![]() | Up a level |
Azkia, H., Boulahia Cuppens, N., Cuppens, F., Coatrieux, G., & Oulmakhzoune, S. (2015). Deployment of a posteriori access control using IHE ATNA. International Journal of Information Security, 14(5), 471-483. External link
Azkia, H., Boulahia Cuppens, N., Cuppens, F., & Coatrieux, G. (2014). Log content extraction engine based on ontology for the purpose of a posteriori access control. International Journal of Knowledge and Learning, 9(1/2), 23-42. External link
Azkia, H., Boulahia Cuppens, N., Cuppens, F., & Coatrieux, G. (2010, August). Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment [Paper]. 6th International Conference on Information Assurance and Security, Atlanta, GA, USA. External link
Graa, M., Boulahia Cuppens, N., Autrel, F., Azkia, H., Cuppens, F., Coatrieux, G., Cavalli, A. R., & Mammar, A. (2011, September). Using Requirements Engineering in an Automatic Security Policy Derivation Process [Paper]. 6th International Workshop on Data Privacy Management (DPM 2011) and 4th International Workshop on Autonomous and Spontaneous Security (SETOP), Leuven, Belgium. External link