<  Retour au portail Polytechnique Montréal

Documents publiés en "2010"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Département | Sous-type de document | Aucun groupement
Nombre de documents: 20

Ajam, N., Boulahia Cuppens, N., & Cuppens, F. (septembre 2010). Privacy Administration in Distributed Service Infrastructure [Communication écrite]. 6th Iternational ICST Conference on Security and Privacy in Communication Networks (SecureComm 2010), Singapore. Lien externe

Azkia, H., Boulahia Cuppens, N., Cuppens, F., & Coatrieux, G. (août 2010). Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment [Communication écrite]. 6th International Conference on Information Assurance and Security, Atlanta, GA, USA. Lien externe

Ben-Ghorbel-Talbi, M., Cuppens, F., & Boulahia Cuppens, N. (octobre 2010). Negotiating and delegating obligations [Communication écrite]. International Conference on Management of Emergent Digital EcoSystems (MEDES 2010), Bangkok, Thailand. Lien externe

Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., & Bouhoula, A. (2010). A delegation model for extended RBAC. International Journal of Information Security, 9(3), 209-236. Lien externe

Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., & Bouhoula, A. (décembre 2007). Managing Delegation in Access Control Models [Communication écrite]. 15th International Conference on Advanced Computing and Communications (ADCOM 2007), Guwahati, Assam, India (7 pages). Lien externe

Debar, H., Kheir, N., Boulahia Cuppens, N., & Cuppens, F. (septembre 2010). Service Dependencies in Information Systems Security [Communication écrite]. 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010), St. Petersburg, Russia. Lien externe

Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (février 2010). From Contextual Permission to Dynamic Pre-obligation: An Integrated Approach [Communication écrite]. International Conference on Availability, Reliability and Security, Krakow, Poland. Lien externe

García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Preda, S. (septembre 2010). MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies [Communication écrite]. 5th International Workshop on Data Privacy Management (DPM 2010) and 3rd International Workshop on Autonomous and Spontaneous Security (SETOP 2010), Athens, Greece. Lien externe

García-Alfaro, J., Navarro-Arribas, G., Boulahia Cuppens, N., & Roudier, Y. (édit.) (2010). 4th International Workshop on Data Privacy Management (DPM 2010) and 2nd International Workshop on Autonomous Spontaneous Security (SETOP 2009), St. Malo, France. Lien externe

Kanoun, W., Boulahia Cuppens, N., Cuppens, F., & Dubus, S. (septembre 2010). Risk-Aware Framework for Activating and Deactivating Policy-Based Response [Communication écrite]. 4th International Conference on Network and System Security, Melbourne, VIC, Australia. Lien externe

Kanoun, W., Boulahia Cuppens, N., Cuppens, F., Dubus, S., & Martin, A. (août 2010). Intelligent response system to mitigate the success likelihood of ongoing attacks [Communication écrite]. 6th International Conference on Information Assurance and Security, Atlanta, GA, USA. Lien externe

Kheir, N., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (septembre 2010). Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment [Communication écrite]. 25th IFIP TC-11 International Information Security Conference on Security and Privacy – Silver Linings in the Cloud (SEC 2010), Brisbane, Australia. Lien externe

Kheir, N., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (septembre 2010). A Service Dependency Model for Cost-Sensitive Intrusion Response [Communication écrite]. 15th European Symposium on Research in Computer Security (ESORICS 2010), Athens, Greece. Lien externe

Oulmakhzoune, S., Boulahia Cuppens, N., Cuppens, F., & Morucci, S. (juin 2010). fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality [Communication écrite]. 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Rome, Italy. Lien externe

Oulmakhzoune, S., Boulahia Cuppens, N., Cuppens, F., & Morucci, S. (décembre 2010). Rewriting of SPARQL/Update Queries for Securing Data Access [Communication écrite]. 12th International Conference on Information and Communications Security (ICICS 2010), Barcelona, Spain. Lien externe

Pan, W., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (décembre 2010). Watermarking to Enforce Medical Image Access and Usage Control Policy [Communication écrite]. 6th International Conference on Signal-Image Technology and Internet Based Systems, Kuala Lumpur, Malaysia. Lien externe

Preda, S., Boulahia Cuppens, N., Cuppens, F., & Toutain, L. (février 2010). Architecture-Aware Adaptive Deployment of Contextual Security Policies [Communication écrite]. International Conference on Availability, Reliability and Security, Krakow, Poland. Lien externe

Preda, S., Boulahia Cuppens, N., Cuppens, F., García-Alfaro, J., & Toutain, L. (février 2010). Model-Driven Security Policy Deployment: Property Oriented Approach [Communication écrite]. 2nd International Symposium on Engineering Secure Software and Systems (ESSoS 2010), Pisa, Italy. Lien externe

Thomas, J. A., Boulahia Cuppens, N., & Cuppens, F. (octobre 2010). Expression and enforcement of confidentiality policy in active databases [Communication écrite]. International Conference on Management of Emergent Digital EcoSystems (MEDES 2010), Bangkok, Thailand. Lien externe

Tounsi, W., García-Alfaro, J., Boulahia Cuppens, N., & Cuppens, F. (mai 2010). Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks [Communication écrite]. 8th Annual Communication Networks and Services Research Conference, Montréal, Qc, Canada. Lien externe

Liste produite: Sat May 18 02:24:21 2024 EDT.