Research Associate
Senior Lecturer in Computing and Communications
<p dir="ltr">I have always been passionate about inventing computers that can improve the way we live, work, play, heal, travel, communicate with others, and care for our environment. I was fortunate enough to turn my passion into a career in research.<br><br>I am a Research Associate in the Department of Computing at the Open University. Currently, I am investigating the area of adaptive security and privacy. The goal is to exploit the digital devices available in the environment in order to meet security requirements in the face of change.<br><br> I completed my PhD in July 2013 under the supervision of<a href="index.php?option=com_content&view=article&id=94:valerie-issarny&catid=90:actual">Valérie Issarny</a>at<a href="http://www.inria.fr/centre/paris-rocquencourt">Inria</a>. My thesis is entitled“<a href="http://hal.inria.fr/tel-00849402/en">Dynamic Synthesis of Connectors in Pervasive Environments</a>” and it takes part in the<a href="http://connect-forever.eu/">Connect Project</a>. During my PhD, I defined an approach and provided a tool for achieving interoperability in software systems on the fly in an automated manner.<br>The goal was to make it possible for a computer to answer, autonomously, questions like:<br>- How can I chat with my friend on Yahoo! using my enterprise messaging service?<br>- How can I open my Google Docs files using the Finder application on my Mac?<br>- How can a company use the same application to order products from different providers?<br>- How can the command and control centre of one country effectively use the resources offered by another country in emergency situations?<br><br>Before starting my PhD, I was a junior engineer at<a href="https://www.rocq.inria.fr/arles/">ARLES Team</a>and worked on the<a href="http://www.ambientic.com/en/">iBICOOP middleware</a>. I also received my Magistère degree in 2009 at<a href="http://www.esi.dz/">Ecole Nationale Supérieure d’Informatique (ex INI)</a>; the report was entitled“Towards a Peer-to-Peer System based on Distributed Compact Trie Hashing”. It was the continuation of my engineering degree subject“<a href="http://hal.inria.fr/hal-00850116/en">Integration of a Mobile Client to CTH*</a>”, received in 2006 at ESI. My Supervisor was<a href="http://zegour.uuuq.com/">Prof. Djamel-Eddine Zegour</a></p>
<p dir="ltr">My research methodology is centred around three principles:</p><p dir="ltr">-<b>Theory is the foundation.</b>I consider that formal methods and mathematical techniques provide us with the necessary tools not only to better understand our world but also to develop new methods to master it.<br>-<b>Practice is essential.</b>Turning the theoretical results into real software is paramount. I always thought that it is important (and also fun) to get my hands dirty in order to implement my ideas, build systems and prototypes, and experiment new scenarios and cases.<br>-<i></i><b>Be truly interdisciplinary.</b>While my education and research is primarily in computer science, I am always keen in exploring ideas from other disciplines both inside and outside computer science.</p><p dir="ltr"><b>Collaborative Adaptive Security</b></p><p dir="ltr">Security is concerned with the protection of assets from intentional harm. Secure systems provide capabilities that enable such protection to satisfy some security requirements. In a world increasingly populated with mobile and ubiquitous computing technology, the scope and boundary of security systems can be uncertain and can change. A single functional component, or even multiple components individually, are often insufficient to satisfy complex security requirements on their own. Collaborative adaptive security, which I am currently investigating, aims to exploit the selection and deployment of multiple, potentially heterogeneous, software-intensive components to collaborate in order to meet security requirements in the face of changes in the environment, changes in assets under protection and their values, and the discovery of new threats and vulnerabilities.</p><p dir="ltr"><b>Dynamic Synthesis of Mediators: From Theory to Practice</b></p><p dir="ltr">During my PhD, I defined an approach for the automated synthesis and deployment of mediators in order to enable heterogeneous software components, with compatible functionalities, to interoperate. The synthesised mediators reconcile the differences between the interfaces of the components and coordinate their behaviours from the application down to the middleware layers. I validated the approach through the development of a tool,<a href="http://www-roc. inria.fr/arles/software/mics/"><font color="blue"size="3"><u>MICS</u></font></a>, and its experimentation with a number of case studies ranging from heterogeneous chat applications to emergency management in systems of systems. These case studies serve demonstrating the viability and efficiency of the automated synthesis of mediators to enable software components to interoperate in extremely dynamic and heterogeneous contexts such as ubiquitous environments or systems of systems.</p><p dir="ltr"><b>Research Interests</b></p><p dir="ltr">-<b>Distributed computing:</b>middleware, interoperability, runtime mediation, ubiquitous computing, SOC, mobile networking, semantics-based technologies<br>-<b>Software engineering:</b>software composition and reuse, process algebra, behavioural analysis, machine learning, models@runtime</p>
<div>My research methodology is centred around three principles:</div><div><div><div><div><div><div><div><p>- <strong>Theory is the foundation.</strong> I consider that formal methods and mathematical techniques provide us with the necessary tools not only to better understand our world but also to develop new methods to master it.<br />- <strong>Practice is essential.</strong> Turning the theoretical results into real software is paramount. I always thought that it is important (and also fun) to get my hands dirty in order to implement my ideas, build systems and prototypes, and experiment new scenarios and cases.<br />-<em> </em><strong>Be truly interdisciplinary.</strong> While my education and research is primarily in computer science, I am always keen in exploring ideas from other disciplines both inside and outside computer science.</p><p><strong>Collaborative Adaptive Security</strong></p><p>Security is concerned with the protection of assets from intentional harm. Secure systems provide capabilities that enable such protection to satisfy some security requirements. In a world increasingly populated with mobile and ubiquitous computing technology, the scope and boundary of security systems can be uncertain and can change. A single functional component, or even multiple components individually, are often insufficient to satisfy complex security requirements on their own. Collaborative adaptive security, which I am currently investigating, aims to exploit the selection and deployment of multiple, potentially heterogeneous, software-intensive components to collaborate in order to meet security requirements in the face of changes in the environment, changes in assets under protection and their values, and the discovery of new threats and vulnerabilities.</p><p><strong>Dynamic Synthesis of Mediators: From Theory to Practice</strong></p><p>During my PhD, I defined an approach for the automated synthesis and deployment of mediators in order to enable heterogeneous software components, with compatible functionalities, to interoperate. The synthesised mediators reconcile the differences between the interfaces of the components and coordinate their behaviours from the application down to the middleware layers. I validated the approach through the development of a tool, <a href="http://www-roc. inria.fr/arles/software/mics/" rel="nofollow"><u>MICS</u></a>, and its experimentation with a number of case studies ranging from heterogeneous chat applications to emergency management in systems of systems. These case studies serve demonstrating the viability and efficiency of the automated synthesis of mediators to enable software components to interoperate in extremely dynamic and heterogeneous contexts such as ubiquitous environments or systems of systems.</p><p><strong>Research Interests</strong></p><p>- <strong>Distributed computing:</strong> middleware, interoperability, runtime mediation, ubiquitous computing, SOC, mobile networking, semantics-based technologies<br />- <strong>Software engineering: </strong>software composition and reuse, process algebra, behavioural analysis, machine learning, models@runtime</p></div></div></div></div></div></div></div>
<p>I am a Lecturer in Computing at the Open University since April 2016. I was previously a Research Associate in the Department of Computing at the Open University and a visiting lecturer at City University London. Currently, I am investigating the area of adaptive security and privacy. The goal is to exploit the digital devices available in the environment in order to meet security requirements in the face of change.</p><p>I completed my PhD in July 2013 under the supervision of <a href="http://amel.me/index.php?id=94:valerie-issarny&catid=90:actual" rel="nofollow">Valérie Issarny</a> at <a href="http://www.inria.fr/centre/paris-rocquencourt" rel="nofollow">Inria</a>. My thesis is entitled“<a href="http://hal.inria.fr/tel-00849402/en" rel="nofollow">Dynamic Synthesis of Connectors in Pervasive Environments</a>” and it takes part in the <a href="http://connect-forever.eu/" rel="nofollow">Connect Project</a>. During my PhD, I defined an approach and provided a tool for achieving interoperability in software systems on the fly in an automated manner.</p><p>The goal was to make it possible for a computer to answer, autonomously, questions like:</p><ul><li>How can I chat with my friend on Yahoo! using my enterprise messaging service?</li><li>How can I open my Google Docs files using the Finder application on my Mac? </li><li>How can a company use the same application to order products from different providers?</li><li>How can the command and control centre of one country effectively use the resources offered by another country in emergency situations?</li></ul><p>Before starting my PhD, I was a junior engineer at <a href="https://www.rocq.inria.fr/arles/" rel="nofollow">ARLES Team</a> and worked on the <a href="http://www.ambientic.com/en/" rel="nofollow">iBICOOP middleware</a>. I also received my Magistère degree in 2009 at <a href="http://www.esi.dz/" rel="nofollow">Ecole Nationale Supérieure d’Informatique (ex INI)</a>; the report was entitled“Towards a Peer-to-Peer System based on Distributed Compact Trie Hashing”. It was the continuation of my engineering degree subject“<a href="http://hal.inria.fr/hal-00850116/en" rel="nofollow">Integration of a Mobile Client to CTH*</a>”, received in 2006 at ESI. My Supervisor was <a href="http://zegour.uuuq.com/" rel="nofollow">Prof. Djamel-Eddine Zegour</a></p>
Amel Bennaceur
Dr Amel Bennaceur
Bennaceur
Amel
A.
037ba5a43d36433e80d81ffde68bb584c34caf5e
Amel Bennaceur
Amel Bennaceur
A. Bennaceur
Dr
Dr
<p>I am a Lecturer in Computing at the Open University since April 2016. I was previously a Research Associate in the Department of Computing at the Open University and a visiting lecturer at City University London. Currently, I am investigating the area of adaptive security and privacy. The goal is to exploit the digital devices available in the environment in order to meet security requirements in the face of change.</p><p>I completed my PhD in July 2013 under the supervision of <a href="http://amel.me/index.php?id=94:valerie-issarny&catid=90:actual" rel="nofollow">Valérie Issarny</a> at <a href="http://www.inria.fr/centre/paris-rocquencourt" rel="nofollow">Inria</a>. My thesis is entitled“<a href="http://hal.inria.fr/tel-00849402/en" rel="nofollow">Dynamic Synthesis of Connectors in Pervasive Environments</a>” and it takes part in the <a href="http://connect-forever.eu/" rel="nofollow">Connect Project</a>. During my PhD, I defined an approach and provided a tool for achieving interoperability in software systems on the fly in an automated manner.</p><p>The goal was to make it possible for a computer to answer, autonomously, questions like:</p><ul><li>How can I chat with my friend on Yahoo! using my enterprise messaging service?</li><li>How can I open my Google Docs files using the Finder application on my Mac? </li><li>How can a company use the same application to order products from different providers?</li><li>How can the command and control centre of one country effectively use the resources offered by another country in emergency situations?</li></ul><p>Before starting my PhD, I was a junior engineer at <a href="https://www.rocq.inria.fr/arles/" rel="nofollow">ARLES Team</a> and worked on the <a href="http://www.ambientic.com/en/" rel="nofollow">iBICOOP middleware</a>. I also received my Magistère degree in 2009 at <a href="http://www.esi.dz/" rel="nofollow">Ecole Nationale Supérieure d’Informatique (ex INI)</a>; the report was entitled“Towards a Peer-to-Peer System based on Distributed Compact Trie Hashing”. It was the continuation of my engineering degree subject“<a href="http://hal.inria.fr/hal-00850116/en" rel="nofollow">Integration of a Mobile Client to CTH*</a>”, received in 2006 at ESI. My Supervisor was <a href="http://zegour.uuuq.com/" rel="nofollow">Prof. Djamel-Eddine Zegour</a></p>