Ce module a été développé afin de rendre le site Efrei accessible au plus grand nombre.

Si malgré notre vigilance, vous rencontriez le moindre problème d’accessibilité sur notre site, n’hésitez pas à nous contacter à l’adresse site-groupe@efrei.fr ou par téléphone au +33 188 289 000.

Layth Sliman Research Professor


After obtaining a degree in Computer Engineering and his Master Degree in Computer Science, Layth Sliman received his Ph.D. at INSA Lyon, in collaboration with Ryukyus University, Japan. He additionally studied computer software application development and implementation at CMC-TATA in New Delhi, India. In the same year, he also completed another course in Information and Communication Technology at MEIO University and the Okinawa International Center in Japan. In 2008, 2009, 2010, 2012, 2013 and 2014, he pursued research projects in Digital Rights Management and Image Processing at Ryukyus University and Ritsumeikan University in Japan. He has conducted research and taught Computer Engineering and Information Systems at many universities, including INSA Lyon, Ryukyus University in Japan, Beijing University of Technology and the Institute of Visual Informatics in Malaysia. Since September 2010, he has been a research professor at EFREI. He is a research fellow in numerous international institutes.

Layth Sliman has given numerous conférences and seminars on the subject of IoT, Collaborative Systems, Big Data and Blockchain in France, Italy, Japan, and Spain. He has chaired and/or organized more than 10 international conferences. This include 27th IEEE WETICE, 25th IEEE WETICE, SOCPAR2017 (LNCS), IAS2017 (LNCS), 13th IAS (LNCS),  IBICA2017(LNCS), 10th IFIP NTMS2019, 9th NTMS18, 6th NTMS15, 14th ISDA(IEEE), and 10 years, (IEEE).


  • Collaborative Information Systems.

This involves many topics including : Web 2.0, IS Architecture, IoT Cryptography, Cloud Computing, SaaS, Semantic Web and Semantic SOA.


  • Information System Architecture
  • Knowledge Management
  • Security and Risk Management









  • Imed Abbassi, Layth Sliman, Mohamed Graiet and Walid Gaaloul. Verifying Data Security Requirements in Internet of Things using Event-B, to appear in proceedings of The fourth annual International Conference on Digital Economy, Beirut, Lebanon, April 2019.
  • Mouhamad Almakhour, Layth Sliman, Abed Ellatif Samhat, Walid Gaaloul. Trustless Blockchain-based Access Control in Dynamic Collaboration. To appear in proceedings of the 1st International conference on Big Data and Cyber-Security Intelligence, Beirut , Lebanon, 2018.: https://www.cognitus.fr/BDCSIntell2018/conference-program/
  • Taoufik Sakka Rouis, Layth Sliman Mohamed Tahar Bhiri,  Mourad Kmimech,  A Generic Approach for the Verification of Static and Dynamic Behavioral Properties of SCDL/WS-BPEL Service-Component Architectures, Proceedings of the International Conference on Parallel and Distributed Computing: Applications and Technologies, PDCAT 2018: pp 381-389, LNCS, 2018: https://link.springer.com/chapter/10.1007/978-981-13-5907-1_41
  • Hachemi Nabil DellysKarima BenatchbaLayth SlimanYen Wei Chen: Chaff-Points Generation Method Based on Adaptive Genetic Algorithms and Non-Fixed Size Squares Boundaries for Resource Constrained Devices. 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Pages 1-4, 2018: https://ieeexplore.ieee.org/document/8328727
  • Tasnime Omrani, Rhouma Rhouma and Layth Sliman, Lightweight cryptography for resource-constrained devices: A comparative study and Rectangle cryptanalysis, ICDEc 2018, Pages 107-118, Lecture Note in Computer Science: https://link.springer.com/chapter/10.1007/978-981-13-5907-1_41
  • Saliha Artabaz, Layth Sliman, Karima Benatchba and Mouloud Koudil, Study od Score Fusion and Quality Weighting in Biosecure DS2 Database, Cambridge Summit, 2018: http://info.vit.ac.in/cambridgesummit2018/souvenir/files/assets/basic-html/page64.html
  • Wael Chargui, Taoufik Sakka Rouis, Mourad Kmimech, Mohamed Tahar Bhiri, Badran Raddaoui and Layth Sliman: «Towards a Formal Verification Approach for Service Component Architecture». Proceedings of  the 16th International Conference on Intelligent Software, Methodologies and Techniques, SoMeT 2017, Pages 466-479, IOS Press: 2017: http://ebooks.iospress.nl/publication/47589
  • Wael Chargui, Taoufik Sakka Rouis, Mourad Kmimech, Mohamed Tahar Bhiri, Layth Sliman and Badran Raddaoui: «Behavioral Verification of Service-Component Architecture». The 26th IEEE WETICE conference, June 2017, Poznan, Poland, pp. 239-241 (Short paper): https://ieeexplore.ieee.org/document/8003824
  • Taoufik Sakka Rouis, Mohamed Tahar Bhir, Layth Sliman and Mourad Kmimech: «Towards a Formal Approach for the Verification of SCA/BPEL Software Architectures». The 8th International Conference on Information, Intelligence, Systems and Applications (IISA), Pages 1-6, August 2017, Larnaca. Cyprus. https://ieeexplore.ieee.org/document/8316371
  • Taoufik Sakka Rouis, Mohamed Tahar Bhiri, Mourad Kmimech and Layth Sliman:  «UML2ADA for early verification of concurrency inside the UML2.0 atomic components». The 17th International Conference on Intelligent Systems Design and Applications (ISDA), Pages, 10-20, December 2017. Delhi, India: https://link.springer.com/chapter/10.1007/978-3-319-76348-4_2
  • Imed AbbassiMohamed GraietSindyana JlassiAbir Elkhalfa, Layth Sliman: a Formal Approach for Correct Elastic Package-Based Free and Open Source Software Composition in Cloud. Proceedings of The 25th International Conference on Cooperative Information Systems  COOPIS, Pages 732, 751, Grece, 2017: https://link.springer.com/chapter/10.1007%2F978-3-319-69462-7_46
  • Abir Elkhalfa, Layth Sliman, Sindyana Jlassi, Imed Abbass, Verifying the package-based Free and Open Source Software Configuration using EVENT-B, Proceeding of IEEE Wetice2017. Pages: 69-71 (short paper), June 2017, Poland:  https://www.computer.org/csdl/proceedings/wetice/2017/1759/00/1759a069-abs.html
  • Amal Ayach, Layth Sliman, Mourad KmimechMohamed Tahar BhiriBadran RaddaouiTowards a Formal Verification Approach for Cloud Software Architecture. Proceedings of  the 16th International Conference on Intelligent Software, Methodologies and Techniques,  , SoMeT 2017, Pages 490 – 502, IOS Press: 2017: http://ebooks.iospress.nl/publication/47591
  • Tasnime Omrani, Layth Sliman, Rabie Becheikh, Safya Belghith, Belgacem Ben Hedia, Towards an Ultra-lightweight Cryptosystem for IoT, International Conference on Soft Computing and Pattern Recognition, Socpar, Pages 614-621, Lecture Note in Computer, Science, 2016https://link.springer.com/chapter/10.1007%2F978-3-319-60618-7_60
  • Saliha Artabaz, Hachemi Nabil Dellys, Layth Sliman, Karima Benatchba and Mouloud Koudil, Multibiometrics Enhancement Using Quality Measurement in Score Level Fusion, The 16th International Conference on Intelligent Systems Design and Applications, ISDA 2016, Pages 60-67,  Lecture Note in Computer Science. Dec 2016: https://link.springer.com/chapter/10.1007/978-3-319-53480-0_26
  • Samih Souissi, Ahmed Serhrouchni, Layth Sliman, Benoit Charroux, Security Incident Response: Towards a novel decision-making system, International Conference on Intelligent Systems Design and Applications, ISDA 2016, Pages 667-676, Lecture Note in Computer Science., December 2016: https://link.springer.com/chapter/10.1007/978-3-319-53480-0_66
  • Hachemi Nabil Dellys., Layth Sliman, Saliha Artabaz., Karima Benatchba., Mouloud Koudil. Chaff-Points Generation Using Knapsack problem resolution in Fingerprint Fuzzy Vault”, Proceedings of the 16th International Conference on Hybrid Intelligent Systems (HIS 2016), Pages 507-516, Lecture Note in Computer Science, Nov 2016: https://link.springer.com/chapter/10.1007/978-3-319-52941-7_50
  • Hayet Brabra, Achraf MtibaaLayth SlimanWalid GaaloulBoualem BenatallahFaïez GargouriDetecting Cloud (Anti)Patterns: OCCI Perspective. Proceedings of the 14th International Conference on Service-Oriented Computing ICSO, Pages 202-218, Lecture Note in Computer Science 2016https://link.springer.com/book/10.1007/978-3-319-46295-0
  • Samih Souissi, Layth Sliman and Benoit Charroux. A Novel Security Architecture Based on Multi-level Rule Expression Language. Proceedings of the 16th International Conference on Hybrid Intelligent Systems (HIS 2016), Pages 259-269, Lecture Note in Computer Science, 2016: https://link.springer.com/book/10.1007/978-3-319-52941-7
  •  Hayet Brabra, Achraf Mtibaa, Layth Sliman, Walid Gaaloul, Boualem Benatallah, Faiez Gargouri. Semantic Web Technologies in Cloud Computing: A Systematic Literature Review. IEEE International Conference on Services Computing (IEEE SCC), Page(s):744 – 751, USA, 2016: https://ieeexplore.ieee.org/document/7557522
  • Saliha Arbataz, Layth Sliman, Karima Benatachba, Hachemi Nabil Dellys and Mouloud Koudil. Score Level Fusion Scheme in Hybrid Multibiometric System. International Visual Informatics Conference, IVIC 2015: Advances in Visual Informatics, pp 166-177, Lecture Notes in Computer Science (LNCS), 2016: https://link.springer.com/chapter/10.1007/978-3-319-25939-0_15
  • Hachemi Nabil Dellys, Noussaiba Benadjimi, Layth Sliman, Karima Benatchba, Saliha Artabaz, Mouloud Koudil, A Critical Comparison of Fingerprint Fuzzy Vault Techniques. Advances in Visual Informatics, Pages 178-188, Lecture Notes in Computer Science, 2015: https://link.springer.com/chapter/10.1007/978-3-319-25939-0_16
  • Hachemi Nabil Dellys, Noussaiba Benadjimi, Meriem Romaissa Boubakeur, Layth Sliman and Fathelalem Ali, Fingerprint Fuzzy Vault Chaff Point Generation by Squares Method. Proceedings of 7th International Conference on Soft Computing and Pattern Recognition, Pages 357-362, IEEE Kyushu, Japan,  2015. https://ieeexplore.ieee.org/document/7492773
  • Benoit CHARROUX, Layth Sliman, Yvan STRIOPPA, Compose: A Domain Specific Language foR Scientific Code Computation, in proceedings of IEEE CFIP-NOTERE’15, Pages 1-4, Paris,  2015: https://ieeexplore.ieee.org/abstract/document/7293496
  • Asama Kuder, Azizah Jaafar, Riza Sulaiman, Rahmita Wirza and Layth Sliman. Model of Bayesian Tangent Eye Shape for Eye Capture, in proceedings of IEEE Intelligent System Design and Application, ISDA14, Page(s):82 – 88, Okinawa, 2014. https://ieeexplore.ieee.org/document/7066277
  • Sahar Osman, Fathelalem Ali, Mohamed Musa and Layth Sliman. Towards an Effective E-Government Framework: Tasks and Instruments for Design and Evaluation of Public Sector Websites in proceedings of IEEE Intelligent System Design and Application, ISDA14, Pages 193-198, Okinawa, Japan, 2014: https://ieeexplore.ieee.org/document/7066286
  • Layth Sliman, Benoit CHARROUX and Yvan STROPPA, Distributed Framework for Big Data Processing: a Goal Driven Approach, Frontiers in Artificial Intelligence and Applications: Smart Digital Futures – Ebook, Volume 262,  Pages: 385 – 391- IOS Press, 2014: http://ebooks.iospress.nl/volumearticle/36329
  • Rony Kouyoumjian, Pascal Bou Nassar, Layth Sliman. A New Dynamic Bandwidth Management Method:  Towards an Optimum Bandwidth Utilization in Small Organization, IEEE International Conference on Computing Cybernetics and Intelligent Information Systems, 2013.
  • Safa Taieb, Layth Sliman, Benoit Charroux, Yvan STROPPA. Towards a Total Traceability of Research Collaboration: a New Distributed Research Oriented Version Control System, Proceedings of the International Arab Conference on Information Technology, ACIT’2013, 170, 183. http://acit2k.org/ACIT/2013Proceedings/170.pdf
  • Layth Sliman, Benoît Charroux, Yvan Stroppa (2013), a New Collaborative and Cloud Based Simulation as a Service Platform: Towards a Multidisciplinary Research Simulation Support, UKSIM, Cambridge, UK, 2013-IEEE. https://ieeexplore.ieee.org/document/6527488
  • Layth Sliman, Benoît Charroux, Yvan Stroppa (2012), RunMyCode: an Innovative Platform for Social Production and Evaluation of Scientific Research, In proceedings of Fourth International Conference on Computational Aspects of Social Networks, CASON 2012, 109-114, IEEE. https://ieeexplore.ieee.org/document/6412387
  • Layth Sliman, Youakim Badr, Frédérique Biennier, Zensho Nakao, (2009), Towards a Resource-Driven Modelling Paradigm in Collaborative and Service-Oriented Enterprises, (2009), In proceeding of 13th IFAC Symposium on Information Control problems in Manufacturing INCOM’09, Moscow, Russia,  Elsevier, p.1614-1619.
  • Layth Sliman, Youakim Badr, Nicolas Salatge, Frederique Bennier, Zensho Nakao, Single  Sign On Integration in a Distributed ESB, (2009), In proceedings of N2S’2009, First International Conference on Network and Service Security, Paris, France- IEEE.
  • Layth Sliman, Ahlem Zayati, Youakim Badr, Frédérique Biennier, Mohamed MOALLA, (2009), Interopérabilité et Définition des Services Industriels, In proceedings of CIGI’09, 8ème Congrès International de Génie Industriel,  2009, Bagnères de Bigorre, France.
  • Layth Sliman, Frédérique Biennier, Sylvie Servigne (2006), Urbanisation Conjoint de l’Entreprise et de son Système d’Information. In proceedings of IPI 2006 “Comprendre et piloter la mutation des systèmes de production”, pp. 169-180.
  • Alida Esper, Layth Sliman, Ahlem Zayati, Youakim Badr, Frédérique BIENNIER, Towards Secured and Interoperable Business Services, Enterprise Interoperability: New Challenges and Industrial Approaches, Pages 301-312, Springer, London, 2008.