2009 |
36 | EE | Stere Preda,
Frédéric Cuppens,
Nora Cuppens-Boulahia,
Joaquín García-Alfaro,
Laurent Toutain,
Yehia Elrakaiby:
Semantic context aware security policy deployment.
ASIACCS 2009: 251-261 |
35 | EE | Diala Abi Haidar,
Nora Cuppens-Boulahia,
Frédéric Cuppens,
Hervé Debar:
XeNA: an access negotiation framework using XACML.
Annales des Télécommunications 64(1-2): 155-169 (2009) |
2008 |
34 | EE | Samiha Ayed,
Nora Cuppens-Boulahia,
Frédéric Cuppens:
Managing access and flow control requirements in distributed workflows.
AICCSA 2008: 702-710 |
33 | EE | Céline Coma,
Nora Cuppens-Boulahia,
Frédéric Cuppens,
Ana R. Cavalli:
Context Ontology for Secure Interoperability.
ARES 2008: 821-827 |
32 | EE | Nora Cuppens-Boulahia,
Frédéric Cuppens:
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic.
DEON 2008: 65-80 |
31 | EE | Meriam Ben-Ghorbel-Talbi,
Frédéric Cuppens,
Nora Cuppens-Boulahia,
Adel Bouhoula:
Revocation Schemes for Delegation Licences.
ICICS 2008: 190-205 |
30 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia,
Julien A. Thomas:
A Robust Reputation Scheme for Decentralized Group Management Systems.
ICISS 2008: 71-85 |
29 | EE | Nora Cuppens-Boulahia,
Frédéric Cuppens,
Diala Abi Haidar,
Hervé Debar:
Negotiation of Prohibition: An Approach Based on Policy Rewriting.
SEC 2008: 173-187 |
28 | EE | Joaquín García-Alfaro,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
Aggregating and Deploying Network Access Control Policies
CoRR abs/0803.0653: (2008) |
27 | EE | Joaquín García-Alfaro,
Nora Boulahia-Cuppens,
Frédéric Cuppens:
Complete analysis of configuration rules to guarantee reliable network security policies.
Int. J. Inf. Sec. 7(2): 103-122 (2008) |
26 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia:
Modeling contextual security policies.
Int. J. Inf. Sec. 7(4): 285-305 (2008) |
2007 |
25 | EE | Joaquín García-Alfaro,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
Aggregating and Deploying Network Access Control Policies.
ARES 2007: 532-542 |
24 | EE | Samiha Ayed,
Nora Cuppens-Boulahia,
Frédéric Cuppens:
An Integrated Model for Access Control and Information Flow Requirements.
ASIAN 2007: 111-125 |
23 | EE | Julien Brunel,
Frédéric Cuppens,
Nora Cuppens-Boulahia,
Thierry Sans,
Jean-Paul Bodeveix:
Security policy compliance with violation management.
FMSE 2007: 31-40 |
22 | EE | Diala Abi Haidar,
Nora Cuppens-Boulahia,
Frédéric Cuppens,
Hervé Debar:
Resource Classification Based Negotiation in Web Services.
IAS 2007: 313-318 |
21 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia,
Thierry Sans:
XML-BB: A Model to Handle Relationships Protection in XML Documents.
KES (3) 2007: 1107-1114 |
20 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia,
Tony Ramard,
Julien A. Thomas:
Misbehaviors Detection to Ensure Availability in OLSR.
MSN 2007: 799-813 |
19 | EE | Wissam Mallouli,
Jean-Marie Orset,
Ana R. Cavalli,
Nora Cuppens-Boulahia,
Frédéric Cuppens:
A formal approach for testing security rules.
SACMAT 2007: 127-132 |
18 | EE | Thierry Sans,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
OPA: Onion Policy Administration Model - Another approach to manage rights in DRM.
SEC 2007: 349-360 |
17 | EE | Joaquín García-Alfaro,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
Management of Exceptions on Access Control Policies.
SEC 2007: 97-108 |
16 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia,
Meriam Ben Ghorbel:
High Level Conflict Management Strategies in Advanced Access Control Models.
Electr. Notes Theor. Comput. Sci. 186: 3-26 (2007) |
15 | EE | Hervé Debar,
Yohann Thomas,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
Enabling automated threat response through the use of a dynamic security policy.
Journal in Computer Virology 3(3): 195-210 (2007) |
2006 |
14 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia,
Tony Ramard:
Availability Enforcement by Obligations and Aspects Identification.
ARES 2006: 229-239 |
13 | EE | Thierry Sans,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
FORM : A Federated Rights Expression Model for Open DRM Frameworks.
ASIAN 2006: 45-59 |
12 | EE | Hervé Debar,
Yohann Thomas,
Nora Boulahia-Cuppens,
Frédéric Cuppens:
Using Contextual Security Policies for Threat Response.
DIMVA 2006: 109-128 |
11 | EE | Joaquín García-Alfaro,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
Analysis of Policy Anomalies on Distributed Network Security Setups.
ESORICS 2006: 496-511 |
10 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia,
Céline Coma:
O2O: Virtual Private Organizations to Manage Security Policy Interoperability.
ICISS 2006: 101-115 |
9 | EE | Joaquín García-Alfaro,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
Towards Filtering and Alerting Rule Rewriting on Single-Component Policies.
SAFECOMP 2006: 182-194 |
8 | EE | Thierry Sans,
Frédéric Cuppens,
Nora Cuppens-Boulahia:
A Flexible and Distributed Architecture to Enforce Dynamic Access Control.
SEC 2006: 183-195 |
7 | EE | Diala Abi Haidar,
Nora Cuppens-Boulahia,
Frédéric Cuppens,
Hervé Debar:
An extended RBAC profile of XACML.
SWS 2006: 13-22 |
2005 |
6 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia,
Thierry Sans:
Nomad: A Security Model with Non Atomic Actions and Deadlines.
CSFW 2005: 186-196 |
5 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia,
Thierry Sans:
Protection of Relationships in XML Documents with the XML-BB Model.
ICISS 2005: 148-163 |
2004 |
4 | EE | Frédéric Cuppens,
Nora Cuppens-Boulahia,
Thierry Sans,
Alexandre Miège:
A Formal Approach to Specify and Deploy a Network Security Policy.
Formal Aspects in Security and Trust 2004: 203-218 |
1994 |
3 | EE | Nora Boulahia-Cuppens,
Frédéric Cuppens,
Alban Gabillon,
Kioumars Yazdanian:
Decomposition of Multilevel Objects in an Object-Oriented Database.
ESORICS 1994: 375-402 |
1993 |
2 | | Pierre Bieber,
Nora Boulahia-Cuppens,
T. Lehmann,
E. van Wickeren:
Abstract Machines for Communication Security.
CSFW 1993: 137-146 |
1 | | Nora Boulahia-Cuppens,
Frédéric Cuppens,
Alban Gabillon,
Kioumars Yazdanian:
Multilevel Security in Object-Oriented Databases.
Security for Object-Oriented Systems 1993: 79-89 |