<  Retour au portail Polytechnique Montréal

Documents publiés en "2011"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Département | Sous-type de document | Aucun groupement
Nombre de documents: 13

Ajam, N., Boulahia Cuppens, N., & Cuppens, F. (mai 2011). Privacy Enforcement of Composed Services in Cellular Networks [Communication écrite]. 11th Annual International Conference on New Technologies of Distributed Systems, Paris, France (8 pages). Lien externe

Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., Le Métayer, D., & Piolle, G. (juin 2011). Delegation of Obligations and Responsibility [Communication écrite]. 26th IFIP TC 11 International Information Security Conference on Future Challenges in Security and Privacy for Academia and Industry, Lucerne, Switzerland. Lien externe

Boulahia Cuppens, N., Cuppens, F., & Nuadi, M. (août 2011). Smatch Model: Extending RBAC Sessions in Virtualization Environment [Communication écrite]. 6th International Conference on Availability, Reliability and Security, Vienna, Austria. Lien externe

Cuppens, F., & Boulahia Cuppens, N. (2011). Cover Story. Dans Encyclopedia of Cryptography and Security (264-265). Lien externe

Cuppens, F., & Boulahia Cuppens, N. (2011). Multilevel Security Policies. Dans Encyclopedia of Cryptography and Security (811-812). Lien externe

Cuppens, F., Foley, S. N., Groza, B., & Minea, M. (édit.) (2011). CRiSIS 2011, Proceedings of the Sixth International Conference on Risks and Security of Internet and Systems, Timișoara, Romania, September 26-28, 2011. Lien externe

Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2011). An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations. International Journal of Mobile Computing and Multimedia Communications, 3(2), 33-51. Lien externe

Graa, M., Boulahia Cuppens, N., Autrel, F., Azkia, H., Cuppens, F., Coatrieux, G., Cavalli, A. R., & Mammar, A. (septembre 2011). Using Requirements Engineering in an Automatic Security Policy Derivation Process [Communication écrite]. 6th International Workshop on Data Privacy Management (DPM 2011) and 4th International Workshop on Autonomous and Spontaneous Security (SETOP), Leuven, Belgium. Lien externe

Pan, W., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (août 2011). Reversible watermarking based on invariant image classification and dynamical error histogram shifting [Communication écrite]. Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Boston, MA, USA. Lien externe

Preda, S., Cuppens, F., Boulahia Cuppens, N., García-Alfaro, J., & Toutain, L. (2011). Dynamic deployment of context-aware access control policies for constrained security devices. Journal of Systems and Software, 84(7), 1144-1159. Lien externe

Thomas, J. A., Boulahia Cuppens, N., & Cuppens, F. (août 2011). Declassification Policy Management in Dynamic Information Systems [Communication écrite]. 6th International Conference on Availability, Reliability and Security, Vienna, Austria. Lien externe

Thomas, J. A., Cuppens, F., & Boulahia Cuppens, N. (décembre 2011). Consistency Policies for Dynamic Information Systems with Declassification Flows [Communication écrite]. 7th International Conference on Information Systems Security (ICISS 2011), Kolkata, India. Lien externe

Tounsi, W., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (mai 2011). Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress [Communication écrite]. 4th Canada-France MITACS Workshop on Foundations and Practice of Security (FPS 2011), Paris, France. Lien externe

Liste produite: Fri May 17 03:08:45 2024 EDT.