<  Retour au portail Polytechnique Montréal

Documents publiés en "2008"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Département | Sous-type de document | Aucun groupement
Aller à : A | B | C | E | G | K | L
Nombre de documents: 16

A

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (2008). Deploying Access and Flow Control in Distributed Workflows. Journal of Research and Practice in Information Technology, 40(4), 231-254. Non disponible

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (janvier 2008). Deploying Access Control in Distributed Workflow [Communication écrite]. 6th Australasian Information Security Conference (AISC 2008), Wollongong, NSW, Australia. Lien externe

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (mars 2008). Managing access and flow control requirements in distributed workflows [Communication écrite]. IEEE/ACS International Conference on Computer Systems and Applications, Doha, Qatar. Lien externe

B

Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., & Bouhoula, A. (octobre 2008). Revocation Schemes for Delegation Licences [Communication écrite]. 10th International Conference on Information and Communications Security (ICICS 2008), Birmingham, UK. Lien externe

Boulahia Cuppens, N., & Cuppens, F. (juillet 2008). Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic [Communication écrite]. 9th International Conference on Deontic Logic in Computer Science (DEON 2008), Luxembourg, Luxembourg. Lien externe

Boulahia Cuppens, N., Cuppens, F., Haidar, D. A., & Debar, H. (septembre 2008). Negotiation of Prohibition: An Approach Based on Policy Rewriting [Communication écrite]. 23rd International Information Security Conference (SEC 2008), Milano, Italy. Lien externe

Boulahia Cuppens, N., Cuppens, F., Vergara, J. E. L. , Vázquez, E., Guerra, J., & Debar, H. (octobre 2008). An ontology-based approach to react to network attacks [Communication écrite]. 3rd International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia. Lien externe

C

Coma, C., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (mars 2008). Context Ontology for Secure Interoperability [Communication écrite]. 3rd International Conference on Availability, Reliability and Security, Barcelona, Spain. Lien externe

Coma, C., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (novembre 2008). Interoperability of Context Based System Policies Using O2O Contract [Communication écrite]. IEEE International Conference on Signal Image Technology and Internet Based Systems, Bali, Indonesia. Lien externe

Cuppens, F., & Boulahia Cuppens, N. (2008). Modeling contextual security policies. International Journal of Information Security, 7(4), 285-305. Lien externe

Cuppens, F., Boulahia Cuppens, N., & Thomas, J. A. (décembre 2008). A Robust Reputation Scheme for Decentralized Group Management Systems [Communication écrite]. 4th International Conference on Information Systems Security (ICISS 2008), Hyderabad, India. Lien externe

Cuppens, F., Boulahia Cuppens, N., Bouzida, Y., Kanoun, W., & Croissant, A. (novembre 2008). Expression and Deployment of Reaction Policies [Communication écrite]. IEEE International Conference on Signal Image Technology and Internet Based Systems, Bali, Indonesia. Lien externe

E

Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (juillet 2008). Interactivity for Reactive Access Control [Communication écrite]. International Conference on Security and Cryptography (SECRYPT 2008), Porto, Portugal. Lien externe

G

García-Alfaro, J., Boulahia Cuppens, N., & Cuppens, F. (2008). Complete analysis of configuration rules to guarantee reliable network security policies. International Journal of Information Security, 7(2), 103-122. Lien externe

K

Kanoun, W., Boulahia Cuppens, N., Cuppens, F., & Araujo, J. (janvier 2009). Automated reaction based on risk analysis and attackers skills in intrusion detection systems [Communication écrite]. 3rd International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia. Lien externe

L

Le, C. T. P., Cuppens, F., Boulahia Cuppens, N., & Maillé, P. (novembre 2008). Evaluating the Trustworthiness of Contributors in a Collaborative Environment [Communication écrite]. 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), Orlando, FL, USA. Lien externe

Liste produite: Wed May 8 02:27:47 2024 EDT.