<  Retour au portail Polytechnique Montréal

Documents publiés en "2010"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Département | Sous-type de document | Aucun groupement
Aller à : A | B | D | E | G | K | O | P | T
Nombre de documents: 19

A

Ajam, N., Boulahia Cuppens, N., & Cuppens, F. (septembre 2010). Privacy Administration in Distributed Service Infrastructure [Communication écrite]. 6th Iternational ICST Conference on Security and Privacy in Communication Networks (SecureComm 2010), Singapore. Lien externe

Azkia, H., Boulahia Cuppens, N., Cuppens, F., & Coatrieux, G. (août 2010). Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment [Communication écrite]. 6th International Conference on Information Assurance and Security, Atlanta, GA, USA. Lien externe

B

Ben-Ghorbel-Talbi, M., Cuppens, F., & Boulahia Cuppens, N. (octobre 2010). Negotiating and delegating obligations [Communication écrite]. International Conference on Management of Emergent Digital EcoSystems (MEDES 2010), Bangkok, Thailand. Lien externe

Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., & Bouhoula, A. (2010). A delegation model for extended RBAC. International Journal of Information Security, 9(3), 209-236. Lien externe

Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., & Bouhoula, A. (décembre 2007). Managing Delegation in Access Control Models [Communication écrite]. 15th International Conference on Advanced Computing and Communications (ADCOM 2007), Guwahati, Assam, India (7 pages). Lien externe

D

Debar, H., Kheir, N., Boulahia Cuppens, N., & Cuppens, F. (septembre 2010). Service Dependencies in Information Systems Security [Communication écrite]. 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2010), St. Petersburg, Russia. Lien externe

E

Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (février 2010). From Contextual Permission to Dynamic Pre-obligation: An Integrated Approach [Communication écrite]. International Conference on Availability, Reliability and Security, Krakow, Poland. Lien externe

G

García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Preda, S. (septembre 2010). MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies [Communication écrite]. 5th International Workshop on Data Privacy Management (DPM 2010) and 3rd International Workshop on Autonomous and Spontaneous Security (SETOP 2010), Athens, Greece. Lien externe

K

Kanoun, W., Boulahia Cuppens, N., Cuppens, F., & Dubus, S. (septembre 2010). Risk-Aware Framework for Activating and Deactivating Policy-Based Response [Communication écrite]. 4th International Conference on Network and System Security, Melbourne, VIC, Australia. Lien externe

Kanoun, W., Boulahia Cuppens, N., Cuppens, F., Dubus, S., & Martin, A. (août 2010). Intelligent response system to mitigate the success likelihood of ongoing attacks [Communication écrite]. 6th International Conference on Information Assurance and Security, Atlanta, GA, USA. Lien externe

Kheir, N., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (septembre 2010). Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment [Communication écrite]. 25th IFIP TC-11 International Information Security Conference on Security and Privacy – Silver Linings in the Cloud (SEC 2010), Brisbane, Australia. Lien externe

Kheir, N., Boulahia Cuppens, N., Cuppens, F., & Debar, H. (septembre 2010). A Service Dependency Model for Cost-Sensitive Intrusion Response [Communication écrite]. 15th European Symposium on Research in Computer Security (ESORICS 2010), Athens, Greece. Lien externe

O

Oulmakhzoune, S., Boulahia Cuppens, N., Cuppens, F., & Morucci, S. (juin 2010). fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality [Communication écrite]. 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Rome, Italy. Lien externe

Oulmakhzoune, S., Boulahia Cuppens, N., Cuppens, F., & Morucci, S. (décembre 2010). Rewriting of SPARQL/Update Queries for Securing Data Access [Communication écrite]. 12th International Conference on Information and Communications Security (ICICS 2010), Barcelona, Spain. Lien externe

P

Pan, W., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (décembre 2010). Watermarking to Enforce Medical Image Access and Usage Control Policy [Communication écrite]. 6th International Conference on Signal-Image Technology and Internet Based Systems, Kuala Lumpur, Malaysia. Lien externe

Preda, S., Boulahia Cuppens, N., Cuppens, F., & Toutain, L. (février 2010). Architecture-Aware Adaptive Deployment of Contextual Security Policies [Communication écrite]. International Conference on Availability, Reliability and Security, Krakow, Poland. Lien externe

Preda, S., Boulahia Cuppens, N., Cuppens, F., García-Alfaro, J., & Toutain, L. (février 2010). Model-Driven Security Policy Deployment: Property Oriented Approach [Communication écrite]. 2nd International Symposium on Engineering Secure Software and Systems (ESSoS 2010), Pisa, Italy. Lien externe

T

Thomas, J. A., Boulahia Cuppens, N., & Cuppens, F. (octobre 2010). Expression and enforcement of confidentiality policy in active databases [Communication écrite]. International Conference on Management of Emergent Digital EcoSystems (MEDES 2010), Bangkok, Thailand. Lien externe

Tounsi, W., García-Alfaro, J., Boulahia Cuppens, N., & Cuppens, F. (mai 2010). Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks [Communication écrite]. 8th Annual Communication Networks and Services Research Conference, Montréal, Qc, Canada. Lien externe

Liste produite: Thu May 2 02:19:21 2024 EDT.