<  Retour au portail Polytechnique Montréal

Documents publiés en "2014"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Département | Sous-type de document | Aucun groupement
Aller à : A | B | E | F | G | I | L | M | O | S | T
Nombre de documents: 21

A

Azkia, H., Boulahia Cuppens, N., Cuppens, F., & Coatrieux, G. (2014). Log content extraction engine based on ontology for the purpose of a posteriori access control. International Journal of Knowledge and Learning, 9(1/2), 23-42. Lien externe

B

Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Gross-Amblard, D. (juillet 2014). Specification and Deployment of Integrated Security Policies for Outsourced Data [Communication écrite]. 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria. Lien externe

Boulahia Cuppens, N., Cuppens, F., Jajodia, S., Kalam, A. A. E., & Sans, T. (édit.) (2014). 29th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2014), Marrakech, Morocco. Lien externe

Bouyahia, T., Idrees, M. S., Boulahia Cuppens, N., Cuppens, F., & Autrel, F. (septembre 2014). Metric for Security Activities Assisted by Argumentative Logic [Communication écrite]. 9th International Workshop on Data Privacy Management (DPM 2014), 7th International Workshop on Autonomous and Spontaneous Security (SETOP 2014), 3rd International Workshop on Quantitative Aspects in Security Assurance (QASA 2014), Wroclaw, Poland. Lien externe

E

Essaouini, N., Cuppens, F., Boulahia Cuppens, N., & El Kalam, A. A. (2014). Conflict detection in obligation with deadline policies. EURASIP Journal on Information Security, 2014(1), 13-13. Lien externe

Essaouini, N., Cuppens, F., Boulahia Cuppens, N., & Kalam, A. A. E. (juillet 2014). Specifying and enforcing constraints in dynamic access control policies [Communication écrite]. 12th Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada. Lien externe

F

Franco-Contreras, J., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (octobre 2014). Adapted Quantization Index Modulation for Database Watermarking [Communication écrite]. 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014), Taipei, Taiwan. Lien externe

Franco-Contreras, J., Coatrieux, G., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (août 2014). Ontology-guided distortion control for robust-lossless database watermarking: Application to inpatient hospital stay records [Communication écrite]. 36th annual International Conference of the IEEE Engineering in Medicine and Biology Society, Chicago, IL, USA. Lien externe

Franco-Contreras, J., Coatrieux, G., Cuppens, F., Boulahia Cuppens, N., & Roux, C. (2014). Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation. IEEE Transactions on Information Forensics and Security, 9(3), 397-410. Lien externe

G

Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (mai 2014). Détection de flux de contrôle illégaux dans les Smartphones [Communication écrite]. INFORSID 2014, Lyon, France. Lien externe

Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (novembre 2014). Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps [Communication écrite]. 7th International Symposium on Foundations and Practice of Security (FPS 2014), Montréal, Qc, Canada. Lien externe

Graa, M., Boulahia Cuppens, N., Cuppens, F., & Cavalli, A. R. (juin 2014). Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems [Communication écrite]. 8th IEEE International Conference on Software Security and Reliability-Companion, San Francisco, CA, USA. Lien externe

I

Idrees, M. S., Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (septembre 2014). Car2X Communication - Putting Security Negotiation into Practice [Communication écrite]. 80th IEEE Vehicular Technology Conference (VTC2014-Fall), Vancouver, BC, Canada (5 pages). Lien externe

L

Li, Y., Boulahia Cuppens, N., Crom, J.-M., Cuppens, F., & Frey, V. (septembre 2014). Reaching Agreement in Security Policy Negotiation [Communication écrite]. 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, China. Lien externe

M

Moataz, T., Boulahia Cuppens, N., Cuppens, F., Ray, I., & Ray, I. (juillet 2014). ELITE: zEro Links Identity managemenT systEm [Communication écrite]. 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria. Lien externe

Moataz, T., Justus, B., Ray, I., Boulahia Cuppens, N., Cuppens, F., & Ray, I. (juillet 2014). Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds [Communication écrite]. 28th annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria. Lien externe

O

Oulmakhzoune, S., Boulahia Cuppens, N., Cuppens, F., Morucci, S., Barhamgi, M., & Benslimane, D. (2014). Privacy query rewriting algorithm instrumented by a privacy-aware access control model. Annales des télécommunications, 69(1-2), 3-19. Lien externe

S

Samarji, L. E., Boulahia Cuppens, N., Cuppens, F., Papillon, S., Kanoun, W., & Dubus, S. (septembre 2014). Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks [Communication écrite]. 10th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2014), Beijing, China. Lien externe

Schaad, A., Bkakria, A., Kerschbaum, F., Cuppens, F., Boulahia Cuppens, N., & Gross-Amblard, D. (juin 2014). Optimized and controlled provisioning of encrypted outsourced data [Communication écrite]. 19th ACM symposium on Access control models and technologies, London, Ontario, Canada. Lien externe

T

Tounsi, W., Boulahia Cuppens, N., García-Alfaro, J., Chevalier, Y., & Cuppens, F. (2014). KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. Journal of Network and Computer Applications, 39, 152-166. Lien externe

Tounsi, W., Justus, B., Boulahia Cuppens, N., Cuppens, F., & García-Alfaro, J. (juin 2014). Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm [Communication écrite]. 8th IEEE International Conference on Software Security and Reliability-Companion, San Francisco, CA, USA. Lien externe

Liste produite: Thu May 2 02:51:19 2024 EDT.