The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Frédéric Cuppens: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Frédéric Cuppens, Robert Demolombe
    Cooperative Answering: A Methodology to Provide Intelligent Access to databases. [Citation Graph (8, 0)][DBLP]
    Expert Database Conf., 1988, pp:621-643 [Conf]
  2. Frédéric Cuppens, Robert Demolombe
    How to recognize interesting topics to provide cooperative answering. [Citation Graph (3, 0)][DBLP]
    Inf. Syst., 1989, v:14, n:2, pp:163-173 [Journal]
  3. Frédéric Cuppens
    A Modal Logic Framework to Solve Aggregation Problems. [Citation Graph (2, 0)][DBLP]
    DBSec, 1991, pp:315-332 [Conf]
  4. Laurence Cholvy, Frédéric Cuppens
    Providing Consistent Views in a Polyinstantiated Database. [Citation Graph (1, 0)][DBLP]
    DBSec, 1994, pp:277-296 [Conf]
  5. Frédéric Cuppens, Robert Demolombe
    A Prolog-Relational DBMS Interface Using Delayed Evaluation. [Citation Graph (1, 0)][DBLP]
    JCDKB, 1988, pp:135-148 [Conf]
  6. Frédéric Cuppens
    Querying a Multilevel Database: A Logical Analysis. [Citation Graph (1, 7)][DBLP]
    VLDB, 1996, pp:484-494 [Conf]
  7. Frédéric Cuppens, Nora Cuppens-Boulahia, Tony Ramard
    Availability Enforcement by Obligations and Aspects Identification. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:229-239 [Conf]
  8. Frédéric Cuppens
    Managing Alerts in a Multi-Intrusion Detection Environmen. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:22-31 [Conf]
  9. Frédéric Cuppens, Alexandre Miège
    Modelling Contexts in the Or-BAC Model. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:416-427 [Conf]
  10. Frédéric Cuppens
    Un langage de requêtes pour obtenir des résponses intelligentes. [Citation Graph (0, 0)][DBLP]
    BDA, 1989, pp:249-0 [Conf]
  11. Frédéric Cuppens, Robert Demolombe
    Comment reconnaître les centres d'intérêt pour fournir des réponses coopératives. [Citation Graph (0, 0)][DBLP]
    BDA, 1988, pp:257-0 [Conf]
  12. Frédéric Cuppens, Alban Gabillon
    Formalisation de la Confidentialité dans une Base de Données à Objets. [Citation Graph (0, 0)][DBLP]
    BDA, 1996, pp:417-0 [Conf]
  13. Frédéric Cuppens
    A Logical Formalization of Secrecy. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:53-62 [Conf]
  14. Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans
    Nomad: A Security Model with Non Atomic Actions and Deadlines. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:186-196 [Conf]
  15. Frédéric Cuppens, Laurence Cholvy, Claire Saurel, Jérôme Carrère
    Merging Security Policies: Analysis of a Practical Example. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:123-136 [Conf]
  16. Frédéric Cuppens, Sylvain Gombault, Thierry Sans
    Selecting Appropriate Counter-Measures in an Intrusion Detection Framework. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:78-87 [Conf]
  17. Frédéric Cuppens, Claire Saurel
    Specifying a security policy: a case study. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:123-0 [Conf]
  18. Pierre Bieber, Frédéric Cuppens
    A Definition of Secure Dependencies Using the Logic of Security. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:2-11 [Conf]
  19. Pierre Bieber, Frédéric Cuppens
    Secure Dependencies with Dynamic Level Assignments. [Citation Graph (0, 0)][DBLP]
    CSFW, 1992, pp:63-75 [Conf]
  20. Jérôme Carrère, Frédéric Cuppens, Claire Saurel
    SACADDOS: A Support Tool to Manage Multilevel Documents. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:173-188 [Conf]
  21. Frédéric Cuppens, Alban Gabillon
    Modelling a Multilevel Database with Temporal Downgrading Functionalities. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:145-164 [Conf]
  22. Frédéric Cuppens, Alban Gabillon
    A Logical Approach to Model a Multilevel Object-Oriented Database. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:145-166 [Conf]
  23. Frédéric Cuppens, Kioumars Yazdanian
    Logic Hints and Security in Relational Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1991, pp:227-238 [Conf]
  24. Frédéric Cuppens, Robert Demolombe
    A Deontic Logic for Reasoning about Confidentiality. [Citation Graph (0, 0)][DBLP]
    DEON, 1996, pp:66-79 [Conf]
  25. Hervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens
    Using Contextual Security Policies for Threat Response. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:109-128 [Conf]
  26. Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia
    Analysis of Policy Anomalies on Distributed Network Security Setups. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:496-511 [Conf]
  27. Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian
    Decomposition of Multilevel Objects in an Object-Oriented Database. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:375-402 [Conf]
  28. Frédéric Cuppens, Alban Gabillon
    Rules for Designing Multilevel Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1998, pp:159-174 [Conf]
  29. Frédéric Cuppens, Gilles Trouessin
    Information Flow Controls vs Interference Controls: An Integrated Approach. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:447-468 [Conf]
  30. Salem Benferhat, Rania El Baida, Frédéric Cuppens
    A Possibilistic Logic Encoding of Access Control. [Citation Graph (0, 0)][DBLP]
    FLAIRS Conference, 2003, pp:481-485 [Conf]
  31. Frédéric Cuppens, Fabien Autrel, Alexandre Miège, Salem Benferhat
    Recognizing Malicious Intention in an Intrusion Detection Process. [Citation Graph (0, 0)][DBLP]
    HIS, 2002, pp:806-817 [Conf]
  32. Laurence Cholvy, Frédéric Cuppens
    Solving Normative Conflicts by Merging Roles. [Citation Graph (0, 0)][DBLP]
    ICAIL, 1995, pp:201-209 [Conf]
  33. Laurence Cholvy, Frédéric Cuppens, Claire Saurel
    Towards a Logical Formalization of Responsibility. [Citation Graph (0, 0)][DBLP]
    ICAIL, 1997, pp:233-242 [Conf]
  34. Joaquín García, Fabien Autrel, Joan Borrell, Sergio Castillo, Frédéric Cuppens, Guillermo Navarro
    Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:223-235 [Conf]
  35. Frédéric Cuppens, Nora Cuppens-Boulahia, Céline Coma
    O2O: Virtual Private Organizations to Manage Security Policy Interoperability. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:101-115 [Conf]
  36. Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans
    Protection of Relationships in XML Documents with the XML-BB Model. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:148-163 [Conf]
  37. Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Alexandre Miège
    A Formal Approach to Specify and Deploy a Network Security Policy. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:203-218 [Conf]
  38. Frédéric Cuppens, Robert Demolombe
    A Modal Logical Framework for Security Policies. [Citation Graph (0, 0)][DBLP]
    ISMIS, 1997, pp:579-589 [Conf]
  39. Joaquín García, Frédéric Cuppens, Fabien Autrel, Jordi Castellà-Roca, Joan Borrell, Guillermo Navarro, Jose A. Ortega-Ruiz
    Protecting On-Line Casinos against Fraudulent Player Drop-Out. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:500-505 [Conf]
  40. Salem Benferhat, Fabien Autrel, Frédéric Cuppens
    Enhanced Correlation in an Intrusion Detection Process. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:157-170 [Conf]
  41. Jérôme Carrère, Frédéric Cuppens, Claire Saurel
    LExIS: A Query Language to Scan Information Flow. [Citation Graph (0, 0)][DBLP]
    NLDB, 2000, pp:369- [Conf]
  42. Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian
    Multilevel Security in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:79-89 [Conf]
  43. Frédéric Cuppens, Alexandre Miège
    Administration Model for Or-BAC. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2003, pp:754-768 [Conf]
  44. Anas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida, Frédéric Cuppens, Claire Saurel, Philippe Balbiani, Yves Deswarte, Gilles Trouessin
    Organization based access contro. [Citation Graph (0, 0)][DBLP]
    POLICY, 2003, pp:120-0 [Conf]
  45. Frédéric Cuppens, Rodolphe Ortalo
    LAMBDA: A Language to Model a Database for Detection of Attacks. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2000, pp:197-216 [Conf]
  46. Salem Benferhat, Rania El Baida, Frédéric Cuppens
    A stratification-based approach for handling conflicts in access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:189-195 [Conf]
  47. Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia
    Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2006, pp:182-194 [Conf]
  48. Yacine Bouzida, Frédéric Cuppens
    Detecting Known and Novel Network Intrusions. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:258-270 [Conf]
  49. Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia
    A Flexible and Distributed Architecture to Enforce Dynamic Access Control. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:183-195 [Conf]
  50. Souhila Kaci, Abdeslam Ali-Laouar, Frédéric Cuppens
    Health care and social inference systems: An unauthorized inference control based on fuzzy logic. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:217-226 [Conf]
  51. Laurence Cholvy, Frédéric Cuppens
    Analyzing Consistency of Security Policies. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:103-112 [Conf]
  52. Frédéric Cuppens, Alexandre Miège
    Alert Correlation in a Cooperative Intrusion Detection Framework. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:202-215 [Conf]
  53. Frédéric Cuppens, Claire Saurel
    A Logical Formalization of Integrity Policies for Database Management Systems. [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:231-254 [Conf]
  54. Frédéric Cuppens, Fabien Autrel, Yacine Bouzida, Joaquín García, Sylvain Gombault, Thierry Sans
    Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. [Citation Graph (0, 0)][DBLP]
    Annales des Télécommunications, 2006, v:61, n:1-2, pp:197-217 [Journal]
  55. Frédéric Cuppens, Hervé Debar, Elisa Bertino
    Foreword. [Citation Graph (0, 0)][DBLP]
    Annales des Télécommunications, 2006, v:61, n:3-4, pp:242-244 [Journal]
  56. Frédéric Cuppens, Alexandre Miège
    AdOrBAC: an administration model for Or-BAC. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2004, v:19, n:3, pp:- [Journal]
  57. Frédéric Cuppens, Alban Gabillon
    Cover story management. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2001, v:37, n:2, pp:177-201 [Journal]
  58. Frédéric Cuppens, Alban Gabillon
    Logical Foundations of Multilevel Databases. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1999, v:29, n:3, pp:259-291 [Journal]
  59. Isabelle Bloch, Anthony Hunter, Alain Appriou, André Ayoun, Salem Benferhat, Philippe Besnard, Laurence Cholvy, Roger Cooke, Frédéric Cuppens, Didier Dubois, Hélène Fargier, Michel Grabisch, Rudolf Kruse, Jérôme Lang, Serafín Moral, Henri Prade, Alessandro Saffiotti, Philippe Smets, Claudio Sossai
    Fusion: General concepts and characteristics. [Citation Graph (0, 0)][DBLP]
    Int. J. Intell. Syst., 2001, v:16, n:10, pp:1107-1134 [Journal]
  60. Frédéric Cuppens, Laurence Cholvy, Claire Saurel, Jérôme Carrère
    Merging regulations: Analysis of a practical example. [Citation Graph (0, 0)][DBLP]
    Int. J. Intell. Syst., 2001, v:16, n:11, pp:1223-1243 [Journal]
  61. Pierre Bieber, Frédéric Cuppens
    A Logical View of Secure Dependencies. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1992, v:1, n:1, pp:99-130 [Journal]
  62. Hervé Debar, Benjamin Morin, Frédéric Cuppens, Fabien Autrel, Ludovic Mé, Bernard Vivinis, Salem Benferhat, Mireille Ducassé, Rodolphe Ortalo
    Détection d'intrusions : corrélation d'alertes. [Citation Graph (0, 0)][DBLP]
    Technique et Science Informatiques, 2004, v:23, n:3, pp:359-390 [Journal]
  63. Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens
    An Integrated Model for Access Control and Information Flow Requirements. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:111-125 [Conf]
  64. Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans
    XML-BB: A Model to Handle Relationships Protection in XML Documents. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:1107-1114 [Conf]
  65. Wissam Mallouli, Jean-Marie Orset, Ana R. Cavalli, Nora Cuppens-Boulahia, Frédéric Cuppens
    A formal approach for testing security rules. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:127-132 [Conf]
  66. Frédéric Cuppens, Nora Cuppens-Boulahia, Meriam Ben Ghorbel
    High Level Conflict Management Strategies in Advanced Access Control Models. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:186, n:, pp:3-26 [Journal]
  67. Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia
    Enabling automated threat response through the use of a dynamic security policy. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:3, pp:195-210 [Journal]

  68. Aggregating and Deploying Network Access Control Policies. [Citation Graph (, )][DBLP]


  69. Context Ontology for Secure Interoperability. [Citation Graph (, )][DBLP]


  70. Deploying Security Policy in Intra and Inter Workflow Management Systems. [Citation Graph (, )][DBLP]


  71. Architecture-Aware Adaptive Deployment of Contextual Security Policies. [Citation Graph (, )][DBLP]


  72. From Contextual Permission to Dynamic Pre-obligation: An Integrated Approach. [Citation Graph (, )][DBLP]


  73. Managing access and flow control requirements in distributed workflows. [Citation Graph (, )][DBLP]


  74. FORM : A Federated Rights Expression Model for Open DRM Frameworks. [Citation Graph (, )][DBLP]


  75. Security policy compliance with violation management. [Citation Graph (, )][DBLP]


  76. Semantic context aware security policy deployment. [Citation Graph (, )][DBLP]


  77. Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks. [Citation Graph (, )][DBLP]


  78. Reaction Policy Model Based on Dynamic Organizations and Threat Context. [Citation Graph (, )][DBLP]


  79. fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality. [Citation Graph (, )][DBLP]


  80. Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic. [Citation Graph (, )][DBLP]


  81. A Service Dependency Modeling Framework for Policy-Based Response Enforcement. [Citation Graph (, )][DBLP]


  82. An Epistemic and Deontic Logic for Reasoning about Computer Security. [Citation Graph (, )][DBLP]


  83. A Service Dependency Model for Cost-Sensitive Intrusion Response. [Citation Graph (, )][DBLP]


  84. Contextual Privacy Management in Extended Role Based Access Control Model. [Citation Graph (, )][DBLP]


  85. Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking. [Citation Graph (, )][DBLP]


  86. Revocation Schemes for Delegation Licences. [Citation Graph (, )][DBLP]


  87. A Robust Reputation Scheme for Decentralized Group Management Systems. [Citation Graph (, )][DBLP]


  88. Service Dependencies in Information Systems Security. [Citation Graph (, )][DBLP]


  89. Misbehaviors Detection to Ensure Availability in OLSR. [Citation Graph (, )][DBLP]


  90. Formalization and Management of Group Obligations. [Citation Graph (, )][DBLP]


  91. OPA: Onion Policy Administration Model - Another approach to manage rights in DRM. [Citation Graph (, )][DBLP]


  92. Management of Exceptions on Access Control Policies. [Citation Graph (, )][DBLP]


  93. Negotiation of Prohibition: An Approach Based on Policy Rewriting. [Citation Graph (, )][DBLP]


  94. Interactivity for Reactive Access Control. [Citation Graph (, )][DBLP]


  95. Reliable Process for Security Policy Deployment. [Citation Graph (, )][DBLP]


  96. An Extended Role-Based Access Control Model for Delegating Obligations. [Citation Graph (, )][DBLP]


  97. Advanced Reaction Using Risk Assessment in Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  98. Evaluating the Trustworthiness of Contributors in a Collaborative Environment. [Citation Graph (, )][DBLP]


  99. From state-based to event-based contextual security policies. [Citation Graph (, )][DBLP]


  100. An extended RBAC profile of XACML. [Citation Graph (, )][DBLP]


  101. Resource Classification Based Negotiation in Web Services. [Citation Graph (, )][DBLP]


  102. Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems. [Citation Graph (, )][DBLP]


  103. Model-Driven Security Policy Deployment: Property Oriented Approach. [Citation Graph (, )][DBLP]


  104. An ontology-based approach to react to network attacks. [Citation Graph (, )][DBLP]


  105. Automated reaction based on risk analysis and attackers skills in intrusion detection systems. [Citation Graph (, )][DBLP]


  106. A secured delegation of remote services on IPv6 home networks. [Citation Graph (, )][DBLP]


  107. XeNA: an access negotiation framework using XACML. [Citation Graph (, )][DBLP]


  108. Aggregating and Deploying Network Access Control Policies [Citation Graph (, )][DBLP]


  109. Reliable Process for Security Policy Deployment [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.457secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002