Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zair Abdelouahab is active.

Publication


Featured researches published by Zair Abdelouahab.


Archive | 2006

Schema Matching in the Context of Model Driven Engineering: From Theory to Practice

Denivaldo Lopes; Slimane Hammoudi; Zair Abdelouahab

-Recently, software engineering is required to make face to the development, maintenance and evolution complexity of software systems. Among the proposed solutions for manging the complexity, Model Driven Engineering (MDE) has been accepted and implemented as one of the most promising solutions. In this approach, models become the hub of development, separating platform independent aspects from platform dependent aspects. Among the more important issues in MDE, we remark model transformation and model matching (or schema matching). In this paper, we propose an approach to take into account schema matching in the context of MDE. A schema matching algorithm is provided and implemented as a plug-in for Eclipse. We discuss an illustrative example to validate our approach.


international conference on enterprise information systems | 2009

A Step Forward in Semi-automatic Metamodel Matching: Algorithms and Tool

José Sousa; Denivaldo Lopes; Daniela Barreiro Claro; Zair Abdelouahab

In recent years the complexity of producing softwares systems has increased due the continuous evolution of the requirements, the creation of new technologies and integration with legacy systems. When complexity increases the phases of software development, maintenance and evolution become more difficult to deal with, i.e. they became more subject to error-prone factors. Recently, Model Driven Architecture (MDA) has made the management of this complexity possible thanks to models and the transformation of Platform-Independent Model (PIM) in Platform-Specific Models (PSM). However, the manual creation of transformation definitions is a programming activity which is error-prone because it is a manual task. In the MDA context, the solution is to provide semi-automatic creation of a mapping specification that can be used to generate transformation definitions in a specific transformation language. In this paper, we present an algorithm to match metamodels and enhancements in the MT4MDE and SAMT4MDE tool in order to implement this matching algorithm.


database and expert systems applications | 2006

Security on MASs with XML Security Specifications

Emerson Oliveira; Zair Abdelouahab; Denivaldo Lopes

In the past, multi-agent systems were used in proprietary environments. Nowadays, these systems have been used broadly in open distributed networks, such as e-commerce applications for Internet. An environment such as the Internet cannot be considered a safe place. Thus, multi-agent systems should have security mechanisms, e.g. confidentiality and integrity. The XML security specifications are standards that are based on XML and provide security mechanisms. They include: XML digital signature for digital signature; XML encryption for cryptography; XML key management specification for public key infrastructure. Agents may use a FIPA (foundation for intelligent physical agents) standard called RDF(resource description framework), which is a message content standard in XML language. Using this standard, agents can communicate exchanging XML messages, but these messages are not secure. In this article, we propose a secure communication model for agents based on RDF and the XML security specifications


international conference on software engineering advances | 2006

A Remote IDS Based on Multi-Agent Systems, Web Services and MDA

Mauro Silva; Denivaldo Lopes; Zair Abdelouahab

In this paper, we present a model, an architecture and an implementation of a Remote IDS (Intrusion Detection System) using the technology of Multi-agent Systems, Web Services and MDA (Model-Driven Architecture). This model adapts and extends the NIDIA (Network Intrusion Detection System based on Intelligent Agents) to provide a remote IDS on the Internet. The purpose is that users that do not have a local IDS can use the services provided by our remote IDS. NIDIA is an IDS whose architecture consists of a set of cooperative agents. The IDS functionalities are provided as a set of accessible services on the Internet through Web Services. The architecture of our IDS uses MDA to support metadata management such as profiles of machines, profiles of users and profiles of services. An illustrative example shows our IDS.


web intelligence | 2006

Management and Integration of Information in Intrusion Detection System: Data Integration System for IDS Based Multi-Agent Systems

Emanoel Costa Claudino; Zair Abdelouahab; Mário Meireles Teixeira

In this paper, we present a model, an architecture and an implementation of an information manager for an IDS (intrusion detection systems), using the technology of multi-agent systems and Web services. This manager has been integrated to NIDIA (network intrusion detection system based on intelligent agents), which is an IDS whose architecture consists of a group of cooperative agents. In our proposal, the NIDIA is adapted and extended so that its services uses updated and secure information. The goal of the information manager module is to keep safe and update of information that is necessary for the development of inherent functions of an IDS


computer, information, and systems sciences, and engineering | 2010

An Architecture for Wireless Intrusion Detection Systems Using Artificial Neural Networks

Ricardo Luis da Rocha Ataide; Zair Abdelouahab

The majority existing wireless intrusion detection systems identifies intrusive behaviors are based on the exploration of known vulnerabilities called signatures of attacks. With this mechanism, only known vulnerabilities are detected which leads to bringing the necessity of new techniques to add in the system. This work considers an architecture for intrusion detection in wireless network based on anomaly. The system is capable to adapt itself to a profile of a new community of users, as well as recognizing attackswith different characteristics than those already known by the system, by considering changes from normal behavior. The system uses artificial neural networks in the processes of detecting intrusions and taking countermeasures. A prototype is implemented and submitted to some simulations and tests, with three different types of attacks of Denial of Service (DoS).


Archive | 2008

An Adaptive Train Traffic Controller

Zair Abdelouahab; Reginaldo Isaias Braga

We present an implementation of a Train Traffic Controller Simulator, in which functional requirements can be adaptive, that is to say, modified, supplemented or even redefined through an approach based on finite state machines. Depending on its requirements, a Train Traffic Controller can assume simple or critical features in terms of safety or fault tolerance. The modeling based on an approach of state machines arranges the environment for adaptability to some functional requirements. This feature is better emphasized when we use automated tools of definition of state machine that permits an easy integration with the rest of the application.


Archive | 2015

A Framework Based on Model Driven Engineering to Support Schema Merging in Database Systems

Marcus Vinícius Carvalho; Denivaldo Lopes; Zair Abdelouahab

Model Driven Engineering (MDE) aims to make face to the development, maintenance and evolution of complex software systems, focusing in models and model transformations. This approach can be employed in other domains such as database schema integration. In this paper, we propose a framework based on MDE to integrate database schema. In MDE context, database schema are viewed as database model. A metamodel for creating database models, an algorithm for database model matching and an algorithm for database model merging are presented. We provide a prototype that extends the MT4MDE and SAMT4MDE tools in order to demonstrate the implementation of our proposed framework. An illustrative example helps to understand our proposed framework.


International conferenc CISSE 2012 | 2015

Model Driven Testing for Cloud Computing

Jéssica Oliveira; Denivaldo Lopes; Zair Abdelouahab; Daniela Barreiro Claro; Slimane Hammoudi

In this paper, the authors present a proposal to support the creation of test cases for software systems under cloud computing environments. This approach is based on Model Driven Engineering (MDE). A Methodology and metamodels are proposed to support the generation of test cases. Specific metamodels for cloud computing environments are provided. Business models are created conform to UML (including profiles) and test cases are created conform to a metamodel that is independent testing platform. Both models are manipulated by model transformation that generates test cases for cloud computing environments. These metamodels are used in conjunction with the tool MT4MDE and SAMT4MDE for developing testing models. An illustrative example helps to understand the proposed approach.


computer, information, and systems sciences, and engineering | 2010

Building Test Cases through Model Driven Engineering

Helaine Sousa; Denivaldo Lopes; Zair Abdelouahab; Slimane Hammoudi; Daniela Barreiro Claro

Recently, Model Driven Engineering (MDE) has been proposed to face the complexity in the development, maintenance and evolution of large and distributed software systems. Model Driven Architecture (MDA) is an example of MDE. In this context, model transformations enable a large reuse of software systems through the transformation of a Platform Independent Model into a Platform Specific Model. Although source code can be generated from models, defects can be injected during the modeling or transformation process. In order to delivery software systems without defects that cause errors and fails, the source code must be submitted to test. In this paper, we present an approach that takes care of test in the whole software life cycle, i.e. it starts in the modeling level and finishes in the test of source code of software systems. We provide an example to illustrate our approach.

Collaboration


Dive into the Zair Abdelouahab's collaboration.

Top Co-Authors

Avatar

Denivaldo Lopes

Federal University of Maranhão

View shared research outputs
Top Co-Authors

Avatar

Slimane Hammoudi

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Breno Sousa

Federal University of Maranhão

View shared research outputs
Top Co-Authors

Avatar

Bruno Rodrigues Froz

Federal University of Maranhão

View shared research outputs
Top Co-Authors

Avatar

Emerson Oliveira

Federal University of Maranhão

View shared research outputs
Top Co-Authors

Avatar

Helaine Sousa

Federal University of Maranhão

View shared research outputs
Top Co-Authors

Avatar

Johnneth de Sene Fonseca

Federal University of Maranhão

View shared research outputs
Top Co-Authors

Avatar

Karla Donato Fook

Federal University of Maranhão

View shared research outputs
Top Co-Authors

Avatar

Mário Meireles Teixeira

Federal University of Maranhão

View shared research outputs
Researchain Logo
Decentralizing Knowledge