Up a level |
This graph maps the connections between all the collaborators of {}'s publications listed on this page.
Each link represents a collaboration on the same publication. The thickness of the link represents the number of collaborations.
Use the mouse wheel or scroll gestures to zoom into the graph.
You can click on the nodes and links to highlight them and move the nodes by dragging them.
Hold down the "Ctrl" key or the "⌘" key while clicking on the nodes to open the list of this person's publications.
A word cloud is a visual representation of the most frequently used words in a text or a set of texts. The words appear in different sizes, with the size of each word being proportional to its frequency of occurrence in the text. The more frequently a word is used, the larger it appears in the word cloud. This technique allows for a quick visualization of the most important themes and concepts in a text.
In the context of this page, the word cloud was generated from the publications of the author {}. The words in this cloud come from the titles, abstracts, and keywords of the author's articles and research papers. By analyzing this word cloud, you can get an overview of the most recurring and significant topics and research areas in the author's work.
The word cloud is a useful tool for identifying trends and main themes in a corpus of texts, thus facilitating the understanding and analysis of content in a visual and intuitive way.
Cuppens, F., Boulahia Cuppens, N., & Elrakaiby, Y. (2013). Formal specification and management of security policies with collective group obligations. Journal of Computer Security, 21(1), 149-190. External link
Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2012). Formal enforcement and management of obligation policies. Data & Knowledge Engineering, 71(1), 127-147. External link
Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2011). An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations. International Journal of Mobile Computing and Multimedia Communications, 3(2), 33-51. External link
Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2010, February). From Contextual Permission to Dynamic Pre-obligation: An Integrated Approach [Paper]. International Conference on Availability, Reliability and Security, Krakow, Poland. External link
Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2009, July). Formalization and Management of Group Obligations [Paper]. IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK. External link
Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2009, November). From state-based to event-based contextual security policies [Paper]. 4th International Conference on Digital Information Management, Ann Arbor, MI, USA. External link
Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2008, July). Interactivity for Reactive Access Control [Paper]. International Conference on Security and Cryptography (SECRYPT 2008), Porto, Portugal. External link
Preda, S., Cuppens, F., Boulahia Cuppens, N., García-Alfaro, J., Toutain, L., & Elrakaiby, Y. (2009, March). Semantic context aware security policy deployment [Paper]. 4th International Symposium on Information, Computer, and Communications Security (ASIACCS 2009), Sydney, Australia. External link