third World Conference on Complex Systems( WCCS15), November 23-25, 2015 in Marrakech-Morocco: IEEEXplore, 2015. Abstract
n/a
Refaie, R., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A New Efficient Algorithm for Executing Queries over Encrypted Data", International Conference on Computing, Communication and Security: IEEE, 2015. Abstract
n/a
Refaie, R., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A New Efficient Algorithm for Executing Queries over Encrypted Data", International Conference on Computing, Communication and Security: IEEE, 2015. Abstract
n/a
Refaie, R., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A New Efficient Algorithm for Executing Queries over Encrypted Data", International Conference on Computing, Communication and Security: IEEE, 2015. Abstract
n/a
Refaie, R., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A secure Algorithm for Executing Queries over Encrypted Data", Third World Conference on Complex Systems ( WCCS15) during November 23-25, 2015 in Marrakech-Morocco, 2015. Abstract
n/a
Refaie, R., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A secure Algorithm for Executing Queries over Encrypted Data", Third World Conference on Complex Systems ( WCCS15) during November 23-25, 2015 in Marrakech-Morocco: IEEE, 2015. Abstract
n/a
Refaie, R., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A secure Algorithm for Executing Queries over Encrypted Data", Third World Conference on Complex Systems ( WCCS15) during November 23-25, 2015 in Marrakech-Morocco: IEEE, 2015. Abstract
n/a
Y, G., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "Survey on Securing a Querying process by Blocking SQL injection", The Third World Conference on Complex Systems( WCCS15) November 23-25, 2015 in Marrakech-Morocco.: IEEExplore, 2015. Abstract
n/a
Gomaa, Y., A. E. A. Ahmed, M. A. Mahmood, and H. Hefny, "Survey on Securing a Querying process by Blocking SQL injection", 2015 Third World Conference on Complex Systems (WCCS): IEEE, pp. 1–7, 2015. Abstract
n/a
Y, G., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "Survey on Securing a Querying process by Blocking SQL injection", The Third World Conference on Complex Systems( WCCS15) November 23-25, 2015 in Marrakech-Morocco.: IEEExplore, 2015. Abstract
n/a
Gomaa, Y., A. E. A. Ahmed, M. A. Mahmood, and H. Hefny, "Survey on Securing a Querying process by Blocking SQL injection", 2015 Third World Conference on Complex Systems (WCCS): IEEE, pp. 1–7, 2015. Abstract
n/a
2014
A, Mahmood, M., M. A. El-fattah, and A. A. Abd El-Aziz, "Clustering model for progression of ocular hypertension to primary open angle glaucoma based on rough mereology", International Conference on Intelligent Information Technologies (ICIIT 2014), Chennai, India, 12/2014.
Refaie, R., A. A. Abd El-Aziz, N. Hamza, M. A, Mahmood, and H. Hefny, "A Survey On Executing Query On Encrypted Database", The International Conference on Intelligent Information Technologies (ICIIT 2014), Chennai, India, 12/2014.
Abd El-Aziz, A. A., and A. Kannan, "Literature Review on XML Security and Access Control to XML Documents", Studies in System Science, vol. 2, issue 1, pp. 96-101, 2014.
Abd El-Aziz, A. A., and A. Kannan, "SpatioTemporal RBAC Profile for XACML", CiiT International Journal of Software Engineering and Technology, vol. 6, issue 8, 2014.
Abd El-Aziz, A. A., and A. Kannan, ALGORITHMS FOR SECURE MAPPING OF XACML POLICIES AND RULES INTO TEMPORAL RELATIONS, : Anna Uni, India, 2014. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, ALGORITHMS FOR SECURE MAPPING OF XACML POLICIES AND RULES INTO TEMPORAL RELATIONS, : Anna Uni, India, 2014. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "JSON Encryption", 2014 International Conference on Computer Communication and Informatics (ICCCI -2014), Jan. 03 – 05, 2014, Coimbatore, INDIA: IEEEexplore, 2014. Abstract
n/a
Abd El-Aziz, A. A., and A. Kannan, "JSON Encryption", 2014 International Conference on Computer Communication and Informatics (ICCCI -2014), Jan. 03 – 05, 2014, Coimbatore, INDIA: IEEEexplore, 2014. Abstract
n/a
Tourism