<  Retour au portail Polytechnique Montréal

Documents dont l'auteur est "Sans, Thierry"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Date de publication | Sous-type de document | Aucun groupement
Aller à : B | C | S
Nombre de documents: 12

B

Boulahia Cuppens, N., Cuppens, F., Jajodia, S., Kalam, A. A. E., & Sans, T. (édit.) (2014). 29th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2014), Marrakech, Morocco. Lien externe

Brunel, J., Cuppens, F., Boulahia Cuppens, N., Sans, T., & Bodeveix, J.-P. (novembre 2007). Security policy compliance with violation management [Communication écrite]. ACM Workshop on Formal Methods in Security Engineering, Fairfax, Virginia. Lien externe

C

Cuppens, F., Boulahia Cuppens, N., & Sans, T. (septembre 2007). XML-BB: A Model to Handle Relationships Protection in XML Documents [Communication écrite]. 11th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2007), Vietri sul Mare, Italy. Lien externe

Cuppens, F., Autrel, F., Bouzida, Y., García, J., Gombault, S., & Sans, T. (2006). Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Annales des télécommunications, 61(1-2), 197-217. Lien externe

Cuppens, F., Boulahia Cuppens, N., & Sans, T. (juin 2005). Nomad: A Security Model with Non Atomic Actions and Deadlines [Communication écrite]. 18th IEEE Computer Security Foundations Workshop (CSFW 2005), Aix-en-Provence, France. Lien externe

Cuppens, F., Boulahia Cuppens, N., & Sans, T. (décembre 2005). Protection of Relationships in XML Documents with the XML-BB Model [Communication écrite]. 1st International Conference on Information Systems Security (ICISS 2005), Kolkata, India. Lien externe

Cuppens, F., Boulahia Cuppens, N., Sans, T., & Miège, A. (août 2004). A Formal Approach to Specify and Deploy a Network Security Policy [Communication écrite]. IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST 2004), Toulouse, France. Lien externe

Cuppens, F., Gombault, S., & Sans, T. (juin 2004). Selecting Appropriate Counter-Measures in an Intrusion Detection Framework [Communication écrite]. 17th IEEE Computer Security Foundations Workshop (CSFW 2004), Pacific Grove, CA. Lien externe

S

Sans, T., Cuppens, F., & Boulahia Cuppens, N. (2007). A Framework to Enforce Access Control, Usage Control and Obligations. Annales des télécommunications, 62(11-12), 1329-1352. Lien externe

Sans, T., Cuppens, F., & Boulahia Cuppens, N. (mai 2007). OPA: Onion Policy Administration Model - Another approach to manage rights in DRM [Communication écrite]. IFIP TC-11 22nd International Information Security Conference on New Approaches for Security, Privacy and Trust in Complex Environments (SEC 2007), Sandton, South Africa. Lien externe

Sans, T., Cuppens, F., & Boulahia Cuppens, N. (mai 2006). A Flexible and Distributed Architecture to Enforce Dynamic Access Control [Communication écrite]. IFIP TC-11 21st International Information Security Conference on Security and Privacy in Dynamic Environments (SEC 2006), Karlstad, Sweden. Lien externe

Sans, T., Cuppens, F., & Boulahia Cuppens, N. (décembre 2006). FORM : A Federated Rights Expression Model for Open DRM Frameworks [Communication écrite]. 11th Asian Computing Science Conference on Advances in Computer Science, Tokyo, Japan. Lien externe

Liste produite: Thu Apr 18 04:44:18 2024 EDT.