<  Retour au portail Polytechnique Montréal

Documents publiés en "2015"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Département | Sous-type de document | Aucun groupement
Aller à : A | B | D | F | H | I | L | P | S
Nombre de documents: 14

A

Ayed, S., Idrees, M. S., Boulahia Cuppens, N., & Cuppens, F. (juillet 2015). Dynamic deployment of access and usage control policies using aspects [Communication écrite]. International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), Paris, France (6 pages). Lien externe

Azkia, H., Boulahia Cuppens, N., Cuppens, F., Coatrieux, G., & Oulmakhzoune, S. (2015). Deployment of a posteriori access control using IHE ATNA. International Journal of Information Security, 14(5), 471-483. Lien externe

B

Bayou, L., Espes, D., Boulahia Cuppens, N., & Cuppens, F. (juillet 2015). Security Issue of WirelessHART Based SCADA Systems [Communication écrite]. 10th International Conference on Risks and Security of Internet and Systems (CRiSIS 2015), Mytilene, Lesbos Island, Greece. Lien externe

Bayou, L., Espes, D., Boulahia Cuppens, N., & Cuppens, F. (septembre 2015). WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks Simulator [Communication écrite]. 1st International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems (CyberICS 2015) and 1st Workshop on the Security of Cyber Physical Systems (WOS-CPS 2015), Vienna, Austria. Lien externe

Bkakria, A., Cuppens, F., Boulahia Cuppens, N., & Gross-Amblard, D. (octobre 2015). Security Mechanisms Planning to Enforce Security Policies [Communication écrite]. 8th International Symposium on Foundations and Practice of Security (FPS 2015), Clermont-Ferrand, France. Lien externe

Bouyahia, T., Autrel, F., Boulahia Cuppens, N., & Cuppens, F. (juillet 2015). Context Aware Intrusion Response Based on Argumentation Logic [Communication écrite]. 10th International Conference on Risks and Security of Internet and Systems (CRiSIS 2015), Mytilene, Lesbos Island, Greece. Lien externe

D

Douss, A. B. C., Ayed, S., Abassi, R., Boulahia Cuppens, N., & Fatmi, S. G. E. (août 2015). Trust Negotiation Based Approach to Enforce MANET Routing Security [Communication écrite]. 10th International Conference on Availability, Reliability and Security, Toulouse, France. Lien externe

F

Franco-Contreras, J., Coatrieux, G., Massari, P., Darmoni, S. J., Boulahia Cuppens, N., Cuppens, F., & Roux, C. (2015). Data Quality Evaluation in Medical Database Watermarking. Dans Studies in Health Technology and Informatics (276-280). Lien externe

H

Hachana, S., Boulahia Cuppens, N., & Cuppens, F. (2015). Mining a high level access control policy in a network with multiple firewalls. Journal of Information Security and Applications, 20, 61-73. Lien externe

I

Idrees, M. S., Ayed, S., Boulahia Cuppens, N., & Cuppens, F. (août 2015). Dynamic Security Policies Enforcement and Adaptation Using Aspects [Communication écrite]. IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland. Lien externe

L

Lazrig, I., Moataz, T., Ray, I., Ray, I., Ong, T., Kahn, M. G., Cuppens, F., & Boulahia Cuppens, N. (juillet 2015). Privacy Preserving Record Matching Using Automated Semi-trusted Broker [Communication écrite]. 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2015), Fairfax, VA, USA. Lien externe

Li, Y., Boulahia Cuppens, N., Crom, J.-M., Cuppens, F., Frey, V., & Ji, X. (décembre 2015). Similarity Measure for Security Policies in Service Provider Selection [Communication écrite]. 11th International Conference on Information Systems Security (ICISS 2015), Kolkata, India. Lien externe

P

Perez, S. M., García-Alfaro, J., Cuppens, F., Boulahia Cuppens, N., & Cabot, J. (mai 2015). Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems [Communication écrite]. 30th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2015), Hamburg, Germany. Lien externe

S

Samarji, L. E., Boulahia Cuppens, N., Cuppens, F., Papillon, S., Kanoun, W., & Dubus, S. (septembre 2015). On the Fly Design and Co-simulation of Responses Against Simultaneous Attacks [Communication écrite]. 20th European Symposium on Research in Computer Security (ESORICS 2015), Vienna, Austria. Lien externe

Liste produite: Sat May 4 03:22:55 2024 EDT.