dblp.uni-trier.dewww.uni-trier.de

Nora Cuppens-Boulahia

Nora Boulahia-Cuppens

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
36EEStere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Laurent Toutain, Yehia Elrakaiby: Semantic context aware security policy deployment. ASIACCS 2009: 251-261
35EEDiala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar: XeNA: an access negotiation framework using XACML. Annales des Télécommunications 64(1-2): 155-169 (2009)
2008
34EESamiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens: Managing access and flow control requirements in distributed workflows. AICCSA 2008: 702-710
33EECéline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli: Context Ontology for Secure Interoperability. ARES 2008: 821-827
32EENora Cuppens-Boulahia, Frédéric Cuppens: Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic. DEON 2008: 65-80
31EEMeriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula: Revocation Schemes for Delegation Licences. ICICS 2008: 190-205
30EEFrédéric Cuppens, Nora Cuppens-Boulahia, Julien A. Thomas: A Robust Reputation Scheme for Decentralized Group Management Systems. ICISS 2008: 71-85
29EENora Cuppens-Boulahia, Frédéric Cuppens, Diala Abi Haidar, Hervé Debar: Negotiation of Prohibition: An Approach Based on Policy Rewriting. SEC 2008: 173-187
28EEJoaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia: Aggregating and Deploying Network Access Control Policies CoRR abs/0803.0653: (2008)
27EEJoaquín García-Alfaro, Nora Boulahia-Cuppens, Frédéric Cuppens: Complete analysis of configuration rules to guarantee reliable network security policies. Int. J. Inf. Sec. 7(2): 103-122 (2008)
26EEFrédéric Cuppens, Nora Cuppens-Boulahia: Modeling contextual security policies. Int. J. Inf. Sec. 7(4): 285-305 (2008)
2007
25EEJoaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia: Aggregating and Deploying Network Access Control Policies. ARES 2007: 532-542
24EESamiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens: An Integrated Model for Access Control and Information Flow Requirements. ASIAN 2007: 111-125
23EEJulien Brunel, Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Jean-Paul Bodeveix: Security policy compliance with violation management. FMSE 2007: 31-40
22EEDiala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar: Resource Classification Based Negotiation in Web Services. IAS 2007: 313-318
21EEFrédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans: XML-BB: A Model to Handle Relationships Protection in XML Documents. KES (3) 2007: 1107-1114
20EEFrédéric Cuppens, Nora Cuppens-Boulahia, Tony Ramard, Julien A. Thomas: Misbehaviors Detection to Ensure Availability in OLSR. MSN 2007: 799-813
19EEWissam Mallouli, Jean-Marie Orset, Ana R. Cavalli, Nora Cuppens-Boulahia, Frédéric Cuppens: A formal approach for testing security rules. SACMAT 2007: 127-132
18EEThierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia: OPA: Onion Policy Administration Model - Another approach to manage rights in DRM. SEC 2007: 349-360
17EEJoaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia: Management of Exceptions on Access Control Policies. SEC 2007: 97-108
16EEFrédéric Cuppens, Nora Cuppens-Boulahia, Meriam Ben Ghorbel: High Level Conflict Management Strategies in Advanced Access Control Models. Electr. Notes Theor. Comput. Sci. 186: 3-26 (2007)
15EEHervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia: Enabling automated threat response through the use of a dynamic security policy. Journal in Computer Virology 3(3): 195-210 (2007)
2006
14EEFrédéric Cuppens, Nora Cuppens-Boulahia, Tony Ramard: Availability Enforcement by Obligations and Aspects Identification. ARES 2006: 229-239
13EEThierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia: FORM : A Federated Rights Expression Model for Open DRM Frameworks. ASIAN 2006: 45-59
12EEHervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens: Using Contextual Security Policies for Threat Response. DIMVA 2006: 109-128
11EEJoaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia: Analysis of Policy Anomalies on Distributed Network Security Setups. ESORICS 2006: 496-511
10EEFrédéric Cuppens, Nora Cuppens-Boulahia, Céline Coma: O2O: Virtual Private Organizations to Manage Security Policy Interoperability. ICISS 2006: 101-115
9EEJoaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia: Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. SAFECOMP 2006: 182-194
8EEThierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia: A Flexible and Distributed Architecture to Enforce Dynamic Access Control. SEC 2006: 183-195
7EEDiala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar: An extended RBAC profile of XACML. SWS 2006: 13-22
2005
6EEFrédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans: Nomad: A Security Model with Non Atomic Actions and Deadlines. CSFW 2005: 186-196
5EEFrédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans: Protection of Relationships in XML Documents with the XML-BB Model. ICISS 2005: 148-163
2004
4EEFrédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Alexandre Miège: A Formal Approach to Specify and Deploy a Network Security Policy. Formal Aspects in Security and Trust 2004: 203-218
1994
3EENora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian: Decomposition of Multilevel Objects in an Object-Oriented Database. ESORICS 1994: 375-402
1993
2 Pierre Bieber, Nora Boulahia-Cuppens, T. Lehmann, E. van Wickeren: Abstract Machines for Communication Security. CSFW 1993: 137-146
1 Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian: Multilevel Security in Object-Oriented Databases. Security for Object-Oriented Systems 1993: 79-89

Coauthor Index

1Samiha Ayed [24] [34]
2Meriam Ben-Ghorbel-Talbi (Meriam Ben Ghorbel) [16] [31]
3Pierre Bieber [2]
4Jean-Paul Bodeveix [23]
5Adel Bouhoula [31]
6Julien Brunel [23]
7Ana R. Cavalli [19] [33]
8Céline Coma [10] [33]
9Frédéric Cuppens [1] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36]
10Hervé Debar [7] [12] [15] [22] [29] [35]
11Yehia Elrakaiby [36]
12Alban Gabillon [1] [3]
13Joaquín García (Joaquín García-Alfaro) [9] [11] [17] [25] [27] [28] [36]
14Diala Abi Haidar [7] [22] [29] [35]
15T. Lehmann [2]
16Wissam Mallouli [19]
17Alexandre Miège [4]
18Jean-Marie Orset [19]
19Stere Preda [36]
20Tony Ramard [14] [20]
21Thierry Sans [4] [5] [6] [8] [13] [18] [21] [23]
22Julien A. Thomas [20] [30]
23Yohann Thomas [12] [15]
24Laurent Toutain [36]
25E. van Wickeren [2]
26Kioumars Yazdanian [1] [3]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)