Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ounsa Roudies is active.

Publication


Featured researches published by Ounsa Roudies.


Archive | 2016

Multidimensional Project Metamodel Construction Methodology for a HIS Deployment

Farid Lahboube; Ounsa Roudies; Nissrine Souissi

Today, health facilities can be restructured only as part of a triple challenge: meeting the healthcare needs in a given area, meeting the requirements of safety and quality, and adapting to the constraints of scarcity of both human and financial resources. In this context, hospitals have undertaken full or partial reforms, which consist primarily in the introduction of Hospital Information Systems (HIS). However, digitalization projects of these structures encounter a wide range of issues due to the complexity and difficulty of such projects. This paper proposes a response to these difficulties according to a HIS project multidimensional metamodel. This one apprehends the dynamic nature of a HIS implementation considering its interactivity with other factors, phases and iterative nature.


2017 IEEE 25th International Requirements Engineering Conference Workshops (REW) | 2017

REQDL: A Requirements Description Language to Support Requirements Traces Generation

Saida Haidrar; Hatime Bencharqui; Adil Anwar; Jean-Michel Bruel; Ounsa Roudies

It is important to manage traceability between requirements and other artifacts, including stakeholders, sources, and system development elements. Requirements are often expressed independently from those artifacts using textual and model approaches. This fact makes hard and tedious the inference of trace links between them. This paper proposes a new Domain Specific Language (DSL), called REQDL, for describing requirements, and at the same time, capturing bi-directional traceability data, which concerns especially SYSML modeling elements. Using REQDL expressions, we aim at assisting the traceability operation by applying a model-to-model transformation of both REQDL and SYSML constructs. The main result is the generation of requirements trace models, which incorporate intention and viewpoint concepts in conformance with a predefined trace metamodel. We use a car cooling system to illustrate the paper contributions.


software - science, technology and engineering | 2016

MaPE-K-Based Approach for Security @ Runtime

Mohamed Amoud; Ounsa Roudies

Dynamic systems cause challenges for security because it is impossible to anticipate all the possible changes at design-time. Adaptive security is an applicable solution for this challenge. It is able to automatically select security mechanisms and their parameters at runtime in order to preserve the required security level in a changing environment. In this paper we describe an approach detailing key steps and activities to create an adaptive security solution. The architecture conforms to the MAPE-K reference model, which is a widely applied reference model in autonomic computing. Steps include: Establishing a control point to force control of the security decision process from the existing system. Identifying an environment parameter with which the security will trade off. Studying the interrelationship between security and the environment parameter in the existing system context by identifying measurable factors which influence their relationship. Formulation of a trade-off goal which is optimised based on multiple objectives, one of which is a security objective. Consequently, the proposed approach is capable of deploying mechanisms adaptive security to satisfy different security needs at different conditions.


AECIA | 2016

A Systematic Review of Security in Cloud Computing

Mohamed Amoud; Ounsa Roudies

Security issues over cloud computing is definitely one of the major concerns that many companies are trying to recognize. However, some companies are also concerned about regulatory issues. Market observers say that a lot of the participants in the survey worry that they will be tied to one provider of cloud storage. Experts opine that cloud computing is at its nascent stage and providers will have to address issues related security, availability, and more to expand in the future. This paper presents a literature review of privacy and security approaches for cloud computing, and evaluates them in terms of how well they support critical security services and what level of adaptation they achieve. This work will be done following the Systematic Review approach. Our results concluded that the research field of security approaches for cloud is still poor of methods and metrics for evaluating and comparing different techniques.


international conference software engineering and information management | 2018

A New Reuse Capability and Maturity Model: An Overview

Siham Younoussi; Ounsa Roudies

Throughout the last decade, increasingly sophisticated processes models, methods and tools have evolved as a result of structure and culture changes of software organizations. Software reuse is considered as a major factor for increasing productivity and quality. Reuse is implemented more and more by organizations, thereby giving them headway. To be more competitive these organizations try to invest in software reuse, by identifying the most effective reuse strategies, methods and practices. However, there is a high up-front risk of reuse adoption, because a significant initial organization investment is required, while the ROI is not guaranteed. Several Software Reuse Models have been suggested in literature to face the reuse adoption problem, but until now there is no widely accepted model. This paper proposed a new Reuse Capability Maturity Model based on international standards, literature and completed with the most recent and popular approaches as Lean and Devops, to help organizations implementing an efficient reuse program.


international conference wireless technologies embedded and intelligent systems | 2017

On the use of model transformation for requirements trace models generation

Saida Haidrar; Adil Anwar; Ounsa Roudies

Requirements traceability is handled in order to help stakeholders understanding existing dependencies between requirements and development artifacts. In this paper, we aim at taking advantage from system engineering and model-driven engineering field in order to automatically generate trace links from SYSML models. Our approach establishes a transformation of requirement diagrams and design diagrams into a trace model. The input SYSML model is compliant with the SYSML4TRACEABILITY profile that helps in capturing all traceability data before performing the transformation. The generated trace model is compliant with a trace meta-model and depicts various links between requirements and design artifacts so as to ensure requirement traceability at different levels of granularity. We experiment this approach by extracting requirements traces relevant to the anti-lock braking system.


international conference on electrical and information technologies | 2016

Seven views + one

Farid Lahboube; Ounsa Roudies; Nissrine Souissi


INFORSID | 2005

Une approche multivue pour la conception de systèmes d'information à base de composants.

Brahim Lahna; Ounsa Roudies; Jean-Pierre Giraudin


ieee international colloquium on information science and technology | 2016

Towards a generic framework for requirements traceability management for SysML language

Saida Haidrar; Adil Anwar; Ounsa Roudies


Third International Conference on Computer Science & Engineering | 2016

APPLYING A S YSTEMATIC REVIEW ON ADAPTIVE SECURITY FOR DSPL

Mohamed Amoud; Ounsa Roudies

Collaboration


Dive into the Ounsa Roudies's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge