<  Back to the Polytechnique Montréal portal

Items where Author is "Boulahia Cuppens, Nora"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Publication Date | Document subtype | No Grouping
Jump to: 2024 | 2023 | 2022 | 2021 | 2020 | 2019 | 2018 | 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 1994 | 1993
Number of items: 266.

2024

Crochelet, P., Neal, C., Boulahia Cuppens, N., Cuppens, F., & Proulx, A. (2023, December). Automated Attacker Behaviour Classification Using Threat Intelligence Insights [Paper]. 16th International Symposium on Foundations and Practice of Security (FPS 2023), Bordeaux, France. External link

Saint-Hilaire, K., Cuppens, F., Boulahia Cuppens, N., & Garcia-Alfaro, J. (2023, June). Automated enrichment of logical attack graphs via formal ontologies [Paper]. 38th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2023), Poznan, Poland. External link

Ragab, A., Mannan, M., & Youssef, A. (2023, September). ESORICS 2023 International Workshops [Paper]. European Symposium on Research in Computer Security (ESORICS 2023), The Hagues, The Netherlands. External link

Saint-Hilaire, K., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Hadji, M. (2024, July). Optimal automated generation of playbooks [Paper]. 38th annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2024), San Jose, CA, USA. External link

Wakrime, A. A., Navarro-Arribas, G., Cuppens, F., Boulahia Cuppens, N., & Benaini, R. (2024). Risks and Security of Internet and Systems. External link

Aurora, V., Neal, C., Proulx, A., Boulahia Cuppens, N., & Cuppens, F. (2023, December). Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection [Paper]. 16th International Symposium on Foundations and Practice of Security (FPS 2023), Bordeaux, France. External link

2023

Rousselot, A., Boulahia Cuppens, N., & Bouakkaz, S. (2023, July). AIS Authentication Using Certificateless Cryptography [Paper]. 20th International Conference on Security and Cryptography (SECRYPT 2023), Rome, Italie (13 pages). Available

Mosbah, M., Sèdes, F., Tawbi, N., Ahmed, T., Boulahia Cuppens, N., & García-Alfaro, J. (eds.) (2023). Foundations and Practice of Security. External link

Merzouk, M. A., Cuppens, F., Boulahia Cuppens, N., & Yaich, R. (2023, August). Parameterizing poisoning attacks in federated learning-based intrusion detection [Paper]. 18th International Conference on Availability, Reliability and Security (ARES 2023), Benevento, Italy (8 pages). External link

Charpentier, A., Neal, C., Boulahia Cuppens, N., Cuppens, F., & Yaich, R. (2023, August). Real-Time Defensive Strategy Selection via Deep Reinforcement Learning [Paper]. 18th International Conference on Availability, Reliability and Security (ARES 2023), Benevento, Italy (11 pages). External link

Kallel, S., Jmaiel, M., Zulkernine, M., Hadj Kacem, A., Cuppens, F., & Boulahia Cuppens, N. (eds.) (2023). Risks and Security of Internet and Systems : 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers. External link

Miloudi, A., Suarez, L., Boulahia Cuppens, N., Cuppens, F., & Preda, S. (2023, June). Trust Management Framework for Containerized Workloads Applications to 5G Networks [Paper]. Applied Cryptography and Network Security Workshops (ACNS 2023), Kyoto, Japan. External link

2022

Moussaileb, R., Boulahia Cuppens, N., Lanet, J.-L., & Bouder, H. L. (2022). A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms: Case Closed? ACM Computing Surveys, 54(6), 1-36. External link

Crochelet, P., Neal, C., Boulahia Cuppens, N., & Cuppens, F. (2022, December). Attacker Attribution via Characteristics Inference Using Honeypot Data [Paper]. 16th International Conference on Network and System Security (NSS 2022), Denarau Island, Fiji. External link

Katsikas, S. K., Lambrinoudakis, C., Boulahia Cuppens, N., Mylopoulos, J., Kalloniatis, C., Meng, W., Furnell, S., Pallas, F., Pohle, J., Sasse, M. A., Abie, H., Ranise, S., Verderame, L., Cambiaso, E., Vidal, J. M., & Sotelo Monge, M. A. (2022, October). Computer security [Paper]. International Workshops on Computer Security (CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP and CDT&SECOMANE), Darnstadt, Germany. External link

Charpentier, A., Boulahia Cuppens, N., Cuppens, F., & Yaich, R. (2022, August). Deep reinforcement learning-based defense strategy selection [Paper]. 17th International Conference on Availability, Reliability and Security (ARES 2022), Vienna, Austria (11 pages). External link

Merzouk, M. A., Delas, J., Neal, C., Cuppens, F., Boulahia Cuppens, N., & Yaich, R. (2022, August). Evading deep reinforcement learning-based network intrusion detection with adversarial attacks [Paper]. 17th International Conference on Availability, Reliability and Security (ARES 2022), Vienna, Austria (6 pages). External link

Merzouk, M. A., Cuppens, F., Boulahia Cuppens, N., & Yaich, R. (2022). Investigating the practicality of adversarial evasion attacks on network intrusion detection. External link

2021

Kallel, S., Cuppens, F., Boulahia Cuppens, N., Kacem, A. H., & Ben Othmane, L. (2021). Special issue on risk and security of smart systems. Journal of information security and applications, 61, 102925-102925. External link

Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Tasidou, A. (2021). Information theoretic-based privacy risk evaluation for data anonymization. Journal of Surveillance, Security and Safety, 2, 83-102. Available

Barbeau, M., Cuppens, F., Boulahia Cuppens, N., Dagnas, R., & Garcia-Alfaro, J. (2021). Resilience estimation of cyber-physical systems via quantitative metrics. IEEE Access, 9, 46462-46475. Available

Dernaika, F., Boulahia Cuppens, N., & Cuppens, F. (2022, July). A Posteriori Access Control with an Administrative Policy [Paper]. World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE), 2020, Las Vegas, USA. External link

Ansel, G., Pastor, D., Cuppens, F., & Boulahia Cuppens, N. (2021, April). Asymptotic Random Distortion Testing and Application to Change-in-Mean Detection [Paper]. 10th International Symposium on Signal, Image, Video and Communications (ISIVC 2020). External link

Merzouk, M. A., Cuppens, F., Boulahia Cuppens, N., & Yaich, R. (2020, November). A Deeper Analysis of Adversarial Examples in Intrusion Detection [Paper]. 15th International Conference on Risks and Security of Internet and Systems (CRISIS 2020), Paris, France. External link

Navas, R. E., Cuppens, F., Boulahia Cuppens, N., Toutain, L., & Papadopoulos, G. Z. (2021). MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT. IEEE Internet of Things Journal, 8(10), 7818-7832. External link

Navas, R. E., Cuppens, F., Boulahia Cuppens, N., Toutain, L., & Papadopoulos, G. Z. (2021). Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming. Computer Networks, 187, 14 pages. External link

Dernaika, F., Boulahia Cuppens, N., Cuppens, F., & Raynaud, O. (2020, November). A Posteriori Analysis of Policy Temporal Compliance [Paper]. 15th International Conference on Risks and Security of Internet and Systems (CRISIS 2020), Paris, France. External link

Luo, B., Mosbah, M., Cuppens, F., Ben Othmane, L., Boulahia Cuppens, N., & Kallel, S. (2021, November). Risks and Security of Internet and Systems [Paper]. 16th International Conference on Risks and Security of Internet and Systems (CRiSIS 2021). External link

2020

Clédel, T., Boulahia Cuppens, N., Cuppens, F., & Dagnas, R. (2020). Resilience properties and metrics: how far have we gone? Journal of Surveillance, Security and Safety, 1(2), 119-139. Available

Kallel, S., Cuppens, F., Boulahia Cuppens, N., & Kacem, A. H. (eds.) (2020). 14th International Conference on Risks and Security of Internet and Systems (CRiSIS 2019), Hammamet, Tunisia. External link

Katsikas, S. K., Cuppens, F., Boulahia Cuppens, N., Lambrinoudakis, C., Kalloniatis, C., Mylopoulos, J., Antón, A. I., Gritzalis, S., Pallas, F., Pohle, J., Sasse, M. A., Meng, W., Furnell, S., & García-Alfaro, J. (eds.) (2020). 2019 ESORICS International Workshops, Luxembourg City, Luxembourg. External link

Dernaika, F., Boulahia Cuppens, N., Cuppens, F., & Raynaud, O. (2020, September). Accountability in the a posteriori access control: A requirement and a mechanism [Paper]. 13th International Conference on the Quality of Information and Communications Technology (QUATIC 2020), Faro, Portugal. External link

Kabil, A., Duval, T., & Boulahia Cuppens, N. (2020, September). Alert Characterization by Non-expert Users in a Cybersecurity Virtual Environment: A Usability Study [Paper]. 7th International Conference on Augmented Reality, Virtual Reality, and Computer Graphics (AVR 2020), Lecce, Italy. External link

Barbeau, M., Cuppens, F., Boulahia Cuppens, N., Dagnas, R., & Garcia-Alfaro, J. (2020, December). Metrics to enhance the resilience of cyber-physical systems [Paper]. 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020), Guangzhou, China. External link

Smine, M., Espes, D., Boulahia Cuppens, N., & Cuppens, F. (2020, June). Network functions virtualization access control as a service [Paper]. 34th Annual IFIP WG11.3 Conference on Data and Applications Security and Privacy (DBSec 2020), Regensburg, Germany. External link

Smine, M., Espes, D., Cuppens, F., Boulahia Cuppens, N., & Pahl, M.-O. (2020, December). A priority-based domain type enforcement for exception management [Paper]. 13th International Symposium on Foundations and Practice Security (FPS 2020), Montréal, Québec. External link

Bkakria, A., Boulahia Cuppens, N., & Cuppens, F. (2020). Privacy-Preserving Pattern Matching on Encrypted Data. IACR Cryptol. ePrint Arch., 2020, 28 pages. External link

Bkakria, A., Boulahia Cuppens, N., & Cuppens, F. (2020, December). Privacy-Preserving Pattern Matching on Encrypted Data [Paper]. 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea. External link

Moussaileb, R., Navas, R. E., & Boulahia Cuppens, N. (2020). Watch out! Doxware on the way. Journal of Information Security and Applications, 55, 102668 (10 pages). External link

2019

Zemmari, A., Mosbah, M., Boulahia Cuppens, N., & Cuppens, F. (eds.) (2019). 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. External link

Katsikas, S. K., Cuppens, F., Boulahia Cuppens, N., Lambrinoudakis, C., Antón, A. I., Gritzalis, S., Mylopoulos, J., & Kalloniatis, C. (eds.) (2019). 2018 ESORICS International Workshops, Barcelona, Spain. External link

Es-Salhi, K., Espes, D., & Boulahia Cuppens, N. (2019, August). DTE Access Control Model for Integrated ICS Systems [Paper]. 14th International Conference on Availability, Reliability and Security (ARES 2019), Canterbury, CA, United Kingdom. External link

Clédel, T., Boulahia Cuppens, N., & Cuppens, F. (2019, August). Managing the Overestimation of Resilience [Paper]. 14th International Conference on Availability, Reliability and Security, Canterbury CA United Kingdom. External link

Cuppens, F., Boulahia Cuppens, N., & García-Alfaro, J. (2019, January). Misconfiguration management of network security components [Paper]. 7th International Symposium on System and Information Security (SSI 2019), Sao Paulo, Brazil (9 pages). External link

Moussaileb, R., Boulahia Cuppens, N., Lanet, J.-L., & Bouder, H. L. (2019, November). Ransomware Network Traffic Analysis for Pre-encryption Alert [Paper]. 12th International Symposium on Foundations and Practice of Security (FPS 2019), Toulouse, France. External link

Segovia, M., Cavalli, A. R., Boulahia Cuppens, N., Rubio-Hernan, J., & García-Alfaro, J. (2019, September). Reflective Attenuation of Cyber-Physical Attacks [Paper]. ESORICS International Workshops, Luxembourg City, Luxembourg. External link

Dernaika, F., Boulahia Cuppens, N., Cuppens, F., & Raynaud, O. (2019, August). Semantic Mediation for A Posteriori Log Analysis [Paper]. 14th International Conference on Availability, Reliability and Security (ARES 2019), Canterbury, CA, United Kingdom. External link

Moussaileb, R., Berti, C., Deboisdeffre, G., Boulahia Cuppens, N., & Lanet, J.-L. (2019, October). Watch Out! Doxware on the Way [Paper]. 14th International Conference on Risks and Security of Internet and Systems (CRiSIS 2019), Hammamet, Tunisia. External link

2018

Boulahia Cuppens, N., Cuppens, F., Lanet, J.-L., Legay, A., & García-Alfaro, J. (eds.) (2018). 12th International Conference on Risks and Security of Internet and Systems (CRiSIS 2017), Dinard, France. External link

Katsikas, S. K., Cuppens, F., Boulahia Cuppens, N., Lambrinoudakis, C., Kalloniatis, C., Mylopoulos, J., Antón, A. I., & Gritzalis, S. (eds.) (2018). 2017 ESORICS International Workshops, Oslo, Norway. External link

Kabil, A., Duval, T., Boulahia Cuppens, N., Comte, G. L., Halgand, Y., & Ponchel, C. (2018, October). 3D CyberCOP: A Collaborative Platform for Cybersecurity Data Analysis and Training [Paper]. 15th International Conference on Cooperative Design, Visualization, and Engineering (CDVE 2018), Hangzhou, China. External link

Fortino, G., Palau, C. E., Guerrieri, A., Boulahia Cuppens, N., Cuppens, F., Chaouchi, H., & Gabillon, A. (eds.) (2018). 3rd International Conference on Interoperability (InterIoT 2017) and 4th International Conference on Safety and Security in IoT (SaSelot 2017), Valencia, Spain. External link

Ayed, S., Idrees, M. S., Boulahia Cuppens, N., & Cuppens, F. (2018). Achieving dynamicity in security policies enforcement using aspects. International Journal of Information Security, 17(1), 83-103. External link

Kome, I. M. L., Boulahia Cuppens, N., Cuppens, F., & Frey, V. (2018, October). A Certificate-Less Key Exchange Protocol for IoT [Paper]. 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. External link

Kome, M. L., Cuppens, F., Boulahia Cuppens, N., & Frey, V. (2018, October). CoAP Enhancement for a Better IoT Centric Protocol: CoAP 2.0 [Paper]. 5th International Conference on Internet of Things: Systems, Management and Security, Valencia, Spain. External link

Navas, R. E., Bouder, H. L., Boulahia Cuppens, N., Cuppens, F., & Papadopoulos, G. Z. (2018, September). Demo: Do Not Trust Your Neighbors! A Small IoT Platform Illustrating a Man-in-the-Middle Attack [Paper]. 17th International Conference on Ad-Hoc Networks and Wireless (AdHoc-Now 2018), Saint-Malo, France. External link

Graa, M., Kome, I. M. L., Boulahia Cuppens, N., Cuppens, F., & Frey, V. (2018, September). Detection and Response to Data Exfiltration from Internet of Things Android Devices [Paper]. 33rd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2018), Poznan, Poland. External link

Smine, M., Boulahia Cuppens, N., & Cuppens, F. (2018, October). Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense [Paper]. 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. External link

Kabil, A., Duval, T., Boulahia Cuppens, N., Comte, G. L., Halgand, Y., & Ponchel, C. (2018, December). From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform [Paper]. 14th International Conference on Information Systems Security (ICISS 2018), Bangalore, India. External link

Bkakria, A., Boulahia Cuppens, N., & Cuppens, F. (2018, October). Linking Differential Identifiability with Differential Privacy [Paper]. 20th International Conference on Information and Communications Security (ICICS 2018), Lille, France. External link

Bkakria, A., Tasidou, A., Boulahia Cuppens, N., Cuppens, F., Bouattour, F., & Fredj, F. B. (2018, October). Optimal Distribution of Privacy Budget in Differential Privacy [Paper]. 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. External link

Bayou, L., Espes, D., Boulahia Cuppens, N., & Cuppens, F. (2018, October). A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems [Paper]. 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. External link

Bourget, E., Cuppens, F., Boulahia Cuppens, N., Dubus, S., Foley, S. N., & Laarouchi, Y. (2018, July). Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes [Paper]. 32nd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2018), Bergamo, Italy. External link

Moussaileb, R., Bouget, B., Palisse, A., Bouder, H. L., Boulahia Cuppens, N., & Lanet, J.-L. (2018, August). Ransomware's Early Mitigation Mechanisms [Paper]. 13th International Conference on Availability, Reliability and Security, Hamburg Germany. External link

Es-Salhi, K., Espes, D., & Boulahia Cuppens, N. (2018, October). RIICS: Risk Based IICS Segmentation Method [Paper]. 13th International Conference on Risks and Security of Internet and Systems (CRiSIS 2018), Arcachon, France. External link

Es-Salhi, K., Espes, D., & Boulahia Cuppens, N. (2018, December). SONICS: A Segmentation Method for Integrated ICS and Corporate System [Paper]. 14th International Conference on Information Systems Security (ICISS 2018), Bangalore, India. External link

Cuppens, F., & Boulahia Cuppens, N. (2018). Stratification Based Model for Security Policy with Exceptions and Contraries to Duty. In From Database to Cyber Security : Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday (Vol. 11170, pp. 78-103). External link

Segovia, M., Cavalli, A. R., Boulahia Cuppens, N., & García-Alfaro, J. (2018, November). A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper) [Paper]. 11th International Symposium on Foundations and Practice of Security (FPS 2018), Montréal, Qc, Canada. External link

Moataz, T., Ray, I., Ray, I., Shikfa, A., Cuppens, F., & Boulahia Cuppens, N. (2018). Substring search over encrypted data. Journal of Computer Security, 26(1), 1-30. External link

Bouder, H. L., Thomas, G., Bourget, E., Graa, M., Boulahia Cuppens, N., & Lanet, J.-L. (2018, July). Theoretical Security Evaluation of the Human Semantic Authentication Protocol [Paper]. 15th International Joint Conference on e-Business and Telecommunications, Porto, Portugal. External link

Clédel, T., Foley, S. N., Boulahia Cuppens, N., Cuppens, F., Kermarrec, Y., Dubois, F., Laarouchi, Y., & Comte, G. L. (2018, October). Towards the Evaluation of End-to-End Resilience Through External Consistency [Paper]. 10th International Symposium on Cyberspace Safety and Security (CSS 2018), Amalfi, Italy. External link

Ji, X., Guernic, G. L., Boulahia Cuppens, N., & Cuppens, F. (2018, October). USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework [Paper]. 20th International Conference on Information and Communications Security (ICICS 2018), Lille, France. External link

2017

Cuppens, F., Boulahia Cuppens, N., Lanet, J.-L., & Legay, A. (eds.) (2017). 11th International Conference on Risks and Security of Internet and Systems (CRiSIS 2016), Roscoff, France. External link

Boulahia Cuppens, N., Lambrinoudakis, C., Cuppens, F., & Katsikas, S. K. (eds.) (2017). 2nd International WorkshopSecurity of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016), Heraklion, Crete, Greece. External link

Cuppens, F., Wang, L., Boulahia Cuppens, N., Tawbi, N., & García-Alfaro, J. (eds.) (2017). 9th International Symposium on Foundations and Practice of Security (FPS 2016), Québec City, QC, Canada. External link

Graa, M., Boulahia Cuppens, N., Cuppens, F., Lanet, J.-L., & Moussaileb, R. (2017, May). Detection of Side Channel Attacks Based on Data Tainting in Android Systems [Paper]. 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2017), Rome, Italy. External link

Kome, M. L., Graa, M., Boulahia Cuppens, N., Cuppens, F., & Frey, V. (2017, December). DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT [Paper]. 13th International Conference on Information Systems Security (ICISS 2017), Mumbai, India. External link

Yaich, R., Boulahia Cuppens, N., & Cuppens, F. (2017, August). Enabling Trust Assessment in Clouds-of-Clouds: A Similarity-Based Approach [Paper]. 12th International Conference on Availability, Reliability and Security (ARES 2017), Reggio, Calabria, Italy. External link

Bkakria, A., Graa, M., Boulahia Cuppens, N., Cuppens, F., & Lanet, J.-L. (2017, December). Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems [Paper]. 13th International Conference on Information Systems Security (ICISS 2017), Mumbai, India. External link

Boulahia Cuppens, N., Zerkane, S., Li, Y., Espes, D., Parc, P. L., & Cuppens, F. (2017, July). Firewall Policies Provisioning Through SDN in the Cloud [Paper]. 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2017), Philadelphia, PA, USA. External link

Es-Salhi, K., Espes, D., & Boulahia Cuppens, N. (2017, August). A New Segmentation Method for Integrated ICS (Short Paper) [Paper]. 15th Annual Conference on Privacy, Security and Trust (PST 2017), Calgary, AB, Canada. External link

Bkakria, A., Graa, M., Boulahia Cuppens, N., Cuppens, F., & Lanet, J.-L. (2017, August). Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper) [Paper]. 15th annual Conference on Privacy, Security and Trust (PST 2017), Calgary, AB, Canada. External link

Bayou, L., Espes, D., Boulahia Cuppens, N., & Cuppens, F. (2017, December). wIDS: A Multilayer IDS for Wireless-Based SCADA Systems [Paper]. 13th International Conference on Information Systems Security (ICISS 2017), Mumbai, India. External link

Bayou, L., Espes, D., Boulahia Cuppens, N., & Cuppens, F. (2017, November). wirelessOrBAC: Towards an access-control-based IDS for Wireless Sensor Networks [Paper]. 7th International Conference on Communication and Network Security (ICCNS 2017), Tokyo, Japan. External link

2016

Bécue, A., Boulahia Cuppens, N., Cuppens, F., Katsikas, S. K., & Lambrinoudakis, C. (eds.) (2016). 1st International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems (CyberICS 2015) and 1st Workshop on the Security of Cyber Physical Systems (WOS-CPS 2015), Vienna, Austria. External link

Tounsi, W., Boulahia Cuppens, N., Cuppens, F., & Pujolle, G. (2016). Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform. World Wide Web, 19(1), 41-68. External link

Essaouini, N., Cuppens, F., & Boulahia Cuppens, N. (2016, December). Building a Fair System Using Access Rights [Paper]. 12th International Conference on Information Systems Security (ICISS 2016), Jaipur, India. External link

Li, Y., Boulahia Cuppens, N., Crom, J.-M., Cuppens, F., & Frey, V. (2016, May). Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud [Paper]. 31st IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2016), Ghent, Belgium. External link

Bouyahia, T., Boulahia Cuppens, N., Cuppens, F., & Autrel, F. (2016, October). Multi-Criteria Recommender Approach for Supporting Intrusion Response System [Paper]. 9th International Symposium on Foundations and Practice of Security (FPS 2016), Québec City, QC, Canada. External link

Bayou, L., Espes, D., Boulahia Cuppens, N., & Cuppens, F. (2016, October). Security Analysis of WirelessHART Communication Scheme [Paper]. 9th International Symposium on Foundations and Practice of Security (FPS 2016), Québec City, QC, Canada. External link

Essaouini, N., Oulmakhzoune, S., Boulahia Cuppens, N., & Cuppens, F. (2016, December). Toward an off-line analysis of obligation with deadline policies [Paper]. 14th Annual Conference on Privacy, Security and Trust (PST 2016), Auckland, New Zealand. External link

Bayou, L., Boulahia Cuppens, N., Espes, D., & Cuppens, F. (2016, August). Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks [Paper]. 11th International Conference on Availability, Reliability and Security (ARES 2016), Salzburg, Austria. External link

Hachana, S., Cuppens, F., & Boulahia Cuppens, N. (2016, December). Towards a new generation of industrial firewalls: Operational-process aware filtering [Paper]. 14th Annual Conference on Privacy, Security and Trust (PST 2016), Auckland, New Zealand. External link

Graa, M., Boulahia Cuppens, N., Cuppens, F., & Lanet, J.-L. (2016, February). Tracking Explicit and Control Flows in Java and Native Android Apps Code [Paper]. 2nd International Conference on Information Systems Security and Privacy (ICISS) 2016), Rome, Italy. External link

2015

Bouyahia, T., Autrel, F., Boulahia Cuppens, N., & Cuppens, F. (2015, July). Context Aware Intrusion Response Based on Argumentation Logic [Paper]. 10th International Conference on Risks and Security of Internet and Systems (CRiSIS 2015), Mytilene, Lesbos Island, Greece. External link

Franco-Contreras, J., Coatrieux, G., Massari, P., Darmoni, S. J., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2015). Data Quality Evaluation in Medical Database Watermarking. In Studies in Health Technology and Informatics (pp. 276-280). External link

Azkia, H., Boulahia Cuppens, N., Cuppens, F., Coatrieux, G., & Oulmakhzoune, S. (2015). Deployment of a posteriori access control using IHE ATNA. International Journal of Information Security, 14(5), 471-483. External link

Ayed, S., Idrees, M. S., Boulahia Cuppens, N., & Cuppens, F. (2015, July). Dynamic deployment of access and usage control policies using aspects [Paper]. International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), Paris, France (6 pages). External link

Idrees, M. S., Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2015, August). Dynamic Security Policies Enforcement and Adaptation Using Aspects [Paper]. IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland. External link

Hachana, S., Boulahia Cuppens, N., & Cuppens, F. (2015). Mining a high level access control policy in a network with multiple firewalls. Journal of Information Security and Applications, 20, 61-73. External link

Perez, S. M., García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Cabot, J. (2015, May). Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems [Paper]. 30th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2015), Hamburg, Germany. External link

Samarji, L. E., Boulahia Cuppens, N., Cuppens, F., Papillon, S., Kanoun, W., & Dubus, S. (2015, September). On the Fly Design and Co-simulation of Responses Against Simultaneous Attacks [Paper]. 20th European Symposium on Research in Computer Security (ESORICS 2015), Vienna, Austria. External link

Lazrig, I., Moataz, T., Ray, I., Ray, I., Ong, T., Kahn, M. G., Cuppens, F., & Boulahia Cuppens, N. (2015, July). Privacy Preserving Record Matching Using Automated Semi-trusted Broker [Paper]. 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2015), Fairfax, VA, USA. External link

Bayou, L., Espes, D., Boulahia Cuppens, N., & Cuppens, F. (2015, July). Security Issue of WirelessHART Based SCADA Systems [Paper]. 10th International Conference on Risks and Security of Internet and Systems (CRiSIS 2015), Mytilene, Lesbos Island, Greece. External link

Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Gross-Amblard, D. (2015, October). Security Mechanisms Planning to Enforce Security Policies [Paper]. 8th International Symposium on Foundations and Practice of Security (FPS 2015), Clermont-Ferrand, France. External link

Li, Y., Boulahia Cuppens, N., Crom, J.-M., Cuppens, F., Frey, V., & Ji, X. (2015, December). Similarity Measure for Security Policies in Service Provider Selection [Paper]. 11th International Conference on Information Systems Security (ICISS 2015), Kolkata, India. External link

Douss, A. B. C., Ayed, S., Abassi, R., Boulahia Cuppens, N., & Fatmi, S. G. E. (2015, August). Trust Negotiation Based Approach to Enforce MANET Routing Security [Paper]. 10th International Conference on Availability, Reliability and Security, Toulouse, France. External link

Bayou, L., Espes, D., Boulahia Cuppens, N., & Cuppens, F. (2015, September). WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks Simulator [Paper]. 1st International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems (CyberICS 2015) and 1st Workshop on the Security of Cyber Physical Systems (WOS-CPS 2015), Vienna, Austria. External link

2014

Boulahia Cuppens, N., Cuppens, F., Jajodia, S., Kalam, A. A. E., & Sans, T. (eds.) (2014). 29th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2014), Marrakech, Morocco. External link

García-Alfaro, J., Lioudakis, G. V., Boulahia Cuppens, N., Foley, S. N., & Fitzgerald, W. M. (eds.) (2014). 8th International Workshop on Data Privacy Management (DPM 2013) and 6th International Workshop on Autonomous Spontaneous Security (SETOP 2013), Egham, UK. External link

Franco-Contreras, J., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2014, October). Adapted Quantization Index Modulation for Database Watermarking [Paper]. 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), Taipei, Taiwan. External link

Idrees, M. S., Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2014, September). Car2X Communication - Putting Security Negotiation into Practice [Paper]. 80th IEEE Vehicular Technology Conference (VTC2014-Fall), Vancouver, BC, Canada (5 pages). External link

Essaouini, N., Cuppens, F., Boulahia Cuppens, N., & El Kalam, A. A. (2014). Conflict detection in obligation with deadline policies. EURASIP Journal on Information Security, 2014(1), 13-13. External link

Samarji, L. E., Boulahia Cuppens, N., Cuppens, F., Papillon, S., Kanoun, W., & Dubus, S. (2014, September). Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks [Paper]. 10th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2014), Beijing, China. External link

Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (2014, May). Détection de flux de contrôle illégaux dans les Smartphones [Paper]. INFORSID 2014, Lyon, France. External link

Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (2014, November). Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps [Paper]. 7th International Symposium on Foundations and Practice of Security (FPS 2014), Montréal, Qc, Canada. External link

Moataz, T., Boulahia Cuppens, N., Cuppens, F., Ray, I., & Ray, I. (2014, July). ELITE: zEro Links Identity managemenT systEm [Paper]. 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria. External link

Tounsi, W., Boulahia Cuppens, N., García-Alfaro, J., Chevalier, Y., & Cuppens, F. (2014). KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. Journal of Network and Computer Applications, 39, 152-166. External link

Azkia, H., Boulahia Cuppens, N., Cuppens, F., & Coatrieux, G. (2014). Log content extraction engine based on ontology for the purpose of a posteriori access control. International Journal of Knowledge and Learning, 9(1/2), 23-42. External link

Bouyahia, T., Idrees, M. S., Boulahia Cuppens, N., Cuppens, F., & Autrel, F. (2014, September). Metric for Security Activities Assisted by Argumentative Logic [Paper]. 9th International Workshop on Data Privacy Management (DPM 2014), 7th International Workshop on Autonomous and Spontaneous Security (SETOP 2014), 3rd International Workshop on Quantitative Aspects in Security Assurance (QASA 2014), Wroclaw, Poland. External link

Franco-Contreras, J., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2014, August). Ontology-guided distortion control for robust-lossless database watermarking: Application to inpatient hospital stay records [Paper]. 36th annual International Conference of the IEEE Engineering in Medicine and Biology Society, Chicago, IL, USA. External link

Schaad, A., Bkakria, A., Kerschbaum, F., Cuppens, F., Boulahia Cuppens, N., & Gross-Amblard, D. (2014, June). Optimized and controlled provisioning of encrypted outsourced data [Paper]. 19th ACM symposium on Access control models and technologies, London, Ontario, Canada. External link

Oulmakhzoune, S., Boulahia Cuppens, N., Cuppens, F., Morucci, S., Barhamgi, M., & Benslimane, D. (2014). Privacy query rewriting algorithm instrumented by a privacy-aware access control model. Annales des télécommunications, 69(1-2), 3-19. External link

Moataz, T., Justus, B., Ray, I., Boulahia Cuppens, N., Cuppens, F., & Ray, I. (2014, July). Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds [Paper]. 28th annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria. External link

Tounsi, W., Justus, B., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (2014, June). Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm [Paper]. 8th IEEE International Conference on Software Security and Reliability-Companion, San Francisco, CA, USA. External link

Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (2014, June). Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems [Paper]. 8th IEEE International Conference on Software Security and Reliability-Companion, San Francisco, CA, USA. External link

Li, Y., Boulahia Cuppens, N., Crom, J.-M., Cuppens, F., & Frey, V. (2014, September). Reaching Agreement in Security Policy Negotiation [Paper]. 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, China. External link

Franco-Contreras, J., Coatrieux, G., Cuppens, F., Boulahia Cuppens, N., & Roux, C. (2014). Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation. IEEE Transactions on Information Forensics and Security, 9(3), 397-410. External link

Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Gross-Amblard, D. (2014, July). Specification and Deployment of Integrated Security Policies for Outsourced Data [Paper]. 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria. External link

Essaouini, N., Cuppens, F., Boulahia Cuppens, N., & Kalam, A. A. E. (2014, July). Specifying and enforcing constraints in dynamic access control policies [Paper]. 12th Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada. External link

2013

García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., Miri, A., & Tawbi, N. (eds.) (2013). 5th International Symposium on Foundations and Practice of Security (FPS 2012), Montreal, QC, Canada. External link

Franco-Contreras, J., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2013, September). Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation [Paper]. 9th International Workshop on Security and Trust Management (STM 2013), Egham, UK. External link

Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Fernandez, J. M. (2013, March). Confidentiality-preserving query execution of fragmented outsourced data [Paper]. International Conference on Information and Communication Technology (ICT-EurAsia 2013), Yogyakarta, Indonesia. External link

Essaouini, N., Cuppens, F., Boulahia Cuppens, N., & Kalam, A. A. E. (2013, September). Conflict Management in Obligation with Deadline Policies [Paper]. International Conference on Availability, Reliability and Security, Regensburg, Germany. External link

Justus, B., Cuppens, F., Boulahia Cuppens, N., Bringer, J., Chabanne, H., & Cipiere, O. (2013, July). Define privacy-preserving setbase drawer size standard: A ∊-closeness perspective [Paper]. 1st Annual Conference on Privacy, Security and Trust, Tarragona, Spain. External link

Justus, B., Cuppens, F., Boulahia Cuppens, N., Bringer, J., Chabanne, H., & Cipiere, O. (2013, July). Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase [Paper]. 27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2013), Newark, NJ, USA. External link

Tounsi, W., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (2013, October). Fine-grained privacy control for the RFID middleware of EPCglobal networks [Paper]. 5th International Conference on Management of Emergent Digital EcoSystems (MEDES 2013), Luxembourg, Luxembourg. External link

Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (2013, December). Formal Characterization of Illegal Control Flow in Android System [Paper]. International Conference on Signal-Image Technology & Internet-Based Systems, Kyoto, Japan. External link

Cuppens, F., Boulahia Cuppens, N., & Elrakaiby, Y. (2013). Formal specification and management of security policies with collective group obligations. Journal of Computer Security, 21(1), 149-190. External link

Fourcot, F., Toutain, L., Köpsell, S., Cuppens, F., & Boulahia Cuppens, N. (2013, August). IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices [Paper]. 19th EUNICE/IFIP WG 6.6 International Workshop on Advances in Communication Networking, Chemnitz, Germany. External link

Papagiannakopoulou, E. I., Koukovini, M. N., Lioudakis, G. V., Dellas, N. L., García-Alfaro, J., Kaklamani, D. I., Venieris, I. S., Boulahia Cuppens, N., & Cuppens, F. (2013, October). Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model [Paper]. 6th International Symposium on Foundations and Practice of Security (FPS 2013), La Rochelle, France. External link

García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., Perez, S. M., & Cabot, J. (2013). Management of stateful firewall misconfiguration. Computers & Security, 39, 64-85. External link

Perez, S. M., García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Cabot, J. (2013, September). Model-Driven Extraction and Analysis of Network Security Policies [Paper]. 16th International Conference on Model-Driven Engineering Languages and Systems (MODELS 2013), Miami, FL, USA. External link

Benslimane, D., Barhamgi, M., Cuppens, F., Morvan, F., Defude, B., Nageba, E., Paulus, F., Morucci, S., Mrissa, M., Boulahia Cuppens, N., Ghedira, C., Mokadem, R., Oulmakhzoune, S., & Fayn, J. (2013). PAIRSE: a privacy-preserving service-oriented data integration system. ACM SIGMOD Record, 42(3), 42-47. External link

Hachana, S., Cuppens, F., Boulahia Cuppens, N., Atluri, V., & Morucci, S. (2013, December). Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management [Paper]. 9th International Conference on Information Systems Security (ICISS 2013), Kolkata, India. External link

Bkakria, A., Cuppens, F., Boulahia Cuppens, N., Fernandez, J. M., & Gross-Amblard, D. (2013). Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 4(2), 39-62. External link

Papagiannakopoulou, E. I., Koukovini, M. N., Lioudakis, G. V., García-Alfaro, J., Kaklamani, D. I., Venieris, I. S., Cuppens, F., & Boulahia Cuppens, N. (2013). A privacy-aware access control model for distributed network monitoring. Computers & Electrical Engineering, 39(7), 2263-2281. External link

Tounsi, W., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (2013, October). Privacy-enhanced filtering and collection middleware in EPCglobal networks [Paper]. International Conference on Risks and Security of Internet and Systems (CRiSIS 2013), La Rochelle, France (8 pages). External link

Barhamgi, M., Benslimane, D., Amghar, Y., Boulahia Cuppens, N., & Cuppens, F. (2013, March). PrivComp: a privacy-aware data service composition system [Paper]. 16th International Conference on Extending Database Technology (EDBT 2013), Genoa, Italy. External link

Coatrieux, G., Pan, W., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2013). Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting. IEEE Transactions on Information Forensics and Security, 8(1), 111-120. External link

Barhamgi, M., Benslimane, D., Oulmakhzoune, S., Boulahia Cuppens, N., Cuppens, F., Mrissa, M., & Taktak, H. (2013, June). Secure and Privacy-Preserving Execution Model for Data Services [Paper]. 25th International Conference on Advanced Information Systems Engineering (CAiSE 2013), Valencia, Spain. External link

Ayed, S., Idrees, M. S., Boulahia Cuppens, N., Cuppens, F., Pinto, M., & Fuentes, L. (2013, December). Security Aspects: A Framework for Enforcement of Security Policies Using AOP [Paper]. International Conference on Signal-Image Technology & Internet-Based Systems, Kyoto, Japan. External link

Hachana, S., Cuppens, F., Boulahia Cuppens, N., & García-Alfaro, J. (2013). Semantic analysis of role mining results and shadowed roles detection. Information Security Technical Report, 17(4), 131-147. External link

Moataz, T., Shikfa, A., Boulahia Cuppens, N., & Cuppens, F. (2013, May). Semantic search over encrypted data [Paper]. 20th International Conference on Telecommunications (ICT 2013), Casablanca, Morocco (5 pages). External link

Samarji, L., Cuppens, F., Boulahia Cuppens, N., Kanoun, W., & Dubus, S. (2013, November). Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks [Paper]. 5th International Symposium on Cyberspace Safety and Security (CSS 2013), Zhangjiajie, China. External link

Cuppens, F., Boulahia Cuppens, N., Ben-Ghorbel-Talbi, M., Morucci, S., & Essaouini, N. (2013). Smatch: Formal dynamic session management model for RBAC. Journal of Information Security and Applications, 18(1), 30-44. External link

Perez, S. M., García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Cabot, J. (2013, July). Towards an Access-Control Metamodel for Web Content Management Systems [Paper]. CWE 2013 International Workshops, Aalborg, Denmark. External link

2012

Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (eds.) (2012). 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2012), Paris, France. External link

García-Alfaro, J., Navarro-Arribas, G., Boulahia Cuppens, N., & Vimercati, S. D. C. (eds.) (2012). 6th International Workshop on Data Privacy Management (DPM 2011) and 4th International Workshop on Autonomous Spontaneus Security (SETOP 2011), Leuven, Belgium. External link

Cuppens, F., Boulahia Cuppens, N., & Viña, E. P. (2012, April). Adaptive Access Control Enforcement in Social Network Using Aspect Weaving [Paper]. 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012), South Korea. External link

Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (2012, December). Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses [Paper]. 4th International Symposium on Cyberspace Safety and Security (CSS 2012), Melbourne, Australia. External link

Autrel, F., Boulahia Cuppens, N., & Cuppens, F. (2012, October). Enabling Dynamic Security Policy in the Java Security Manager [Paper]. 5th International Symposium on Foundations and Practice of Security (FPS 2012), Montréal, Qc, Canada. External link

Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2012). Formal enforcement and management of obligation policies. Data & Knowledge Engineering, 71(1), 127-147. External link

Cuppens, F., Boulahia Cuppens, N., García-Alfaro, J., Moataz, T., & Rimasson, X. (2012, June). Handling Stateful Firewall Anomalies [Paper]. 27th IFIP TC 11 Information Security and Privacy Conference on Information Security and Privacy Research (SEC 2012), Heraklion, Crete, Greece. External link

Perez, S. M., Cabot, J., García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (2012, October). A model-driven approach for the extraction of network access-control policies [Paper]. Workshop on Model-Driven Security, Innsbruck, Austria. External link

Boulahia Cuppens, N. (2012). Penetration Tester's Open Source Toolkit. Computers & Security, 31(4), 630-632. External link

Oulmakhzoune, S., Boulahia Cuppens, N., Cuppens, F., & Morucci, S. (2012, August). Privacy Policy Preferences Enforced by SPARQL Query Rewriting [Paper]. 7th International Conference on Availability, Reliability and Security (ARES 2012), Prague, Czech Republic. External link

Franco-Contreras, J., Coatrieux, G., Chazard, E., Cuppens, F., Boulahia Cuppens, N., & Roux, C. (2012, August). Robust lossless watermarking based on circular interpretation of bijective transformations for the protection of medical databases [Paper]. Annual International Conference of the IEEE Engineering in Medicine and Biology Society, San Diego, CA, USA. External link

Hachana, S., Boulahia Cuppens, N., & Cuppens, F. (2012). Role Mining to Assist Authorization Governance: How Far Have We Gone? International Journal of Secure Software Engineering, 3(4), 45-64. External link

Kanoun, W., Samarji, L., Boulahia Cuppens, N., Dubus, S., & Cuppens, F. (2012, September). Towards a Temporal Response Taxonomy [Paper]. 7th International Workshop on Data Privacy Management (DPM 2012) and 5th International Workshop on Autonomous and Spontaneous Security (SETOP 2012), Pisa, Italy. External link

Hachana, S., Cuppens, F., Boulahia Cuppens, N., & García-Alfaro, J. (2012, August). Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications [Paper]. 7th International Conference on Availability, Reliability and Security, Prague, Czech Republic. External link

Kanoun, W., Dubus, S., Papillon, S., Boulahia Cuppens, N., & Cuppens, F. (2012). Towards Dynamic Risk Management: Success Likelihood of Ongoing Attacks. Bell Labs Technical Journal, 17(3), 61-78. External link

Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., & Morucci, S. (2012, September). Towards Session-Aware RBAC Delegation: Function Switch [Paper]. 7th International Workshop on Data Privacy Management (DPM 2012) and 5th International Workshop on Autonomous and Spontaneous Security (SETOP 2012), Pisa, Italy. External link

2011

Thomas, J. A., Cuppens, F., & Boulahia Cuppens, N. (2011, December). Consistency Policies for Dynamic Information Systems with Declassification Flows [Paper]. 7th International Conference on Information Systems Security (ICISS 2011), Kolkata, India. External link

Cuppens, F., & Boulahia Cuppens, N. (2011). Cover Story. In Encyclopedia of Cryptography and Security (pp. 264-265). External link

Thomas, J. A., Boulahia Cuppens, N., & Cuppens, F. (2011, August). Declassification Policy Management in Dynamic Information Systems [Paper]. 6th International Conference on Availability, Reliability and Security, Vienna, Austria. External link

Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., Le Métayer, D., & Piolle, G. (2011, June). Delegation of Obligations and Responsibility [Paper]. 26th IFIP TC 11 International Information Security Conference on Future Challenges in Security and Privacy for Academia and Industry, Lucerne, Switzerland. External link

Preda, S., Cuppens, F., Boulahia Cuppens, N., García-Alfaro, J., & Toutain, L. (2011). Dynamic deployment of context-aware access control policies for constrained security devices. Journal of Systems and Software, 84(7), 1144-1159. External link

Tounsi, W., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (2011, May). Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress [Paper]. 4th Canada-France MITACS Workshop on Foundations and Practice of Security (FPS 2011), Paris, France. External link

Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2011). An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations. International Journal of Mobile Computing and Multimedia Communications, 3(2), 33-51. External link

Cuppens, F., & Boulahia Cuppens, N. (2011). Multilevel Security Policies. In Encyclopedia of Cryptography and Security (pp. 811-812). External link

Ajam, N., Boulahia Cuppens, N., & Cuppens, F. (2011, May). Privacy Enforcement of Composed Services in Cellular Networks [Paper]. 11th Annual International Conference on New Technologies of Distributed Systems, Paris, France (8 pages). External link

Pan, W., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2011, August). Reversible watermarking based on invariant image classification and dynamical error histogram shifting [Paper]. Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Boston, MA, USA. External link

Boulahia Cuppens, N., Cuppens, F., & Nuadi, M. (2011, August). Smatch Model: Extending RBAC Sessions in Virtualization Environment [Paper]. 6th International Conference on Availability, Reliability and Security, Vienna, Austria. External link

Graa, M., Boulahia Cuppens, N., Autrel, F., Azkia, H., Cuppens, F., Coatrieux, G., Cavalli, A. R., & Mammar, A. (2011, September). Using Requirements Engineering in an Automatic Security Policy Derivation Process [Paper]. 6th International Workshop on Data Privacy Management (DPM 2011) and 4th International Workshop on Autonomous and Spontaneous Security (SETOP), Leuven, Belgium. External link

2010

García-Alfaro, J., Navarro-Arribas, G., Boulahia Cuppens, N., & Roudier, Y. (eds.) (2010). 4th International Workshop on Data Privacy Management (DPM 2010) and 2nd International Workshop on Autonomous Spontaneous Security (SETOP 2009), St. Malo, France. External link

Preda, S., Boulahia Cuppens, N., Cuppens, F., & Toutain, L. (2010, February). Architecture-Aware Adaptive Deployment of Contextual Security Policies [Paper]. International Conference on Availability, Reliability and Security, Krakow, Poland. External link

Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., & Bouhoula, A. (2010). A delegation model for extended RBAC. International Journal of Information Security, 9(3), 209-236. External link

Kheir, N., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (2010, September). Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment [Paper]. 25th IFIP TC-11 International Information Security Conference on Security and Privacy – Silver Linings in the Cloud (SEC 2010), Brisbane, Australia. External link

Thomas, J. A., Boulahia Cuppens, N., & Cuppens, F. (2010, October). Expression and enforcement of confidentiality policy in active databases [Paper]. International Conference on Management of Emergent Digital EcoSystems (MEDES 2010), Bangkok, Thailand. External link

Oulmakhzoune, S., Boulahia Cuppens, N., Cuppens, F., & Morucci, S. (2010, June). fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality [Paper]. 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Rome, Italy. External link

Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2010, February). From Contextual Permission to Dynamic Pre-obligation: An Integrated Approach [Paper]. International Conference on Availability, Reliability and Security, Krakow, Poland. External link

Kanoun, W., Boulahia Cuppens, N., Cuppens, F., Dubus, S., & Martin, A. (2010, August). Intelligent response system to mitigate the success likelihood of ongoing attacks [Paper]. 6th International Conference on Information Assurance and Security, Atlanta, GA, USA. External link

Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., & Bouhoula, A. (2007, December). Managing Delegation in Access Control Models [Paper]. 15th International Conference on Advanced Computing and Communications (ADCOM 2007), Guwahati, Assam, India (7 pages). External link

García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Preda, S. (2010, September). MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies [Paper]. 5th International Workshop on Data Privacy Management (DPM 2010) and 3rd International Workshop on Autonomous and Spontaneous Security (SETOP 2010), Athens, Greece. External link

Preda, S., Boulahia Cuppens, N., Cuppens, F., García-Alfaro, J., & Toutain, L. (2010, February). Model-Driven Security Policy Deployment: Property Oriented Approach [Paper]. 2nd International Symposium on Engineering Secure Software and Systems (ESSoS 2010), Pisa, Italy. External link

Ben-Ghorbel-Talbi, M., Cuppens, F., & Boulahia Cuppens, N. (2010, October). Negotiating and delegating obligations [Paper]. International Conference on Management of Emergent Digital EcoSystems (MEDES 2010), Bangkok, Thailand. External link

Ajam, N., Boulahia Cuppens, N., & Cuppens, F. (2010, September). Privacy Administration in Distributed Service Infrastructure [Paper]. 6th Iternational ICST Conference on Security and Privacy in Communication Networks (SecureComm 2010), Singapore. External link

Azkia, H., Boulahia Cuppens, N., Cuppens, F., & Coatrieux, G. (2010, August). Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment [Paper]. 6th International Conference on Information Assurance and Security, Atlanta, GA, USA. External link

Oulmakhzoune, S., Boulahia Cuppens, N., Cuppens, F., & Morucci, S. (2010, December). Rewriting of SPARQL/Update Queries for Securing Data Access [Paper]. 12th International Conference on Information and Communications Security (ICICS 2010), Barcelona, Spain. External link

Kanoun, W., Boulahia Cuppens, N., Cuppens, F., & Dubus, S. (2010, September). Risk-Aware Framework for Activating and Deactivating Policy-Based Response [Paper]. 4th International Conference on Network and System Security, Melbourne, VIC, Australia. External link

Tounsi, W., García-Alfaro, J., Boulahia Cuppens, N., & Cuppens, F. (2010, May). Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks [Paper]. 8th Annual Communication Networks and Services Research Conference, Montréal, Qc, Canada. External link

Debar, H., Kheir, N., Boulahia Cuppens, N., & Cuppens, F. (2010, September). Service Dependencies in Information Systems Security [Paper]. 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010), St. Petersburg, Russia. External link

Kheir, N., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (2010, September). A Service Dependency Model for Cost-Sensitive Intrusion Response [Paper]. 15th European Symposium on Research in Computer Security (ESORICS 2010), Athens, Greece. External link

Pan, W., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2010, December). Watermarking to Enforce Medical Image Access and Usage Control Policy [Paper]. 6th International Conference on Signal-Image Technology and Internet Based Systems, Kuala Lumpur, Malaysia. External link

2009

Ajam, N., Boulahia Cuppens, N., & Cuppens, F. (2009, September). Contextual Privacy Management in Extended Role Based Access Control Model [Paper]. 4th International Workshop on Data Privacy Management (DPM 2009) and 2nd International on Autonomous and Spontaneous Security (SETOP 2009), St. Malo, France. External link

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2009, March). Deploying Security Policy in Intra and Inter Workflow Management Systems [Paper]. International Conference on Availability, Reliability and Security, Fukuoka, Japan. External link

Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., & Bouhoula, A. (2009, September). An Extended Role-Based Access Control Model for Delegating Obligations [Paper]. 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2009), Linz, Austria. External link

Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2009, July). Formalization and Management of Group Obligations [Paper]. IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK. External link

Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2009, November). From state-based to event-based contextual security policies [Paper]. 4th International Conference on Digital Information Management, Ann Arbor, MI, USA. External link

Pan, W., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2009, September). Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking [Paper]. 4th International Workshop on Data Privacy Management (DPM 2009) and 2nd International Workshop on Autonomous and Spontaneous Security, St. Malo, France. External link

Thomas, J. A., Boulahia Cuppens, N., & Cuppens, F. (2009, November). Modeling and Controlling Downgrading Operations in Information Systems [Paper]. 5th International Conference on Signal Image Technology and Internet Based Systems, Marrakesh, Morocco. External link

Boulahia Cuppens, N., Cuppens, F., Autrel, F., & Debar, H. (2009). An ontology-based approach to react to network attacks. International Journal of Information and Computer Security, 3(3/4), 280-305. External link

Autrel, F., Boulahia Cuppens, N., & Cuppens, F. (2009, July). Reaction Policy Model Based on Dynamic Organizations and Threat Context [Paper]. 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Montréal, Qc, Canada. External link

Preda, S., Boulahia Cuppens, N., Cuppens, F., García-Alfaro, J., & Toutain, L. (2009, July). Reliable Process for Security Policy Deployment [Paper]. International Conference on Security and Cryptography, Barcelona, Spain (12 pages). External link

Preda, S., Toutain, L., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (2009, October). A secured delegation of remote services on IPv6 home networks [Paper]. 4th International Conference on Risks and Security of Internet and Systems (CRiSIS 2009), Toulouse, France. External link

Preda, S., Cuppens, F., Boulahia Cuppens, N., García-Alfaro, J., Toutain, L., & Elrakaiby, Y. (2009, March). Semantic context aware security policy deployment [Paper]. 4th International Symposium on Information, Computer, and Communications Security (ASIACCS 2009), Sydney, Australia. External link

Kheir, N., Debar, H., Cuppens, F., Boulahia Cuppens, N., & Viinikka, J. (2009, July). A Service Dependency Modeling Framework for Policy-Based Response Enforcement [Paper]. 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2009), Como, Italy. External link

Kanoun, W., Boulahia Cuppens, N., Cuppens, F., Dubus, S., & Martin, A. (2009, August). Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems [Paper]. International Conference on Computational Science and Engineering, Vancouver, BC, Canada. External link

Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (2009). XeNA: an access negotiation framework using XACML. Annales des télécommunications, 64(1-2), 155-169. External link

2008

Kanoun, W., Boulahia Cuppens, N., Cuppens, F., & Araujo, J. (2009, January). Automated reaction based on risk analysis and attackers skills in intrusion detection systems [Paper]. 3rd International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia. External link

García-Alfaro, J., Boulahia Cuppens, N., & Cuppens, F. (2008). Complete analysis of configuration rules to guarantee reliable network security policies. International Journal of Information Security, 7(2), 103-122. External link

Coma, C., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (2008, March). Context Ontology for Secure Interoperability [Paper]. 3rd International Conference on Availability, Reliability and Security, Barcelona, Spain. External link

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2008). Deploying Access and Flow Control in Distributed Workflows. Journal of Research and Practice in Information Technology, 40(4), 231-254. Unavailable

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2008, January). Deploying Access Control in Distributed Workflow [Paper]. 6th Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. External link

Le, C. T. P., Cuppens, F., Boulahia Cuppens, N., & Maillé, P. (2008, November). Evaluating the Trustworthiness of Contributors in a Collaborative Environment [Paper]. 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), Orlando, FL, USA. External link

Cuppens, F., Boulahia Cuppens, N., Bouzida, Y., Kanoun, W., & Croissant, A. (2008, November). Expression and Deployment of Reaction Policies [Paper]. IEEE International Conference on Signal Image Technology and Internet Based Systems, Bali, Indonesia. External link

Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2008, July). Interactivity for Reactive Access Control [Paper]. International Conference on Security and Cryptography (SECRYPT 2008), Porto, Portugal. External link

Coma, C., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (2008, November). Interoperability of Context Based System Policies Using O2O Contract [Paper]. IEEE International Conference on Signal Image Technology and Internet Based Systems, Bali, Indonesia. External link

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2008, March). Managing access and flow control requirements in distributed workflows [Paper]. IEEE/ACS International Conference on Computer Systems and Applications, Doha, Qatar. External link

Cuppens, F., & Boulahia Cuppens, N. (2008). Modeling contextual security policies. International Journal of Information Security, 7(4), 285-305. External link

Boulahia Cuppens, N., Cuppens, F., Haidar, D. A., & Debar, H. (2008, September). Negotiation of Prohibition: An Approach Based on Policy Rewriting [Paper]. 23rd International Information Security Conference (SEC 2008), Milano, Italy. External link

Boulahia Cuppens, N., Cuppens, F., Vergara, J. E. L. , Vázquez, E., Guerra, J., & Debar, H. (2008, October). An ontology-based approach to react to network attacks [Paper]. 3rd International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia. External link

Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., & Bouhoula, A. (2008, October). Revocation Schemes for Delegation Licences [Paper]. 10th International Conference on Information and Communications Security (ICICS 2008), Birmingham, UK. External link

Cuppens, F., Boulahia Cuppens, N., & Thomas, J. A. (2008, December). A Robust Reputation Scheme for Decentralized Group Management Systems [Paper]. 4th International Conference on Information Systems Security (ICISS 2008), Hyderabad, India. External link

Boulahia Cuppens, N., & Cuppens, F. (2008, July). Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic [Paper]. 9th International Conference on Deontic Logic in Computer Science (DEON 2008), Luxembourg, Luxembourg. External link

2007

Kanoun, W., Boulahia Cuppens, N., Cuppens, F., & Autrel, F. (2007, October). Advanced Reaction Using Risk Assessment in Intrusion Detection Systems [Paper]. 2nd International Workshop on Critical Information Infrastructures Security (CRITIS 2007), Málaga, Spain. External link

García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (2007, April). Aggregating and Deploying Network Access Control Policies [Paper]. 2nd International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria. External link

Debar, H., Thomas, Y., Cuppens, F., & Boulahia Cuppens, N. (2007). Enabling automated threat response through the use of a dynamic security policy. Journal of Computer Virology and Hacking Techniques, 3(3), 195-210. External link

Mallouli, W., Orset, J.-M., Cavalli, A. R., Boulahia Cuppens, N., & Cuppens, F. (2007, June). A formal approach for testing security rules [Paper]. 12th ACM Symposium on Access control models and technologies (SACMAT 2007), Sophia, Antipolis, France. External link

Sans, T., Cuppens, F., & Boulahia Cuppens, N. (2007). A Framework to Enforce Access Control, Usage Control and Obligations. Annales des télécommunications, 62(11-12), 1329-1352. External link

Cuppens, F., Boulahia Cuppens, N., & Ghorbel, M. B. (2007). High Level Conflict Management Strategies in Advanced Access Control Models. Electronic Notes in Theoretical Computer Science, 186, 3-26. External link

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2007, December). An Integrated Model for Access Control and Information Flow Requirements [Paper]. 12th Asian Computing Science Conference on Advances in Computer Science (ASIAN 2007), Doha, Qatar. External link

García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (2007, May). Management of Exceptions on Access Control Policies [Paper]. IFIP TC-11 22nd International Information Security Conference on New Approaches for Security, Privacy and Trust in Complex Environments (SEC 2007), Sandton, South Africa. External link

Cuppens, F., Boulahia Cuppens, N., Ramard, T., & Thomas, J. A. (2007, December). Misbehaviors Detection to Ensure Availability in OLSR [Paper]. 3rd International Conference on Mobile Ad-Hoc and Sensor Networks (MSN 2007), Beijing, China. External link

Sans, T., Cuppens, F., & Boulahia Cuppens, N. (2007, May). OPA: Onion Policy Administration Model - Another approach to manage rights in DRM [Paper]. IFIP TC-11 22nd International Information Security Conference on New Approaches for Security, Privacy and Trust in Complex Environments (SEC 2007), Sandton, South Africa. External link

Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (2007, August). Resource Classification Based Negotiation in Web Services [Paper]. 3rd International Symposium on Information Assurance and Security, Manchester, UK. External link

Brunel, J., Cuppens, F., Boulahia Cuppens, N., Sans, T., & Bodeveix, J.-P. (2007, November). Security policy compliance with violation management [Paper]. ACM Workshop on Formal Methods in Security Engineering, Fairfax, Virginia. External link

Cuppens, F., Boulahia Cuppens, N., & Sans, T. (2007, September). XML-BB: A Model to Handle Relationships Protection in XML Documents [Paper]. 11th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2007), Vietri sul Mare, Italy. External link

2006

García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (2006, September). Analysis of Policy Anomalies on Distributed Network Security Setups [Paper]. 11th European Symposium on Research in Computer Security (ESORICS 2006), Hamburg, Germany. External link

Cuppens, F., Boulahia Cuppens, N., & Ramard, T. (2006, April). Availability Enforcement by Obligations and Aspects Identification [Paper]. 1st International Conference on Availability, Reliability and Security (ARES 2006), Vienna, Austria. External link

Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (2006, November). An extended RBAC profile of XACML [Paper]. 3rd ACM Workshop on Secure Web Services, Alexandria, Virginia. External link

Sans, T., Cuppens, F., & Boulahia Cuppens, N. (2006, May). A Flexible and Distributed Architecture to Enforce Dynamic Access Control [Paper]. IFIP TC-11 21st International Information Security Conference on Security and Privacy in Dynamic Environments (SEC 2006), Karlstad, Sweden. External link

Sans, T., Cuppens, F., & Boulahia Cuppens, N. (2006, December). FORM : A Federated Rights Expression Model for Open DRM Frameworks [Paper]. 11th Asian Computing Science Conference on Advances in Computer Science, Tokyo, Japan. External link

Cuppens, F., Boulahia Cuppens, N., & Coma, C. (2006, December). O2O: Virtual Private Organizations to Manage Security Policy Interoperability [Paper]. 2nd International Conference on Information Systems Security (ICISS 2006), Kolkata, India. External link

García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (2006, September). Towards Filtering and Alerting Rule Rewriting on Single-Component Policies [Paper]. 25th International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2006), Gdansk, Poland. External link

Debar, H., Thomas, Y., Boulahia Cuppens, N., & Cuppens, F. (2006, July). Using Contextual Security Policies for Threat Response [Paper]. 3rd International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2006), Berlin, Germany. External link

2005

Cuppens, F., Boulahia Cuppens, N., & Sans, T. (2005, June). Nomad: A Security Model with Non Atomic Actions and Deadlines [Paper]. 18th IEEE Computer Security Foundations Workshop (CSFW 2005), Aix-en-Provence, France. External link

Cuppens, F., Boulahia Cuppens, N., & Sans, T. (2005, December). Protection of Relationships in XML Documents with the XML-BB Model [Paper]. 1st International Conference on Information Systems Security (ICISS 2005), Kolkata, India. External link

2004

Cuppens, F., Boulahia Cuppens, N., Sans, T., & Miège, A. (2004, August). A Formal Approach to Specify and Deploy a Network Security Policy [Paper]. IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST 2004), Toulouse, France. External link

1994

Boulahia Cuppens, N., & Cuppens, F. (1994, May). Asynchronous composition and required security conditions [Paper]. IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA. External link

Boulahia Cuppens, N., Cuppens, F., Gabillon, A., & Yazdanian, K. (1994, November). Decomposition of Multilevel Objects in an Object-Oriented Database [Paper]. 3rd European Symposium on Research in Computer Security (ESORICS 1994), Brighton, United Kingdom. External link

Bieber, P., & Boulahia Cuppens, N. (1994, January). Formal Development of Authentication Protocols [Paper]. 6th Refinement Workshop, London, UK. External link

1993

Bieber, P., Boulahia Cuppens, N., Lehmann, T., & van Wickeren, E. (1993, June). Abstract Machines for Communication Security [Paper]. 6th Computer Security Foundations Workshop, Franconia, NH, USA. External link

Boulahia Cuppens, N., Cuppens, F., Gabillon, A., & Yazdanian, K. (1993, September). Multilevel Security in Object-Oriented Databases [Paper]. Conference Workshop on Security for Object-Oriented Systems (OOPSLA-93), Washington, DC, USA. External link

Boulahia Cuppens, N., Cuppens, F., Gabillon, A., & Yazdanian, K. (1993, December). MultiView model for object-oriented database [Paper]. 9th Annual Computer Security Applications Conference, Orlando, FL, USA. External link

List generated on: Thu Sep 12 08:34:23 2024 EDT