<  Retour au portail Polytechnique Montréal

Documents publiés en "2011"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Département | Sous-type de document | Aucun groupement
Aller à : A | B | C | E | G | P | T
Nombre de documents: 13

A

Ajam, N., Boulahia Cuppens, N., & Cuppens, F. (mai 2011). Privacy Enforcement of Composed Services in Cellular Networks [Communication écrite]. 11th Annual International Conference on New Technologies of Distributed Systems, Paris, France (8 pages). Lien externe

B

Ben-Ghorbel-Talbi, M., Cuppens, F., Boulahia Cuppens, N., Le Métayer, D., & Piolle, G. (juin 2011). Delegation of Obligations and Responsibility [Communication écrite]. 26th IFIP TC 11 International Information Security Conference on Future Challenges in Security and Privacy for Academia and Industry, Lucerne, Switzerland. Lien externe

Boulahia Cuppens, N., Cuppens, F., & Nuadi, M. (août 2011). Smatch Model: Extending RBAC Sessions in Virtualization Environment [Communication écrite]. 6th International Conference on Availability, Reliability and Security, Vienna, Austria. Lien externe

C

Cuppens, F., & Boulahia Cuppens, N. (2011). Cover Story. Dans Encyclopedia of Cryptography and Security (264-265). Lien externe

Cuppens, F., & Boulahia Cuppens, N. (2011). Multilevel Security Policies. Dans Encyclopedia of Cryptography and Security (811-812). Lien externe

Cuppens, F., Foley, S. N., Groza, B., & Minea, M. (édit.) (2011). CRiSIS 2011, Proceedings of the Sixth International Conference on Risks and Security of Internet and Systems, Timișoara, Romania, September 26-28, 2011. Lien externe

E

Elrakaiby, Y., Cuppens, F., & Boulahia Cuppens, N. (2011). An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations. International Journal of Mobile Computing and Multimedia Communications, 3(2), 33-51. Lien externe

G

Graa, M., Boulahia Cuppens, N., Autrel, F., Azkia, H., Cuppens, F., Coatrieux, G., Cavalli, A. R., & Mammar, A. (septembre 2011). Using Requirements Engineering in an Automatic Security Policy Derivation Process [Communication écrite]. 6th International Workshop on Data Privacy Management (DPM 2011) and 4th International Workshop on Autonomous and Spontaneous Security (SETOP), Leuven, Belgium. Lien externe

P

Pan, W., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (août 2011). Reversible watermarking based on invariant image classification and dynamical error histogram shifting [Communication écrite]. Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Boston, MA, USA. Lien externe

Preda, S., Cuppens, F., Boulahia Cuppens, N., García-Alfaro, J., & Toutain, L. (2011). Dynamic deployment of context-aware access control policies for constrained security devices. Journal of Systems and Software, 84(7), 1144-1159. Lien externe

T

Thomas, J. A., Boulahia Cuppens, N., & Cuppens, F. (août 2011). Declassification Policy Management in Dynamic Information Systems [Communication écrite]. 6th International Conference on Availability, Reliability and Security, Vienna, Austria. Lien externe

Thomas, J. A., Cuppens, F., & Boulahia Cuppens, N. (décembre 2011). Consistency Policies for Dynamic Information Systems with Declassification Flows [Communication écrite]. 7th International Conference on Information Systems Security (ICISS 2011), Kolkata, India. Lien externe

Tounsi, W., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (mai 2011). Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress [Communication écrite]. 4th Canada-France MITACS Workshop on Foundations and Practice of Security (FPS 2011), Paris, France. Lien externe

Liste produite: Fri May 3 03:10:11 2024 EDT.