<  Back to the Polytechnique Montréal portal

Items where Author is "Ayed, Samiha"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Jump to: A | D | I
Number of items: 11.

A

Ayed, S., Idrees, M. S., Boulahia Cuppens, N., & Cuppens, F. (2018). Achieving dynamicity in security policies enforcement using aspects. International Journal of Information Security, 17(1), 83-103. External link

Ayed, S., Idrees, M. S., Boulahia Cuppens, N., & Cuppens, F. (2015, July). Dynamic deployment of access and usage control policies using aspects [Paper]. International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), Paris, France (6 pages). External link

Ayed, S., Idrees, M. S., Boulahia Cuppens, N., Cuppens, F., Pinto, M., & Fuentes, L. (2013, December). Security Aspects: A Framework for Enforcement of Security Policies Using AOP [Paper]. International Conference on Signal-Image Technology & Internet-Based Systems, Kyoto, Japan. External link

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2009, March). Deploying Security Policy in Intra and Inter Workflow Management Systems [Paper]. International Conference on Availability, Reliability and Security, Fukuoka, Japan. External link

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2008). Deploying Access and Flow Control in Distributed Workflows. Journal of Research and Practice in Information Technology, 40(4), 231-254. Unavailable

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2008, January). Deploying Access Control in Distributed Workflow [Paper]. 6th Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. External link

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2008, March). Managing access and flow control requirements in distributed workflows [Paper]. IEEE/ACS International Conference on Computer Systems and Applications, Doha, Qatar. External link

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2007, December). An Integrated Model for Access Control and Information Flow Requirements [Paper]. 12th Asian Computing Science Conference on Advances in Computer Science (ASIAN 2007), Doha, Qatar. External link

D

Douss, A. B. C., Ayed, S., Abassi, R., Boulahia Cuppens, N., & Fatmi, S. G. E. (2015, August). Trust Negotiation Based Approach to Enforce MANET Routing Security [Paper]. 10th International Conference on Availability, Reliability and Security, Toulouse, France. External link

I

Idrees, M. S., Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2015, August). Dynamic Security Policies Enforcement and Adaptation Using Aspects [Paper]. IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland. External link

Idrees, M. S., Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2014, September). Car2X Communication - Putting Security Negotiation into Practice [Paper]. 80th IEEE Vehicular Technology Conference (VTC2014-Fall), Vancouver, BC, Canada (5 pages). External link

List generated on: Sun Apr 27 06:05:44 2025 EDT