| 2009 |
| 36 | EE | Stere Preda,
Frédéric Cuppens,
Nora Cuppens-Boulahia,
Joaquín García-Alfaro,
Laurent Toutain,
Yehia Elrakaiby:
Semantic context aware security policy deployment.
ASIACCS 2009: 251-261 |
| 35 | EE | Diala Abi Haidar,
Nora Cuppens-Boulahia,
Frédéric Cuppens,
Hervé Debar:
XeNA: an access negotiation framework using XACML.
Annales des Télécommunications 64(1-2): 155-169 (2009) |
| 2008 |
| 34 | EE | Samiha Ayed,
Nora Cuppens-Boulahia,
Frédéric Cuppens:
Managing access and flow control requirements in distributed workflows.
AICCSA 2008: 702-710 |
| 33 | EE | Céline Coma,
Nora Cuppens-Boulahia,
Frédéric Cuppens,
Ana R. Cavalli:
Context Ontology for Secure Interoperability.
ARES 2008: 821-827 |
| 32 | EE | Nora Cuppens-Boulahia,
Frédéric Cuppens:
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic.
DEON 2008: 65-80 |
| 31 | EE | Meriam Ben-Ghorbel-Talbi,
Frédéric Cuppens,
Nora Cuppens-Boulahia,
Adel Bouhoula:
Revocation Schemes for Delegation Licences.
ICICS 2008: 190-205 |
| 30 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia,
Julien A. Thomas:
A Robust Reputation Scheme for Decentralized Group Management Systems.
ICISS 2008: 71-85 |
| 29 | EE | Nora Cuppens-Boulahia,
Frédéric Cuppens,
Diala Abi Haidar,
Hervé Debar:
Negotiation of Prohibition: An Approach Based on Policy Rewriting.
SEC 2008: 173-187 |
| 28 | EE | Joaquín García-Alfaro,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
Aggregating and Deploying Network Access Control Policies
CoRR abs/0803.0653: (2008) |
| 27 | EE | Joaquín García-Alfaro,
Nora Boulahia-Cuppens,
Frédéric Cuppens:
Complete analysis of configuration rules to guarantee reliable network security policies.
Int. J. Inf. Sec. 7(2): 103-122 (2008) |
| 26 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia:
Modeling contextual security policies.
Int. J. Inf. Sec. 7(4): 285-305 (2008) |
| 2007 |
| 25 | EE | Joaquín García-Alfaro,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
Aggregating and Deploying Network Access Control Policies.
ARES 2007: 532-542 |
| 24 | EE | Samiha Ayed,
Nora Cuppens-Boulahia,
Frédéric Cuppens:
An Integrated Model for Access Control and Information Flow Requirements.
ASIAN 2007: 111-125 |
| 23 | EE | Julien Brunel,
Frédéric Cuppens,
Nora Cuppens-Boulahia,
Thierry Sans,
Jean-Paul Bodeveix:
Security policy compliance with violation management.
FMSE 2007: 31-40 |
| 22 | EE | Diala Abi Haidar,
Nora Cuppens-Boulahia,
Frédéric Cuppens,
Hervé Debar:
Resource Classification Based Negotiation in Web Services.
IAS 2007: 313-318 |
| 21 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia,
Thierry Sans:
XML-BB: A Model to Handle Relationships Protection in XML Documents.
KES (3) 2007: 1107-1114 |
| 20 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia,
Tony Ramard,
Julien A. Thomas:
Misbehaviors Detection to Ensure Availability in OLSR.
MSN 2007: 799-813 |
| 19 | EE | Wissam Mallouli,
Jean-Marie Orset,
Ana R. Cavalli,
Nora Cuppens-Boulahia,
Frédéric Cuppens:
A formal approach for testing security rules.
SACMAT 2007: 127-132 |
| 18 | EE | Thierry Sans,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
OPA: Onion Policy Administration Model - Another approach to manage rights in DRM.
SEC 2007: 349-360 |
| 17 | EE | Joaquín García-Alfaro,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
Management of Exceptions on Access Control Policies.
SEC 2007: 97-108 |
| 16 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia,
Meriam Ben Ghorbel:
High Level Conflict Management Strategies in Advanced Access Control Models.
Electr. Notes Theor. Comput. Sci. 186: 3-26 (2007) |
| 15 | EE | Hervé Debar,
Yohann Thomas,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
Enabling automated threat response through the use of a dynamic security policy.
Journal in Computer Virology 3(3): 195-210 (2007) |
| 2006 |
| 14 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia,
Tony Ramard:
Availability Enforcement by Obligations and Aspects Identification.
ARES 2006: 229-239 |
| 13 | EE | Thierry Sans,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
FORM : A Federated Rights Expression Model for Open DRM Frameworks.
ASIAN 2006: 45-59 |
| 12 | EE | Hervé Debar,
Yohann Thomas,
Nora Boulahia-Cuppens,
Frédéric Cuppens:
Using Contextual Security Policies for Threat Response.
DIMVA 2006: 109-128 |
| 11 | EE | Joaquín García-Alfaro,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
Analysis of Policy Anomalies on Distributed Network Security Setups.
ESORICS 2006: 496-511 |
| 10 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia,
Céline Coma:
O2O: Virtual Private Organizations to Manage Security Policy Interoperability.
ICISS 2006: 101-115 |
| 9 | EE | Joaquín García-Alfaro,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
Towards Filtering and Alerting Rule Rewriting on Single-Component Policies.
SAFECOMP 2006: 182-194 |
| 8 | EE | Thierry Sans,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
A Flexible and Distributed Architecture to Enforce Dynamic Access Control.
SEC 2006: 183-195 |
| 7 | EE | Diala Abi Haidar,
Nora Cuppens-Boulahia,
Frédéric Cuppens,
Hervé Debar:
An extended RBAC profile of XACML.
SWS 2006: 13-22 |
| 2005 |
| 6 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia,
Thierry Sans:
Nomad: A Security Model with Non Atomic Actions and Deadlines.
CSFW 2005: 186-196 |
| 5 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia,
Thierry Sans:
Protection of Relationships in XML Documents with the XML-BB Model.
ICISS 2005: 148-163 |
| 2004 |
| 4 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia,
Thierry Sans,
Alexandre Miège:
A Formal Approach to Specify and Deploy a Network Security Policy.
Formal Aspects in Security and Trust 2004: 203-218 |
| 1994 |
| 3 | EE | Nora Boulahia-Cuppens,
Frédéric Cuppens,
Alban Gabillon,
Kioumars Yazdanian:
Decomposition of Multilevel Objects in an Object-Oriented Database.
ESORICS 1994: 375-402 |
| 1993 |
| 2 | | Pierre Bieber,
Nora Boulahia-Cuppens,
T. Lehmann,
E. van Wickeren:
Abstract Machines for Communication Security.
CSFW 1993: 137-146 |
| 1 | | Nora Boulahia-Cuppens,
Frédéric Cuppens,
Alban Gabillon,
Kioumars Yazdanian:
Multilevel Security in Object-Oriented Databases.
Security for Object-Oriented Systems 1993: 79-89 |