Monter d'un niveau |
Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (décembre 2007). An Integrated Model for Access Control and Information Flow Requirements [Communication écrite]. 12th Asian Computing Science Conference on Advances in Computer Science (ASIAN 2007), Doha, Qatar. Lien externe
Brunel, J., Cuppens, F., Boulahia Cuppens, N., Sans, T., & Bodeveix, J.-P. (novembre 2007). Security policy compliance with violation management [Communication écrite]. ACM Workshop on Formal Methods in Security Engineering, Fairfax, Virginia. Lien externe
Cuppens, F., Boulahia Cuppens, N., & Ghorbel, M. B. (2007). High Level Conflict Management Strategies in Advanced Access Control Models. Electronic Notes in Theoretical Computer Science, 186, 3-26. Lien externe
Cuppens, F., Boulahia Cuppens, N., & Sans, T. (septembre 2007). XML-BB: A Model to Handle Relationships Protection in XML Documents [Communication écrite]. 11th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2007), Vietri sul Mare, Italy. Lien externe
Cuppens, F., Boulahia Cuppens, N., Ramard, T., & Thomas, J. A. (décembre 2007). Misbehaviors Detection to Ensure Availability in OLSR [Communication écrite]. 3rd International Conference on Mobile Ad-Hoc and Sensor Networks (MSN 2007), Beijing, China. Lien externe
Cuppens, F., Debar, H., Boulanger, D., & Gabillon, A. (2007). Introduction Selection of articles from the SAR-SSI 2006. Annales des télécommunications, 62(11-12), 1327-1327. Lien externe
Debar, H., Thomas, Y., Cuppens, F., & Boulahia Cuppens, N. (2007). Enabling automated threat response through the use of a dynamic security policy. Journal of Computer Virology and Hacking Techniques, 3(3), 195-210. Lien externe
García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (avril 2007). Aggregating and Deploying Network Access Control Policies [Communication écrite]. 2nd International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria. Lien externe
García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (mai 2007). Management of Exceptions on Access Control Policies [Communication écrite]. IFIP TC-11 22nd International Information Security Conference on New Approaches for Security, Privacy and Trust in Complex Environments (SEC 2007), Sandton, South Africa. Lien externe
Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (août 2007). Resource Classification Based Negotiation in Web Services [Communication écrite]. 3rd International Symposium on Information Assurance and Security, Manchester, UK. Lien externe
Kanoun, W., Boulahia Cuppens, N., Cuppens, F., & Autrel, F. (octobre 2007). Advanced Reaction Using Risk Assessment in Intrusion Detection Systems [Communication écrite]. 2nd International Workshop on Critical Information Infrastructures Security (CRITIS 2007), Málaga, Spain. Lien externe
Mallouli, W., Orset, J.-M., Cavalli, A. R., Boulahia Cuppens, N., & Cuppens, F. (juin 2007). A formal approach for testing security rules [Communication écrite]. 12th ACM Symposium on Access control models and technologies (SACMAT 2007), Sophia-Antipolis, France. Lien externe
Sans, T., Cuppens, F., & Boulahia Cuppens, N. (2007). A Framework to Enforce Access Control, Usage Control and Obligations. Annales des télécommunications, 62(11-12), 1329-1352. Lien externe
Sans, T., Cuppens, F., & Boulahia Cuppens, N. (mai 2007). OPA: Onion Policy Administration Model - Another approach to manage rights in DRM [Communication écrite]. IFIP TC-11 22nd International Information Security Conference on New Approaches for Security, Privacy and Trust in Complex Environments (SEC 2007), Sandton, South Africa. Lien externe