<  Retour au portail Polytechnique Montréal

Documents dont l'auteur est "Ayed, Samiha"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Date de publication | Sous-type de document | Aucun groupement
Aller à : A | D | I
Nombre de documents: 11

A

Ayed, S., Idrees, M. S., Boulahia Cuppens, N., & Cuppens, F. (2018). Achieving dynamicity in security policies enforcement using aspects. International Journal of Information Security, 17(1), 83-103. Lien externe

Ayed, S., Idrees, M. S., Boulahia Cuppens, N., & Cuppens, F. (juillet 2015). Dynamic deployment of access and usage control policies using aspects [Communication écrite]. International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), Paris, France (6 pages). Lien externe

Ayed, S., Idrees, M. S., Boulahia Cuppens, N., Cuppens, F., Pinto, M., & Fuentes, L. (décembre 2013). Security Aspects: A Framework for Enforcement of Security Policies Using AOP [Communication écrite]. International Conference on Signal-Image Technology & Internet-Based Systems, Kyoto, Japan. Lien externe

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (mars 2009). Deploying Security Policy in Intra and Inter Workflow Management Systems [Communication écrite]. International Conference on Availability, Reliability and Security, Fukuoka, Japan. Lien externe

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2008). Deploying Access and Flow Control in Distributed Workflows. Journal of Research and Practice in Information Technology, 40(4), 231-254. Non disponible

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (janvier 2008). Deploying Access Control in Distributed Workflow [Communication écrite]. 6th Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. Lien externe

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (mars 2008). Managing access and flow control requirements in distributed workflows [Communication écrite]. IEEE/ACS International Conference on Computer Systems and Applications, Doha, Qatar. Lien externe

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (décembre 2007). An Integrated Model for Access Control and Information Flow Requirements [Communication écrite]. 12th Asian Computing Science Conference on Advances in Computer Science (ASIAN 2007), Doha, Qatar. Lien externe

D

Douss, A. B. C., Ayed, S., Abassi, R., Boulahia Cuppens, N., & Fatmi, S. G. E. (août 2015). Trust Negotiation Based Approach to Enforce MANET Routing Security [Communication écrite]. 10th International Conference on Availability, Reliability and Security, Toulouse, France. Lien externe

I

Idrees, M. S., Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (août 2015). Dynamic Security Policies Enforcement and Adaptation Using Aspects [Communication écrite]. IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland. Lien externe

Idrees, M. S., Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (septembre 2014). Car2X Communication - Putting Security Negotiation into Practice [Communication écrite]. 80th IEEE Vehicular Technology Conference (VTC2014-Fall), Vancouver, BC, Canada (5 pages). Lien externe

Liste produite: Fri Dec 20 03:45:40 2024 EST.