<  Retour au portail Polytechnique Montréal

Documents dont l'auteur est "Ayed, Samiha"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Date de publication | Sous-type de document | Aucun groupement
Aller à : 2018 | 2015 | 2014 | 2013 | 2009 | 2008 | 2007
Nombre de documents: 11

2018

Ayed, S., Idrees, M. S., Boulahia Cuppens, N., & Cuppens, F. (2018). Achieving dynamicity in security policies enforcement using aspects. International Journal of Information Security, 17(1), 83-103. Lien externe

2015

Ayed, S., Idrees, M. S., Boulahia Cuppens, N., & Cuppens, F. (juillet 2015). Dynamic deployment of access and usage control policies using aspects [Communication écrite]. International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), Paris, France (6 pages). Lien externe

Idrees, M. S., Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (août 2015). Dynamic Security Policies Enforcement and Adaptation Using Aspects [Communication écrite]. IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland. Lien externe

Douss, A. B. C., Ayed, S., Abassi, R., Boulahia Cuppens, N., & Fatmi, S. G. E. (août 2015). Trust Negotiation Based Approach to Enforce MANET Routing Security [Communication écrite]. 10th International Conference on Availability, Reliability and Security, Toulouse, France. Lien externe

2014

Idrees, M. S., Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (septembre 2014). Car2X Communication - Putting Security Negotiation into Practice [Communication écrite]. 80th IEEE Vehicular Technology Conference (VTC2014-Fall), Vancouver, BC, Canada (5 pages). Lien externe

2013

Ayed, S., Idrees, M. S., Boulahia Cuppens, N., Cuppens, F., Pinto, M., & Fuentes, L. (décembre 2013). Security Aspects: A Framework for Enforcement of Security Policies Using AOP [Communication écrite]. International Conference on Signal-Image Technology & Internet-Based Systems, Kyoto, Japan. Lien externe

2009

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (mars 2009). Deploying Security Policy in Intra and Inter Workflow Management Systems [Communication écrite]. International Conference on Availability, Reliability and Security, Fukuoka, Japan. Lien externe

2008

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2008). Deploying Access and Flow Control in Distributed Workflows. Journal of Research and Practice in Information Technology, 40(4), 231-254. Non disponible

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (janvier 2008). Deploying Access Control in Distributed Workflow [Communication écrite]. 6th Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. Lien externe

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (mars 2008). Managing access and flow control requirements in distributed workflows [Communication écrite]. IEEE/ACS International Conference on Computer Systems and Applications, Doha, Qatar. Lien externe

2007

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (décembre 2007). An Integrated Model for Access Control and Information Flow Requirements [Communication écrite]. 12th Asian Computing Science Conference on Advances in Computer Science (ASIAN 2007), Doha, Qatar. Lien externe

Liste produite: Fri Dec 20 03:45:40 2024 EST.