<  Retour au portail Polytechnique Montréal

Documents publiés en "2007"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Département | Sous-type de document | Aucun groupement
Aller à : A | B | C | D | G | H | K | M | S
Nombre de documents: 14

A

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (décembre 2007). An Integrated Model for Access Control and Information Flow Requirements [Communication écrite]. 12th Asian Computing Science Conference on Advances in Computer Science (ASIAN 2007), Doha, Qatar. Lien externe

B

Brunel, J., Cuppens, F., Boulahia Cuppens, N., Sans, T., & Bodeveix, J.-P. (novembre 2007). Security policy compliance with violation management [Communication écrite]. ACM Workshop on Formal Methods in Security Engineering, Fairfax, Virginia. Lien externe

C

Cuppens, F., Boulahia Cuppens, N., & Ghorbel, M. B. (2007). High Level Conflict Management Strategies in Advanced Access Control Models. Electronic Notes in Theoretical Computer Science, 186, 3-26. Lien externe

Cuppens, F., Boulahia Cuppens, N., & Sans, T. (septembre 2007). XML-BB: A Model to Handle Relationships Protection in XML Documents [Communication écrite]. 11th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2007), Vietri sul Mare, Italy. Lien externe

Cuppens, F., Boulahia Cuppens, N., Ramard, T., & Thomas, J. A. (décembre 2007). Misbehaviors Detection to Ensure Availability in OLSR [Communication écrite]. 3rd International Conference on Mobile Ad-Hoc and Sensor Networks (MSN 2007), Beijing, China. Lien externe

Cuppens, F., Debar, H., Boulanger, D., & Gabillon, A. (2007). Introduction Selection of articles from the SAR-SSI 2006. Annales des télécommunications, 62(11-12), 1327-1327. Lien externe

D

Debar, H., Thomas, Y., Cuppens, F., & Boulahia Cuppens, N. (2007). Enabling automated threat response through the use of a dynamic security policy. Journal of Computer Virology and Hacking Techniques, 3(3), 195-210. Lien externe

G

García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (avril 2007). Aggregating and Deploying Network Access Control Policies [Communication écrite]. 2nd International Conference on Availability, Reliability and Security (ARES 2007), Vienna, Austria. Lien externe

García-Alfaro, J., Cuppens, F., & Boulahia Cuppens, N. (mai 2007). Management of Exceptions on Access Control Policies [Communication écrite]. IFIP TC-11 22nd International Information Security Conference on New Approaches for Security, Privacy and Trust in Complex Environments (SEC 2007), Sandton, South Africa. Lien externe

H

Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (août 2007). Resource Classification Based Negotiation in Web Services [Communication écrite]. 3rd International Symposium on Information Assurance and Security, Manchester, UK. Lien externe

K

Kanoun, W., Boulahia Cuppens, N., Cuppens, F., & Autrel, F. (octobre 2007). Advanced Reaction Using Risk Assessment in Intrusion Detection Systems [Communication écrite]. 2nd International Workshop on Critical Information Infrastructures Security (CRITIS 2007), Málaga, Spain. Lien externe

M

Mallouli, W., Orset, J.-M., Cavalli, A. R., Boulahia Cuppens, N., & Cuppens, F. (juin 2007). A formal approach for testing security rules [Communication écrite]. 12th ACM Symposium on Access control models and technologies (SACMAT 2007), Sophia, Antipolis, France. Lien externe

S

Sans, T., Cuppens, F., & Boulahia Cuppens, N. (2007). A Framework to Enforce Access Control, Usage Control and Obligations. Annales des télécommunications, 62(11-12), 1329-1352. Lien externe

Sans, T., Cuppens, F., & Boulahia Cuppens, N. (mai 2007). OPA: Onion Policy Administration Model - Another approach to manage rights in DRM [Communication écrite]. IFIP TC-11 22nd International Information Security Conference on New Approaches for Security, Privacy and Trust in Complex Environments (SEC 2007), Sandton, South Africa. Lien externe

Liste produite: Thu May 2 01:51:12 2024 EDT.