The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nora Cuppens-Boulahia: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Frédéric Cuppens, Nora Cuppens-Boulahia, Tony Ramard
    Availability Enforcement by Obligations and Aspects Identification. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:229-239 [Conf]
  2. Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans
    Nomad: A Security Model with Non Atomic Actions and Deadlines. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:186-196 [Conf]
  3. Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia
    Analysis of Policy Anomalies on Distributed Network Security Setups. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:496-511 [Conf]
  4. Frédéric Cuppens, Nora Cuppens-Boulahia, Céline Coma
    O2O: Virtual Private Organizations to Manage Security Policy Interoperability. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:101-115 [Conf]
  5. Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans
    Protection of Relationships in XML Documents with the XML-BB Model. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:148-163 [Conf]
  6. Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Alexandre Miège
    A Formal Approach to Specify and Deploy a Network Security Policy. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:203-218 [Conf]
  7. Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia
    Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2006, pp:182-194 [Conf]
  8. Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia
    A Flexible and Distributed Architecture to Enforce Dynamic Access Control. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:183-195 [Conf]
  9. Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens
    An Integrated Model for Access Control and Information Flow Requirements. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:111-125 [Conf]
  10. Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans
    XML-BB: A Model to Handle Relationships Protection in XML Documents. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:1107-1114 [Conf]
  11. Wissam Mallouli, Jean-Marie Orset, Ana R. Cavalli, Nora Cuppens-Boulahia, Frédéric Cuppens
    A formal approach for testing security rules. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:127-132 [Conf]
  12. Frédéric Cuppens, Nora Cuppens-Boulahia, Meriam Ben Ghorbel
    High Level Conflict Management Strategies in Advanced Access Control Models. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:186, n:, pp:3-26 [Journal]
  13. Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia
    Enabling automated threat response through the use of a dynamic security policy. [Citation Graph (0, 0)][DBLP]
    Journal in Computer Virology, 2007, v:3, n:3, pp:195-210 [Journal]

  14. Aggregating and Deploying Network Access Control Policies. [Citation Graph (, )][DBLP]


  15. Context Ontology for Secure Interoperability. [Citation Graph (, )][DBLP]


  16. Deploying Security Policy in Intra and Inter Workflow Management Systems. [Citation Graph (, )][DBLP]


  17. Architecture-Aware Adaptive Deployment of Contextual Security Policies. [Citation Graph (, )][DBLP]


  18. From Contextual Permission to Dynamic Pre-obligation: An Integrated Approach. [Citation Graph (, )][DBLP]


  19. Managing access and flow control requirements in distributed workflows. [Citation Graph (, )][DBLP]


  20. FORM : A Federated Rights Expression Model for Open DRM Frameworks. [Citation Graph (, )][DBLP]


  21. Security policy compliance with violation management. [Citation Graph (, )][DBLP]


  22. Semantic context aware security policy deployment. [Citation Graph (, )][DBLP]


  23. Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks. [Citation Graph (, )][DBLP]


  24. Reaction Policy Model Based on Dynamic Organizations and Threat Context. [Citation Graph (, )][DBLP]


  25. fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality. [Citation Graph (, )][DBLP]


  26. Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic. [Citation Graph (, )][DBLP]


  27. A Service Dependency Modeling Framework for Policy-Based Response Enforcement. [Citation Graph (, )][DBLP]


  28. A Service Dependency Model for Cost-Sensitive Intrusion Response. [Citation Graph (, )][DBLP]


  29. Contextual Privacy Management in Extended Role Based Access Control Model. [Citation Graph (, )][DBLP]


  30. Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking. [Citation Graph (, )][DBLP]


  31. Revocation Schemes for Delegation Licences. [Citation Graph (, )][DBLP]


  32. A Robust Reputation Scheme for Decentralized Group Management Systems. [Citation Graph (, )][DBLP]


  33. Service Dependencies in Information Systems Security. [Citation Graph (, )][DBLP]


  34. Misbehaviors Detection to Ensure Availability in OLSR. [Citation Graph (, )][DBLP]


  35. Formalization and Management of Group Obligations. [Citation Graph (, )][DBLP]


  36. OPA: Onion Policy Administration Model - Another approach to manage rights in DRM. [Citation Graph (, )][DBLP]


  37. Management of Exceptions on Access Control Policies. [Citation Graph (, )][DBLP]


  38. Negotiation of Prohibition: An Approach Based on Policy Rewriting. [Citation Graph (, )][DBLP]


  39. Interactivity for Reactive Access Control. [Citation Graph (, )][DBLP]


  40. Reliable Process for Security Policy Deployment. [Citation Graph (, )][DBLP]


  41. An Extended Role-Based Access Control Model for Delegating Obligations. [Citation Graph (, )][DBLP]


  42. Advanced Reaction Using Risk Assessment in Intrusion Detection Systems. [Citation Graph (, )][DBLP]


  43. Evaluating the Trustworthiness of Contributors in a Collaborative Environment. [Citation Graph (, )][DBLP]


  44. From state-based to event-based contextual security policies. [Citation Graph (, )][DBLP]


  45. An extended RBAC profile of XACML. [Citation Graph (, )][DBLP]


  46. Resource Classification Based Negotiation in Web Services. [Citation Graph (, )][DBLP]


  47. Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems. [Citation Graph (, )][DBLP]


  48. Model-Driven Security Policy Deployment: Property Oriented Approach. [Citation Graph (, )][DBLP]


  49. An ontology-based approach to react to network attacks. [Citation Graph (, )][DBLP]


  50. Automated reaction based on risk analysis and attackers skills in intrusion detection systems. [Citation Graph (, )][DBLP]


  51. A secured delegation of remote services on IPv6 home networks. [Citation Graph (, )][DBLP]


  52. XeNA: an access negotiation framework using XACML. [Citation Graph (, )][DBLP]


  53. Aggregating and Deploying Network Access Control Policies [Citation Graph (, )][DBLP]


  54. Reliable Process for Security Policy Deployment [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002