<  Retour au portail Polytechnique Montréal

Documents publiés en "2009"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Département | Sous-type de document | Aucun groupement
Aller à : A | B | E | H | K | P | T
Nombre de documents: 15

A

Ajam, N., Boulahia Cuppens, N., & Cuppens, F. (septembre 2009). Contextual Privacy Management in Extended Role Based Access Control Model [Communication écrite]. 4th International Workshop on Data Privacy Management (DPM 2009) and 2nd International on Autonomous and Spontaneous Security (SETOP 2009), St. Malo, France. Lien externe

Autrel, F., Boulahia Cuppens, N., & Cuppens, F. (juillet 2009). Reaction Policy Model Based on Dynamic Organizations and Threat Context [Communication écrite]. 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Montréal, Qc, Canada. Lien externe

Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (mars 2009). Deploying Security Policy in Intra and Inter Workflow Management Systems [Communication écrite]. International Conference on Availability, Reliability and Security, Fukuoka, Japan. Lien externe

B

Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., & Bouhoula, A. (septembre 2009). An Extended Role-Based Access Control Model for Delegating Obligations [Communication écrite]. 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2009), Linz, Austria. Lien externe

Boulahia Cuppens, N., Cuppens, F., Autrel, F., & Debar, H. (2009). An ontology-based approach to react to network attacks. International Journal of Information and Computer Security, 3(3/4), 280-305. Lien externe

E

Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (juillet 2009). Formalization and Management of Group Obligations [Communication écrite]. IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK. Lien externe

Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (novembre 2009). From state-based to event-based contextual security policies [Communication écrite]. 4th International Conference on Digital Information Management, Ann Arbor, MI, USA. Lien externe

H

Haidar, D. A., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (2009). XeNA: an access negotiation framework using XACML. Annales des télécommunications, 64(1-2), 155-169. Lien externe

K

Kanoun, W., Boulahia Cuppens, N., Cuppens, F., Dubus, S., & Martin, A. (août 2009). Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems [Communication écrite]. International Conference on Computational Science and Engineering, Vancouver, BC, Canada. Lien externe

Kheir, N., Debar, H., Cuppens, F., Boulahia Cuppens, N., & Viinikka, J. (juillet 2009). A Service Dependency Modeling Framework for Policy-Based Response Enforcement [Communication écrite]. 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2009), Como, Italy. Lien externe

P

Pan, W., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (septembre 2009). Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking [Communication écrite]. 4th International Workshop on Data Privacy Management (DPM 2009) and 2nd International Workshop on Autonomous and Spontaneous Security, St. Malo, France. Lien externe

Preda, S., Boulahia Cuppens, N., Cuppens, F., García-Alfaro, J., & Toutain, L. (juillet 2009). Reliable Process for Security Policy Deployment [Communication écrite]. International Conference on Security and Cryptography, Barcelona, Spain (12 pages). Lien externe

Preda, S., Cuppens, F., Boulahia Cuppens, N., García-Alfaro, J., Toutain, L., & Elrakaiby, Y. (mars 2009). Semantic context aware security policy deployment [Communication écrite]. 4th International Symposium on Information, Computer, and Communications Security (ASIACCS 2009), Sydney, Australia. Lien externe

Preda, S., Toutain, L., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (octobre 2009). A secured delegation of remote services on IPv6 home networks [Communication écrite]. 4th International Conference on Risks and Security of Internet and Systems (CRiSIS 2009), Toulouse, France. Lien externe

T

Thomas, J. A., Boulahia Cuppens, N., & Cuppens, F. (novembre 2009). Modeling and Controlling Downgrading Operations in Information Systems [Communication écrite]. 5th International Conference on Signal Image Technology and Internet Based Systems, Marrakesh, Morocco. Lien externe

Liste produite: Fri Dec 20 02:29:13 2024 EST.