Abd EL-Aziz Ahmed
Título
Citado por
Citado por
Año
JSON Encryption
AA Abd El-Aziz, A Kannan
2014 International Conference on Computer Communication and Informatics …, 2014
156*2014
A Survey on Exploring Key Performance Indicators
M Badawy, AA Abd El-Aziz, H. Hefny, AM Idress, S Hossam
Future Computing and Informatics Journal, 10.1016/j.fcij.2016.04.001, 2016, 2016
662016
Mapping XML DTDs to relational schemas
AA Abd El-Aziz, H Oakasha
Computer Systems and Applications, 2005. The 3rd ACS/IEEE International …, 2005
182005
Access control for healthcare data using extended XACML-SRBAC model
AA Abd EL-Aziz, A Kannan
2012 International Conference on Computer Communication and Informatics, 1-4, 2012
172012
A Literature Review on Twitter Data Analysis
H Anber, A Salah, AA Abd El-Aziz
2016 2nd International Conference on Computer and Information Technology …, 2016
112016
A Comprehensive Presentation to XACML
AA Abd El-Aziz, A Kannan
In the Proceedings of the Third International Conference on Computational …, 2013
112013
XML Access Control: Mapping XACML Policies to Relational Database Tables
AA Abd El-Aziz, A Kannan
IAJIT 11 (6), 9, 2014
52014
Effectiveness of Web Usage Mining Techniques in Business Application
A ElAzab, AA Abd El-Aziz, MA Mahmood
IGI Global, 2016
42016
Survey on securing a querying process by blocking SQL injection
Y Gomaa, MA Mahmood, H Hefny
2015 Third World Conference on Complex Systems (WCCS), 1-7, 2015
42015
Storing XML documents and XML policies in Relational Databases
AA Abd El-Aziz, A Kannan
2nd international conference on computer communication and informatics-2012 …, 2012
4*2012
Analysis of Learning Objectives for Higher Education Textbooks using Text Mining
M Badawy, AA Abd El-Aziz, HA Hefny
12th International Computer Engineering Conference Boundless Smart …, 2016
32016
Federated cloud computing security using forward-secure broadcast encryption HIBE
F Rekaby, AA Abd El-Aziz, MA Mahmood, HA Hefny
2015 11th International Computer Engineering Conference (ICENCO), 13-18, 2015
32015
A secure Algorithm for Executing Queries over Encrypted Data
R Refaie, AA Abd El-Aziz, N Hamza, M A, Mahmood, H Hefny
Third World Conference on Complex Systems ( WCCS15) during November 23-25 …, 2015
32015
Storing XML Rules in Relational Storage of XML DTD
AA Abd El-Aziz, A Kannan
The Second International Conference on Computational Science, Engineering …, 2012
3*2012
A Novel Coronavirus Forecasting Model using Nonlinear Autoregressive Artificial Neural Network
NM Ghazaly, MA Abdel-Fattah, AA Abd EL-Aziz
International journal of Advanced Sciene and Technology (IJAST) 29 (5), 2020
22020
A Survey on Mitigation Techniques against DDoS Attacks on Cloud Computing Architecture
A Baker., AA Abd EL-Aziz, Hesham A. Hefny
International journal of Advanced Sciene and Technology (IJAST) 28 (12), 187-200, 2019
22019
A New Efficient Algorithm for Executing Queries over Encrypted Data
R Refaie, AA Abd El-Aziz, N Hamza, M A, Mahmood, H Hefny
International Conference on Computing, Communication and Security, 2015
22015
A Literature Survey on Mapping between Fuzzy XML Databases and Relational or Object Oriented Databases
MM Gamal, AA Abd El-Aziz, N Hamza, M A, Mahmood, H Hefny
The Third World Conference on Complex Systems( WCCS15), November 23-25, 2015 …, 2015
22015
A Survey On Executing Query On Encrypted Database
R Refaie, AA Abd El-Aziz, N Hamza, M A, Mahmood, H Hefny
The International Conference on Intelligent Information Technologies (ICIIT …, 2014
2*2014
A Survey on XML Security
AA Abd El-Aziz, A Kannan
In the Proceedings of the 3rd International Conference on Recent Trends in …, 2013
22013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20