2010 | ||
---|---|---|
102 | Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro, Laurent Toutain: Model-Driven Security Policy Deployment: Property Oriented Approach. ESSoS 2010: 123-139 | |
2009 | ||
101 | Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens: Deploying Security Policy in Intra and Inter Workflow Management Systems. ARES 2009: 58-65 | |
100 | Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Laurent Toutain, Yehia Elrakaiby: Semantic context aware security policy deployment. ASIACCS 2009: 251-261 | |
99 | Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, Antony Martin: Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems. CSE (3) 2009: 83-91 | |
98 | Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens: Reaction Policy Model Based on Dynamic Organizations and Threat Context. DBSec 2009: 49-64 | |
97 | Nizar Kheir, Hervé Debar, Frédéric Cuppens, Nora Cuppens-Boulahia, Jouni Viinikka: A Service Dependency Modeling Framework for Policy-Based Response Enforcement. DIMVA 2009: 176-195 | |
96 | Yehia Elrakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia: From state-based to event-based contextual security policies. ICDIM 2009: 241-247 | |
95 | Yehia Elrakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia: Formalization and Management of Group Obligations. POLICY 2009: 158-165 | |
94 | Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula: An Extended Role-Based Access Control Model for Delegating Obligations. TrustBus 2009: 127-137 | |
93 | Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar: XeNA: an access negotiation framework using XACML. Annales des Télécommunications 64(1-2): 155-169 (2009) | |
92 | Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro, Laurent Toutain: Reliable Process for Security Policy Deployment CoRR abs/0905.1362: (2009) | |
2008 | ||
91 | Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens: Managing access and flow control requirements in distributed workflows. AICCSA 2008: 702-710 | |
90 | Céline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli: Context Ontology for Secure Interoperability. ARES 2008: 821-827 | |
89 | Cam Tu Phan Le, Frédéric Cuppens, Nora Cuppens-Boulahia, Patrick Maillé: Evaluating the Trustworthiness of Contributors in a Collaborative Environment. CollaborateCom 2008: 451-460 | |
88 | Nora Cuppens-Boulahia, Frédéric Cuppens: Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic. DEON 2008: 65-80 | |
87 | Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula: Revocation Schemes for Delegation Licences. ICICS 2008: 190-205 | |
86 | Frédéric Cuppens, Nora Cuppens-Boulahia, Julien A. Thomas: A Robust Reputation Scheme for Decentralized Group Management Systems. ICISS 2008: 71-85 | |
85 | Nora Cuppens-Boulahia, Frédéric Cuppens, Diala Abi Haidar, Hervé Debar: Negotiation of Prohibition: An Approach Based on Policy Rewriting. SEC 2008: 173-187 | |
84 | Yehia Elrakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia: Interactivity for Reactive Access Control. SECRYPT 2008: 57-64 | |
83 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia: Aggregating and Deploying Network Access Control Policies CoRR abs/0803.0653: (2008) | |
82 | Joaquín García-Alfaro, Nora Boulahia-Cuppens, Frédéric Cuppens: Complete analysis of configuration rules to guarantee reliable network security policies. Int. J. Inf. Sec. 7(2): 103-122 (2008) | |
81 | Frédéric Cuppens, Nora Cuppens-Boulahia: Modeling contextual security policies. Int. J. Inf. Sec. 7(4): 285-305 (2008) | |
2007 | ||
80 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia: Aggregating and Deploying Network Access Control Policies. ARES 2007: 532-542 | |
79 | Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens: An Integrated Model for Access Control and Information Flow Requirements. ASIAN 2007: 111-125 | |
78 | Julien Brunel, Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Jean-Paul Bodeveix: Security policy compliance with violation management. FMSE 2007: 31-40 | |
77 | Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar: Resource Classification Based Negotiation in Web Services. IAS 2007: 313-318 | |
76 | Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans: XML-BB: A Model to Handle Relationships Protection in XML Documents. KES (3) 2007: 1107-1114 | |
75 | Frédéric Cuppens, Nora Cuppens-Boulahia, Tony Ramard, Julien A. Thomas: Misbehaviors Detection to Ensure Availability in OLSR. MSN 2007: 799-813 | |
74 | Wissam Mallouli, Jean-Marie Orset, Ana R. Cavalli, Nora Cuppens-Boulahia, Frédéric Cuppens: A formal approach for testing security rules. SACMAT 2007: 127-132 | |
73 | Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia: OPA: Onion Policy Administration Model - Another approach to manage rights in DRM. SEC 2007: 349-360 | |
72 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia: Management of Exceptions on Access Control Policies. SEC 2007: 97-108 | |
71 | Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro, Laurent Toutain: Reliable Process for Security Policy Deployment. SECRYPT 2007: 5-15 | |
70 | Frédéric Cuppens, Nora Cuppens-Boulahia, Meriam Ben Ghorbel: High Level Conflict Management Strategies in Advanced Access Control Models. Electr. Notes Theor. Comput. Sci. 186: 3-26 (2007) | |
69 | Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia: Enabling automated threat response through the use of a dynamic security policy. Journal in Computer Virology 3(3): 195-210 (2007) | |
2006 | ||
68 | Frédéric Cuppens, Nora Cuppens-Boulahia, Tony Ramard: Availability Enforcement by Obligations and Aspects Identification. ARES 2006: 229-239 | |
67 | Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia: FORM : A Federated Rights Expression Model for Open DRM Frameworks. ASIAN 2006: 45-59 | |
66 | Hervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens: Using Contextual Security Policies for Threat Response. DIMVA 2006: 109-128 | |
65 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia: Analysis of Policy Anomalies on Distributed Network Security Setups. ESORICS 2006: 496-511 | |
64 | Frédéric Cuppens, Nora Cuppens-Boulahia, Céline Coma: O2O: Virtual Private Organizations to Manage Security Policy Interoperability. ICISS 2006: 101-115 | |
63 | Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia: Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. SAFECOMP 2006: 182-194 | |
62 | Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia: A Flexible and Distributed Architecture to Enforce Dynamic Access Control. SEC 2006: 183-195 | |
61 | Yacine Bouzida, Frédéric Cuppens: Detecting Known and Novel Network Intrusions. SEC 2006: 258-270 | |
60 | Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar: An extended RBAC profile of XACML. SWS 2006: 13-22 | |
59 | Frédéric Cuppens, Fabien Autrel, Yacine Bouzida, Joaquín García, Sylvain Gombault, Thierry Sans: Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Annales des Télécommunications 61(1-2): 197-217 (2006) | |
58 | Frédéric Cuppens, Hervé Debar, Elisa Bertino: Foreword. Annales des Télécommunications 61(3-4): 242-244 (2006) | |
2005 | ||
57 | Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans: Nomad: A Security Model with Non Atomic Actions and Deadlines. CSFW 2005: 186-196 | |
56 | Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans: Protection of Relationships in XML Documents with the XML-BB Model. ICISS 2005: 148-163 | |
55 | Joaquín García, Frédéric Cuppens, Fabien Autrel, Jordi Castellà-Roca, Joan Borrell, Guillermo Navarro, Jose A. Ortega-Ruiz: Protecting On-Line Casinos against Fraudulent Player Drop-Out. ITCC (1) 2005: 500-505 | |
2004 | ||
54 | Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France Kluwer 2004 | |
53 | Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France Kluwer 2004 | |
52 | Frédéric Cuppens, Sylvain Gombault, Thierry Sans: Selecting Appropriate Counter-Measures in an Intrusion Detection Framework. CSFW 2004: 78-87 | |
51 | Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Alexandre Miège: A Formal Approach to Specify and Deploy a Network Security Policy. Formal Aspects in Security and Trust 2004: 203-218 | |
50 | Joaquín García, Fabien Autrel, Joan Borrell, Sergio Castillo, Frédéric Cuppens, Guillermo Navarro: Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation. ICICS 2004: 223-235 | |
49 | Souhila Kaci, Abdeslam Ali-Laouar, Frédéric Cuppens: Health care and social inference systems: An unauthorized inference control based on fuzzy logic. WOSIS 2004: 217-226 | |
48 | Frédéric Cuppens, Alexandre Miège: AdOrBAC: an administration model for Or-BAC. Comput. Syst. Sci. Eng. 19(3): (2004) | |
47 | Hervé Debar, Benjamin Morin, Frédéric Cuppens, Fabien Autrel, Ludovic Mé, Bernard Vivinis, Salem Benferhat, Mireille Ducassé, Rodolphe Ortalo: Détection d'intrusions : corrélation d'alertes. Technique et Science Informatiques 23(3): 359-390 (2004) | |
2003 | ||
46 | Frédéric Cuppens, Alexandre Miège: Modelling Contexts in the Or-BAC Model. ACSAC 2003: 416-427 | |
45 | Salem Benferhat, Rania El Baida, Frédéric Cuppens: A Possibilistic Logic Encoding of Access Control. FLAIRS Conference 2003: 481-485 | |
44 | Salem Benferhat, Fabien Autrel, Frédéric Cuppens: Enhanced Correlation in an Intrusion Detection Process. MMM-ACNS 2003: 157-170 | |
43 | Frédéric Cuppens, Alexandre Miège: Administration Model for Or-BAC. OTM Workshops 2003: 754-768 | |
42 | Anas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida, Frédéric Cuppens, Claire Saurel, Philippe Balbiani, Yves Deswarte, Gilles Trouessin: Organization based access contro. POLICY 2003: 120- | |
41 | Salem Benferhat, Rania El Baida, Frédéric Cuppens: A stratification-based approach for handling conflicts in access control. SACMAT 2003: 189-195 | |
2002 | ||
40 | Frédéric Cuppens, Fabien Autrel, Alexandre Miège, Salem Benferhat: Recognizing Malicious Intention in an Intrusion Detection Process. HIS 2002: 806-817 | |
39 | Frédéric Cuppens, Alexandre Miège: Alert Correlation in a Cooperative Intrusion Detection Framework. IEEE Symposium on Security and Privacy 2002: 202-215 | |
2001 | ||
38 | Frédéric Cuppens: Managing Alerts in a Multi-Intrusion Detection Environmen. ACSAC 2001: 22-31 | |
37 | Frédéric Cuppens, Alban Gabillon: Cover story management. Data Knowl. Eng. 37(2): 177-201 (2001) | |
36 | Isabelle Bloch, Anthony Hunter, Alain Appriou, André Ayoun, Salem Benferhat, Philippe Besnard, Laurence Cholvy, Roger Cooke, Frédéric Cuppens, Didier Dubois, Hélène Fargier, Michel Grabisch, Rudolf Kruse, Jérôme Lang, Serafín Moral, Henri Prade, Alessandro Saffiotti, Philippe Smets, Claudio Sossai: Fusion: General concepts and characteristics. Int. J. Intell. Syst. 16(10): 1107-1134 (2001) | |
35 | Frédéric Cuppens, Laurence Cholvy, Claire Saurel, Jérôme Carrère: Merging regulations: Analysis of a practical example. Int. J. Intell. Syst. 16(11): 1223-1243 (2001) | |
2000 | ||
34 | Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings Springer 2000 | |
33 | Jérôme Carrère, Frédéric Cuppens, Claire Saurel: LExIS: A Query Language to Scan Information Flow. NLDB 2000: 369 | |
32 | Frédéric Cuppens, Rodolphe Ortalo: LAMBDA: A Language to Model a Database for Detection of Attacks. Recent Advances in Intrusion Detection 2000: 197-216 | |
1999 | ||
31 | Frédéric Cuppens, Alban Gabillon: Logical Foundations of Multilevel Databases. Data Knowl. Eng. 29(3): 259-291 (1999) | |
1998 | ||
30 | Frédéric Cuppens, Laurence Cholvy, Claire Saurel, Jérôme Carrère: Merging Security Policies: Analysis of a Practical Example. CSFW 1998: 123-136 | |
29 | Jérôme Carrère, Frédéric Cuppens, Claire Saurel: SACADDOS: A Support Tool to Manage Multilevel Documents. DBSec 1998: 173-188 | |
28 | Frédéric Cuppens, Alban Gabillon: Rules for Designing Multilevel Object-Oriented Databases. ESORICS 1998: 159-174 | |
27 | Frédéric Cuppens, Claire Saurel: A Logical Formalization of Integrity Policies for Database Management Systems. IICIS 1998: 231-254 | |
1997 | ||
26 | Laurence Cholvy, Frédéric Cuppens, Claire Saurel: Towards a Logical Formalization of Responsibility. ICAIL 1997: 233-242 | |
25 | Laurence Cholvy, Frédéric Cuppens: Analyzing Consistency of Security Policies. IEEE Symposium on Security and Privacy 1997: 103-112 | |
24 | Frédéric Cuppens, Robert Demolombe: A Modal Logical Framework for Security Policies. ISMIS 1997: 579-589 | |
1996 | ||
23 | Frédéric Cuppens, Alban Gabillon: Formalisation de la Confidentialité dans une Base de Données à Objets. BDA 1996: 417- | |
22 | Frédéric Cuppens, Claire Saurel: Specifying a security policy: a case study. CSFW 1996: 123- | |
21 | Frédéric Cuppens, Alban Gabillon: A Logical Approach to Model a Multilevel Object-Oriented Database. DBSec 1996: 145-166 | |
20 | Frédéric Cuppens, Robert Demolombe: A Deontic Logic for Reasoning about Confidentiality. DEON 1996: 66-79 | |
19 | Frédéric Cuppens: Querying a Multilevel Database: A Logical Analysis. VLDB 1996: 484-494 | |
1995 | ||
18 | Frédéric Cuppens, Alban Gabillon: Modelling a Multilevel Database with Temporal Downgrading Functionalities. DBSec 1995: 145-164 | |
17 | Laurence Cholvy, Frédéric Cuppens: Solving Normative Conflicts by Merging Roles. ICAIL 1995: 201-209 | |
1994 | ||
16 | Laurence Cholvy, Frédéric Cuppens: Providing Consistent Views in a Polyinstantiated Database. DBSec 1994: 277-296 | |
15 | Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian: Decomposition of Multilevel Objects in an Object-Oriented Database. ESORICS 1994: 375-402 | |
14 | Frédéric Cuppens, Gilles Trouessin: Information Flow Controls vs Interference Controls: An Integrated Approach. ESORICS 1994: 447-468 | |
1993 | ||
13 | Frédéric Cuppens: A Logical Formalization of Secrecy. CSFW 1993: 53-62 | |
12 | Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian: Multilevel Security in Object-Oriented Databases. Security for Object-Oriented Systems 1993: 79-89 | |
1992 | ||
11 | Pierre Bieber, Frédéric Cuppens: Secure Dependencies with Dynamic Level Assignments. CSFW 1992: 63-75 | |
10 | Pierre Bieber, Frédéric Cuppens: A Logical View of Secure Dependencies. Journal of Computer Security 1(1): 99-130 (1992) | |
1991 | ||
9 | Pierre Bieber, Frédéric Cuppens: A Definition of Secure Dependencies Using the Logic of Security. CSFW 1991: 2-11 | |
8 | Frédéric Cuppens, Kioumars Yazdanian: Logic Hints and Security in Relational Databases. DBSec 1991: 227-238 | |
7 | Frédéric Cuppens: A Modal Logic Framework to Solve Aggregation Problems. DBSec 1991: 315-332 | |
1990 | ||
6 | Frédéric Cuppens: An Epistemic and Deontic Logic for Reasoning about Computer Security. ESORICS 1990: 135-145 | |
1989 | ||
5 | Frédéric Cuppens: Un langage de requêtes pour obtenir des résponses intelligentes. BDA 1989: 249- | |
4 | Frédéric Cuppens, Robert Demolombe: How to recognize interesting topics to provide cooperative answering. Inf. Syst. 14(2): 163-173 (1989) | |
1988 | ||
3 | Frédéric Cuppens, Robert Demolombe: Comment reconnaître les centres d'intérêt pour fournir des réponses coopératives. BDA 1988: 257- | |
2 | Frédéric Cuppens, Robert Demolombe: Cooperative Answering: A Methodology to Provide Intelligent Access to databases. Expert Database Conf. 1988: 621-643 | |
1 | Frédéric Cuppens, Robert Demolombe: A Prolog-Relational DBMS Interface Using Delayed Evaluation. JCDKB 1988: 135-148 |