Up a level |
This graph maps the connections between all the collaborators of {}'s publications listed on this page.
Each link represents a collaboration on the same publication. The thickness of the link represents the number of collaborations.
Use the mouse wheel or scroll gestures to zoom into the graph.
You can click on the nodes and links to highlight them and move the nodes by dragging them.
Hold down the "Ctrl" key or the "⌘" key while clicking on the nodes to open the list of this person's publications.
Boulahia Cuppens, N., Cuppens, F., Jajodia, S., Kalam, A. A. E., & Sans, T. (eds.) (2014). 29th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2014), Marrakech, Morocco. External link
Brunel, J., Cuppens, F., Boulahia Cuppens, N., Sans, T., & Bodeveix, J.-P. (2007, November). Security policy compliance with violation management [Paper]. ACM Workshop on Formal Methods in Security Engineering, Fairfax, Virginia. External link
Cuppens, F., Boulahia Cuppens, N., & Sans, T. (2007, September). XML-BB: A Model to Handle Relationships Protection in XML Documents [Paper]. 11th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2007), Vietri sul Mare, Italy. External link
Cuppens, F., Autrel, F., Bouzida, Y., García, J., Gombault, S., & Sans, T. (2006). Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Annales des télécommunications, 61(1-2), 197-217. External link
Cuppens, F., Boulahia Cuppens, N., & Sans, T. (2005, June). Nomad: A Security Model with Non Atomic Actions and Deadlines [Paper]. 18th IEEE Computer Security Foundations Workshop (CSFW 2005), Aix-en-Provence, France. External link
Cuppens, F., Boulahia Cuppens, N., & Sans, T. (2005, December). Protection of Relationships in XML Documents with the XML-BB Model [Paper]. 1st International Conference on Information Systems Security (ICISS 2005), Kolkata, India. External link
Cuppens, F., Boulahia Cuppens, N., Sans, T., & Miège, A. (2004, August). A Formal Approach to Specify and Deploy a Network Security Policy [Paper]. IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST 2004), Toulouse, France. External link
Cuppens, F., Gombault, S., & Sans, T. (2004, June). Selecting Appropriate Counter-Measures in an Intrusion Detection Framework [Paper]. 17th IEEE Computer Security Foundations Workshop (CSFW 2004), Pacific Grove, CA. External link
Sans, T., Cuppens, F., & Boulahia Cuppens, N. (2007). A Framework to Enforce Access Control, Usage Control and Obligations. Annales des télécommunications, 62(11-12), 1329-1352. External link
Sans, T., Cuppens, F., & Boulahia Cuppens, N. (2007, May). OPA: Onion Policy Administration Model - Another approach to manage rights in DRM [Paper]. IFIP TC-11 22nd International Information Security Conference on New Approaches for Security, Privacy and Trust in Complex Environments (SEC 2007), Sandton, South Africa. External link
Sans, T., Cuppens, F., & Boulahia Cuppens, N. (2006, May). A Flexible and Distributed Architecture to Enforce Dynamic Access Control [Paper]. IFIP TC-11 21st International Information Security Conference on Security and Privacy in Dynamic Environments (SEC 2006), Karlstad, Sweden. External link
Sans, T., Cuppens, F., & Boulahia Cuppens, N. (2006, December). FORM : A Federated Rights Expression Model for Open DRM Frameworks [Paper]. 11th Asian Computing Science Conference on Advances in Computer Science, Tokyo, Japan. External link