<  Retour au portail Polytechnique Montréal

Documents dont l'auteur est "Debar, Hervé"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Date de publication | Sous-type de document | Aucun groupement
Aller à : 2010 | 2009 | 2008 | 2007 | 2006 | 2004
Nombre de documents: 15

2010

Kheir, N., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (septembre 2010). Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment [Communication écrite]. 25th IFIP TC-11 International Information Security Conference on Security and Privacy – Silver Linings in the Cloud (SEC 2010), Brisbane, Australia. Lien externe

Debar, H., Kheir, N., Boulahia Cuppens, N., & Cuppens, F. (septembre 2010). Service Dependencies in Information Systems Security [Communication écrite]. 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010), St. Petersburg, Russia. Lien externe

Kheir, N., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (septembre 2010). A Service Dependency Model for Cost-Sensitive Intrusion Response [Communication écrite]. 15th European Symposium on Research in Computer Security (ESORICS 2010), Athens, Greece. Lien externe

2009

Boulahia Cuppens, N., Cuppens, F., Autrel, F., & Debar, H. (2009). An ontology-based approach to react to network attacks. International Journal of Information and Computer Security, 3(3/4), 280-305. Lien externe

Kheir, N., Debar, H., Cuppens, F., Boulahia Cuppens, N., & Viinikka, J. (juillet 2009). A Service Dependency Modeling Framework for Policy-Based Response Enforcement [Communication écrite]. 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2009), Como, Italy. Lien externe

Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (2009). XeNA: an access negotiation framework using XACML. Annales des télécommunications, 64(1-2), 155-169. Lien externe

2008

Boulahia Cuppens, N., Cuppens, F., Haidar, D. A., & Debar, H. (septembre 2008). Negotiation of Prohibition: An Approach Based on Policy Rewriting [Communication écrite]. 23rd International Information Security Conference (SEC 2008), Milano, Italy. Lien externe

Boulahia Cuppens, N., Cuppens, F., Vergara, J. E. L. , Vázquez, E., Guerra, J., & Debar, H. (octobre 2008). An ontology-based approach to react to network attacks [Communication écrite]. 3rd International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia. Lien externe

2007

Debar, H., Thomas, Y., Cuppens, F., & Boulahia Cuppens, N. (2007). Enabling automated threat response through the use of a dynamic security policy. Journal of Computer Virology and Hacking Techniques, 3(3), 195-210. Lien externe

Cuppens, F., Debar, H., Boulanger, D., & Gabillon, A. (2007). Introduction Selection of articles from the SAR-SSI 2006. Annales des télécommunications, 62(11-12), 1327-1327. Lien externe

Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (août 2007). Resource Classification Based Negotiation in Web Services [Communication écrite]. 3rd International Symposium on Information Assurance and Security, Manchester, UK. Lien externe

2006

Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (novembre 2006). An extended RBAC profile of XACML [Communication écrite]. 3rd ACM Workshop on Secure Web Services, Alexandria, Virginia. Lien externe

Cuppens, F., Debar, H., & Bertino, E. (2006). Network and information systems security. Annales des télécommunications, 61(3-4), 242-244. Lien externe

Debar, H., Thomas, Y., Boulahia Cuppens, N., & Cuppens, F. (juillet 2006). Using Contextual Security Policies for Threat Response [Communication écrite]. 3rd International Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2006), Berlin, Germany. Lien externe

2004

Debar, H., Morin, B., Cuppens, F., Autrel, F., Mé, L., Vivinis, B., Benferhat, S., Ducassé, M., & Ortalo, R. (2004). Détection d'intrusions : corrélation d'alertes. Technique et Science Informatiques, 23(3), 359-390. Lien externe

Liste produite: Fri Dec 20 04:19:04 2024 EST.