Monter d'un niveau |
Ce graphique trace les liens entre tous les collaborateurs des publications de {} figurant sur cette page.
Chaque lien représente une collaboration sur la même publication. L'épaisseur du lien représente le nombre de collaborations.
Utilisez la molette de la souris ou les gestes de défilement pour zoomer à l'intérieur du graphique.
Vous pouvez cliquer sur les noeuds et les liens pour les mettre en surbrillance et déplacer les noeuds en les glissant.
Enfoncez la touche "Ctrl" ou la touche "⌘" en cliquant sur les noeuds pour ouvrir la liste des publications de cette personne.
Tounsi, W., Boulahia Cuppens, N., García-Alfaro, J., Chevalier, Y., & Cuppens, F. (2014). KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. Journal of Network and Computer Applications, 39, 152-166. Lien externe
García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., Perez, S. M., & Cabot, J. (2013). Management of stateful firewall misconfiguration. Computers & Security, 39, 64-85. Lien externe
Papagiannakopoulou, E. I., Koukovini, M. N., Lioudakis, G. V., García-Alfaro, J., Kaklamani, D. I., Venieris, I. S., Cuppens, F., & Boulahia Cuppens, N. (2013). A privacy-aware access control model for distributed network monitoring. Computers & Electrical Engineering, 39(7), 2263-2281. Lien externe
Hachana, S., Cuppens, F., Boulahia Cuppens, N., & García-Alfaro, J. (2013). Semantic analysis of role mining results and shadowed roles detection. Information Security Technical Report, 17(4), 131-147. Lien externe
Preda, S., Cuppens, F., Boulahia Cuppens, N., García-Alfaro, J., & Toutain, L. (2011). Dynamic deployment of context-aware access control policies for constrained security devices. Journal of Systems and Software, 84(7), 1144-1159. Lien externe
García-Alfaro, J., Boulahia Cuppens, N., & Cuppens, F. (2008). Complete analysis of configuration rules to guarantee reliable network security policies. International Journal of Information Security, 7(2), 103-122. Lien externe
Nicolescu, G., Tria, A., Fernandez, J. M., Marion, J.-Y., & García-Alfaro, J. (décembre 2020). Foundations and Practice of Security [Communication écrite]. 13th International Symposium on Foundations and Practice of Security (FPS 2020), Montréal, Québec. Lien externe
Cuppens, F., Boulahia Cuppens, N., & García-Alfaro, J. (janvier 2019). Misconfiguration management of network security components [Communication écrite]. 7th International Symposium on System and Information Security (SSI 2019), Sao Paulo, Brazil (9 pages). Lien externe
Segovia, M., Cavalli, A. R., Boulahia Cuppens, N., Rubio-Hernan, J., & García-Alfaro, J. (septembre 2019). Reflective Attenuation of Cyber-Physical Attacks [Communication écrite]. ESORICS International Workshops, Luxembourg City, Luxembourg. Lien externe
Segovia, M., Cavalli, A. R., Boulahia Cuppens, N., & García-Alfaro, J. (novembre 2018). A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper) [Communication écrite]. 11th International Symposium on Foundations and Practice of Security (FPS 2018), Montréal, Qc, Canada. Lien externe
Perez, S. M., García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Cabot, J. (mai 2015). Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems [Communication écrite]. 30th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2015), Hamburg, Germany. Lien externe
Tounsi, W., Justus, B., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (juin 2014). Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm [Communication écrite]. 8th IEEE International Conference on Software Security and Reliability-Companion, San Francisco, CA, USA. Lien externe
Tounsi, W., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (octobre 2013). Fine-grained privacy control for the RFID middleware of EPCglobal networks [Communication écrite]. 5th International Conference on Management of Emergent Digital EcoSystems (MEDES 2013), Luxembourg, Luxembourg. Lien externe
Papagiannakopoulou, E. I., Koukovini, M. N., Lioudakis, G. V., Dellas, N. L., García-Alfaro, J., Kaklamani, D. I., Venieris, I. S., Boulahia Cuppens, N., & Cuppens, F. (octobre 2013). Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model [Communication écrite]. 6th International Symposium on Foundations and Practice of Security (FPS 2013), La Rochelle, France. Lien externe
Perez, S. M., García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Cabot, J. (septembre 2013). Model-Driven Extraction and Analysis of Network Security Policies [Communication écrite]. 16th International Conference on Model-Driven Engineering Languages and Systems (MODELS 2013), Miami, FL, USA. Lien externe
Tounsi, W., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (octobre 2013). Privacy-enhanced filtering and collection middleware in EPCglobal networks [Communication écrite]. International Conference on Risks and Security of Internet and Systems (CRiSIS 2013), La Rochelle, France (8 pages). Lien externe
Perez, S. M., García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Cabot, J. (juillet 2013). Towards an Access-Control Metamodel for Web Content Management Systems [Communication écrite]. CWE 2013 International Workshops, Aalborg, Denmark. Lien externe
Cuppens, F., Boulahia Cuppens, N., García-Alfaro, J., Moataz, T., & Rimasson, X. (juin 2012). Handling Stateful Firewall Anomalies [Communication écrite]. 27th IFIP TC 11 Information Security and Privacy Conference on Information Security and Privacy Research (SEC 2012), Heraklion, Crete, Greece. Lien externe
Perez, S. M., Cabot, J., García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (octobre 2012). A model-driven approach for the extraction of network access-control policies [Communication écrite]. Workshop on Model-Driven Security, Innsbruck, Austria. Lien externe
Hachana, S., Cuppens, F., Boulahia Cuppens, N., & García-Alfaro, J. (août 2012). Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications [Communication écrite]. 7th International Conference on Availability, Reliability and Security, Prague, Czech Republic. Lien externe
Tounsi, W., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (mai 2011). Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress [Communication écrite]. 4th Canada-France MITACS Workshop on Foundations and Practice of Security (FPS 2011), Paris, France. Lien externe
García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Preda, S. (septembre 2010). MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies [Communication écrite]. 5th International Workshop on Data Privacy Management (DPM 2010) and 3rd International Workshop on Autonomous and Spontaneous Security (SETOP 2010), Athens, Greece. Lien externe
Preda, S., Boulahia Cuppens, N., Cuppens, F., García-Alfaro, J., & Toutain, L. (février 2010). Model-Driven Security Policy Deployment: Property Oriented Approach [Communication écrite]. 2nd International Symposium on Engineering Secure Software and Systems (ESSoS 2010), Pisa, Italy. Lien externe
Tounsi, W., García-Alfaro, J., Boulahia Cuppens, N., & Cuppens, F. (mai 2010). Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks [Communication écrite]. 8th Annual Communication Networks and Services Research Conference, Montréal, Qc, Canada. Lien externe
Preda, S., Boulahia Cuppens, N., Cuppens, F., García-Alfaro, J., & Toutain, L. (juillet 2009). Reliable Process for Security Policy Deployment [Communication écrite]. International Conference on Security and Cryptography, Barcelona, Spain (12 pages). Lien externe
Preda, S., Toutain, L., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (octobre 2009). A secured delegation of remote services on IPv6 home networks [Communication écrite]. 4th International Conference on Risks and Security of Internet and Systems (CRiSIS 2009), Toulouse, France. Lien externe
Preda, S., Cuppens, F., Boulahia Cuppens, N., García-Alfaro, J., Toutain, L., & Elrakaiby, Y. (mars 2009). Semantic context aware security policy deployment [Communication écrite]. 4th International Symposium on Information, Computer, and Communications Security (ASIACCS 2009), Sydney, Australia. Lien externe
García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (avril 2007). Aggregating and Deploying Network Access Control Policies [Communication écrite]. 2nd International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria. Lien externe
García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (mai 2007). Management of Exceptions on Access Control Policies [Communication écrite]. IFIP TC-11 22nd International Information Security Conference on New Approaches for Security, Privacy and Trust in Complex Environments (SEC 2007), Sandton, South Africa. Lien externe
García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (septembre 2006). Analysis of Policy Anomalies on Distributed Network Security Setups [Communication écrite]. 11th European Symposium on Research in Computer Security (ESORICS 2006), Hamburg, Germany. Lien externe
García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (septembre 2006). Towards Filtering and Alerting Rule Rewriting on Single-Component Policies [Communication écrite]. 25th International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2006), Gdansk, Poland. Lien externe
Mosbah, M., Sèdes, F., Tawbi, N., Ahmed, T., Boulahia Cuppens, N., & García-Alfaro, J. (édit.) (2024). Foundations and Practice of Security. Lien externe
Mosbah, M., Sèdes, F., Tawbi, N., Ahmed, T., Boulahia Cuppens, N., & García-Alfaro, J. (édit.) (2023). Foundations and Practice of Security. Lien externe
Katsikas, S. K., Cuppens, F., Boulahia Cuppens, N., Lambrinoudakis, C., Kalloniatis, C., Mylopoulos, J., Antón, A. I., Gritzalis, S., Pallas, F., Pohle, J., Sasse, M. A., Meng, W., Furnell, S., & García-Alfaro, J. (édit.) (2020). 2019 ESORICS International Workshops, Luxembourg City, Luxembourg. Lien externe
Boulahia Cuppens, N., Cuppens, F., Lanet, J.-L., Legay, A., & García-Alfaro, J. (édit.) (2018). 12th International Conference on Risks and Security of Internet and Systems (CRiSIS 2017), Dinard, France. Lien externe
Cuppens, F., Wang, L., Boulahia Cuppens, N., Tawbi, N., & García-Alfaro, J. (édit.) (2017). 9th International Symposium on Foundations and Practice of Security (FPS 2016), Québec City, QC, Canada. Lien externe
Cuppens, F., García-Alfaro, J., Zincir-Heywood, A. N., & Fong, P. W. L. (édit.) (2015). 7th International Symposium on Foundations and Practice of Security (FPS 2014), Montreal, QC, Canada. Lien externe
García-Alfaro, J., Lioudakis, G. V., Boulahia Cuppens, N., Foley, S. N., & Fitzgerald, W. M. (édit.) (2014). 8th International Workshop on Data Privacy Management (DPM 2013) and 6th International Workshop on Autonomous Spontaneous Security (SETOP 2013), Egham, UK. Lien externe
García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., Miri, A., & Tawbi, N. (édit.) (2013). 5th International Symposium on Foundations and Practice of Security (FPS 2012), Montreal, QC, Canada. Lien externe
Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (édit.) (2012). 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2012), Paris, France. Lien externe
García-Alfaro, J., Navarro-Arribas, G., Boulahia Cuppens, N., & Vimercati, S. D. C. (édit.) (2012). 6th International Workshop on Data Privacy Management (DPM 2011) and 4th International Workshop on Autonomous Spontaneus Security (SETOP 2011), Leuven, Belgium. Lien externe
García-Alfaro, J., Navarro-Arribas, G., Boulahia Cuppens, N., & Roudier, Y. (édit.) (2010). 4th International Workshop on Data Privacy Management (DPM 2010) and 2nd International Workshop on Autonomous Spontaneous Security (SETOP 2009), St. Malo, France. Lien externe