default search action
Frédéric Cuppens
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j54]Mohamed Amine Merzouk, Christopher Neal, Joséphine Delas, Reda Yaich, Nora Boulahia-Cuppens, Frédéric Cuppens:
Adversarial robustness of deep reinforcement learning-based intrusion detection. Int. J. Inf. Sec. 23(6): 3625-3651 (2024) - [c236]Kéren Saint-Hilaire, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Makhlouf Hadji:
Optimal Automated Generation of Playbooks. DBSec 2024: 191-199 - [c235]Marc-Antoine Faillon, Baptiste Bout, Julien Francq, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens, Reda Yaich:
How to Better Fit Reinforcement Learning for Pentesting: A New Hierarchical Approach. ESORICS (4) 2024: 313-332 - [e25]Abderrahim Ait Wakrime, Guillermo Navarro-Arribas, Frédéric Cuppens, Nora Cuppens, Rédouane Benaini:
Risks and Security of Internet and Systems - 18th International Conference, CRiSIS 2023, Rabat, Morocco, December 6-8, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14529, Springer 2024, ISBN 978-3-031-61230-5 [contents] - [e24]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens-Boulahia, Costas Lambrinoudakis, Joaquín García-Alfaro, Guillermo Navarro-Arribas, Pantaleone Nespoli, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis:
Computer Security. ESORICS 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I. Lecture Notes in Computer Science 14398, Springer 2024, ISBN 978-3-031-54203-9 [contents] - [i10]Lucas Schott, Joséphine Delas, Hatem Hajri, Elies Gherbi, Reda Yaich, Nora Boulahia-Cuppens, Frédéric Cuppens, Sylvain Lamprier:
Robust Deep Reinforcement Learning Through Adversarial Attacks and Training : A Survey. CoRR abs/2403.00420 (2024) - [i9]Mohamed Amine Merzouk, Erwan Beurier, Reda Yaich, Nora Boulahia-Cuppens, Frédéric Cuppens:
Diffusion-based Adversarial Purification for Intrusion Detection. CoRR abs/2406.17606 (2024) - [i8]Florian Le Mouël, Maxime Godon, Renaud Brien, Erwan Beurier, Nora Boulahia-Cuppens, Frédéric Cuppens:
Trustless Distributed Symmetric-key Encryption. CoRR abs/2408.16137 (2024) - 2023
- [j53]Ahmad Samer Wazan, Frédéric Cuppens:
Cybersecurity in networking: adaptations, investigation, attacks, and countermeasures. Ann. des Télécommunications 78(3-4): 133-134 (2023) - [j52]Esma Aïmeur, Maryline Laurent, Reda Yaich, Benoît Dupont, Frédéric Cuppens:
Foreword of the special issue on « FPS 2021» symposium. Ann. des Télécommunications 78(7-8): 383 (2023) - [c234]Axel Charpentier, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens, Reda Yaich:
Real-Time Defensive Strategy Selection via Deep Reinforcement Learning. ARES 2023: 15:1-15:11 - [c233]Mohamed Amine Merzouk, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich:
Parameterizing poisoning attacks in federated learning-based intrusion detection. ARES 2023: 104:1-104:8 - [c232]Aicha Miloudi, Luis Carlos Suárez, Nora Boulahia-Cuppens, Frédéric Cuppens, Stere Preda:
Trust Management Framework for Containerized Workloads Applications to 5G Networks. ACNS Workshops 2023: 378-393 - [c231]Victor Aurora, Christopher Neal, Alexandre Proulx, Nora Boulahia-Cuppens, Frédéric Cuppens:
Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection. FPS (1) 2023: 53-68 - [c230]Pierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens, Alexandre Proulx:
Automated Attacker Behaviour Classification Using Threat Intelligence Insights. FPS (1) 2023: 285-301 - [c229]Colin Stephenne, Felipe Gohring de Magalhaes, Frédéric Cuppens, Jean-Yves Ouattara, Militza Jean, Jose Fernandez, Gabriela Nicolescu:
Security assessment of a commercial router using physical access: a case study. RSP 2023: 09:1-09:7 - [c228]Kéren Saint-Hilaire, Frédéric Cuppens, Nora Cuppens, Joaquín García-Alfaro:
Automated Enrichment of Logical Attack Graphs via Formal Ontologies. SEC 2023: 59-72 - [e23]Slim Kallel, Mohamed Jmaiel, Mohammad Zulkernine, Ahmed Hadj Kacem, Frédéric Cuppens, Nora Cuppens:
Risks and Security of Internet and Systems - 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13857, Springer 2023, ISBN 978-3-031-31107-9 [contents] - [e22]Sokratis K. Katsikas, Frédéric Cuppens, Christos Kalloniatis, John Mylopoulos, Frank Pallas, Jörg Pohle, M. Angela Sasse, Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Massimiliano Albanese, Basel Katt, Sandeep Pirbhulal, Ankur Shukla:
Computer Security. ESORICS 2022 International Workshops - CyberICPS 2022, SECPRE 2022, SPOSE 2022, CPS4CIP 2022, CDT&SECOMANE 2022, EIS 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13785, Springer 2023, ISBN 978-3-031-25459-8 [contents] - 2022
- [j51]Mohamed Amine Merzouk, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich:
Investigating the practicality of adversarial evasion attacks on network intrusion detection. Ann. des Télécommunications 77(11-12): 763-775 (2022) - [c227]Mohamed Amine Merzouk, Joséphine Delas, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich:
Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks. ARES 2022: 31:1-31:6 - [c226]Axel Charpentier, Nora Boulahia-Cuppens, Frédéric Cuppens, Reda Yaich:
Deep Reinforcement Learning-Based Defense Strategy Selection. ARES 2022: 110:1-110:11 - [c225]Pierre Crochelet, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens:
Attacker Attribution via Characteristics Inference Using Honeypot Data. NSS 2022: 155-169 - [e21]Bo Luo, Mohamed Mosbah, Frédéric Cuppens, Lotfi Ben Othmane, Nora Cuppens, Slim Kallel:
Risks and Security of Internet and Systems - 16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 12-13, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13204, Springer 2022, ISBN 978-3-031-02066-7 [contents] - [i7]Kéren Saint-Hilaire, Frédéric Cuppens, Nora Cuppens, Joaquín García-Alfaro:
Ontology-based Attack Graph Enrichment. CoRR abs/2202.04016 (2022) - 2021
- [j50]Michel Barbeau, Frédéric Cuppens, Nora Cuppens, Romain Dagnas, Joaquín García-Alfaro:
Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics. IEEE Access 9: 46462-46475 (2021) - [j49]Renzo E. Navas, Frédéric Cuppens, Nora Boulahia-Cuppens, Laurent Toutain, Georgios Z. Papadopoulos:
Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming. Comput. Networks 187: 107751 (2021) - [j48]Renzo E. Navas, Frédéric Cuppens, Nora Boulahia-Cuppens, Laurent Toutain, Georgios Z. Papadopoulos:
MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT. IEEE Internet Things J. 8(10): 7818-7832 (2021) - [j47]Slim Kallel, Frédéric Cuppens, Nora Boulahia-Cuppens, Ahmed Hadj Kacem, Lotfi Ben Othmane:
Special issue on risk and security of smart systems. J. Inf. Secur. Appl. 61: 102925 (2021) - [c224]Guillaume Ansel, Dominique Pastor, Frédéric Cuppens, Nora Boulahia-Cuppens:
Asymptotic Random Distortion Testing and Application to Change-in-Mean Detection. ISIVC 2021: 1-6 - 2020
- [c223]Anis Bkakria, Nora Cuppens, Frédéric Cuppens:
Privacy-Preserving Pattern Matching on Encrypted Data. ASIACRYPT (2) 2020: 191-220 - [c222]Edwin Bourget, Frédéric Cuppens, Nora Cuppens-Boulahia:
PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis. CPSS@AsiaCCS 2020: 30-41 - [c221]Mohamed Amine Merzouk, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich:
A Deeper Analysis of Adversarial Examples in Intrusion Detection. CRiSIS 2020: 67-84 - [c220]Farah Dernaika, Nora Cuppens-Boulahia, Frédéric Cuppens, Olivier Raynaud:
A Posteriori Analysis of Policy Temporal Compliance. CRiSIS 2020: 133-148 - [c219]Luis Carlos Suárez, David Espes, Frédéric Cuppens, Cao-Thanh Phan, Philippe Bertin, Philippe Le Parc:
Managing Secure Inter-slice Communication in 5G Network Slice Chains. DBSec 2020: 24-41 - [c218]Manel Smine, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
Network Functions Virtualization Access Control as a Service. DBSec 2020: 100-117 - [c217]Manel Smine, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens, Marc-Oliver Pahl:
A Priority-Based Domain Type Enforcement for Exception Management. FPS 2020: 65-81 - [c216]Renzo E. Navas, Håkon Sandaker, Frédéric Cuppens, Nora Cuppens, Laurent Toutain, Georgios Z. Papadopoulos:
IANVS: A Moving Target Defense Framework for a Resilient Internet of Things. ISCC 2020: 1-6 - [c215]Luis Carlos Suárez, David Espes, Frédéric Cuppens, Philippe Bertin, Cao-Thanh Phan, Philippe Le Parc:
Formalization of a security access control model for the 5G system. NOF 2020: 150-158 - [c214]Farah Dernaika, Nora Cuppens-Boulahia, Frédéric Cuppens, Olivier Raynaud:
Accountability in the A Posteriori Access Control: A Requirement and a Mechanism. QUATIC 2020: 332-342 - [c213]Michel Barbeau, Frédéric Cuppens, Nora Cuppens, Romain Dagnas, Joaquín García-Alfaro:
Metrics to Enhance the Resilience of Cyber-Physical Systems. TrustCom 2020: 1167-1172 - [p1]Frédéric Cuppens, Christophe Garion, Guillaume Piolle, Nora Cuppens-Boulahia:
Norms and Deontic Logic. A Guided Tour of Artificial Intelligence Research (1) (I) 2020: 253-274 - [e20]Slim Kallel, Frédéric Cuppens, Nora Cuppens-Boulahia, Ahmed Hadj Kacem:
Risks and Security of Internet and Systems, 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings. Lecture Notes in Computer Science 12026, Springer 2020, ISBN 978-3-030-41567-9 [contents] - [e19]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Frank Pallas, Jörg Pohle, M. Angela Sasse, Weizhi Meng, Steven Furnell, Joaquín García-Alfaro:
Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers. Lecture Notes in Computer Science 11980, Springer 2020, ISBN 978-3-030-42047-5 [contents] - [e18]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis, Weizhi Meng, Steven Furnell:
Computer Security - ESORICS 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12501, Springer 2020, ISBN 978-3-030-64329-4 [contents] - [i6]Anis Bkakria, Nora Cuppens, Frédéric Cuppens:
Privacy-Preserving Pattern Matching on Encrypted Data. IACR Cryptol. ePrint Arch. 2020: 422 (2020)
2010 – 2019
- 2019
- [c212]Thomas Clédel, Nora Cuppens, Frédéric Cuppens:
Managing the Overestimation of Resilience. ARES 2019: 35:1-35:10 - [c211]Farah Dernaika, Nora Cuppens-Boulahia, Frédéric Cuppens, Olivier Raynaud:
Semantic Mediation for A Posteriori Log Analysis. ARES 2019: 88:1-88:10 - [c210]Luis Carlos Suárez, David Espes, Philippe Le Parc, Frédéric Cuppens:
Defining a communication service management function for 5G network slices. EuCNC 2019: 144-148 - [e17]Akka Zemmari, Mohamed Mosbah, Nora Cuppens-Boulahia, Frédéric Cuppens:
Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11391, Springer 2019, ISBN 978-3-030-12142-6 [contents] - [e16]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie I. Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis:
Computer Security - ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11387, Springer 2019, ISBN 978-3-030-12785-5 [contents] - [i5]Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro:
Misconfiguration Management of Network Security Components. CoRR abs/1912.07283 (2019) - 2018
- [j46]Samiha Ayed, Muhammad Sabir Idrees, Nora Cuppens, Frédéric Cuppens:
Achieving dynamicity in security policies enforcement using aspects. Int. J. Inf. Sec. 17(1): 83-103 (2018) - [j45]Tarik Moataz, Indrajit Ray, Indrakshi Ray, Abdullatif Shikfa, Frédéric Cuppens, Nora Cuppens:
Substring search over encrypted data. J. Comput. Secur. 26(1): 1-30 (2018) - [c209]Renzo E. Navas, Hélène Le Bouder, Nora Cuppens, Frédéric Cuppens, Georgios Z. Papadopoulos:
Demo: Do Not Trust Your Neighbors! A Small IoT Platform Illustrating a Man-in-the-Middle Attack. ADHOC-NOW 2018: 120-125 - [c208]Frédéric Cuppens, Nora Cuppens-Boulahia:
Stratification Based Model for Security Policy with Exceptions and Contraries to Duty. From Database to Cyber Security 2018: 78-103 - [c207]Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems. CRiSIS 2018: 35-40 - [c206]Ivan Marco Lobe Kome, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey:
A Certificate-Less Key Exchange Protocol for IoT. CRiSIS 2018: 65-79 - [c205]Manel Smine, Nora Cuppens, Frédéric Cuppens:
Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense. CRiSIS 2018: 158-171 - [c204]Anis Bkakria, Aimilia Tasidou, Nora Cuppens-Boulahia, Frédéric Cuppens, Fatma Bouattour, Feten Ben Fredj:
Optimal Distribution of Privacy Budget in Differential Privacy. CRiSIS 2018: 222-236 - [c203]Thomas Clédel, Simon N. Foley, Nora Cuppens, Frédéric Cuppens, Yvon Kermarrec, Frédéric Dubois, Youssef Laarouchi, Gérard Le Comte:
Towards the Evaluation of End-to-End Resilience Through External Consistency. CSS 2018: 99-114 - [c202]Edwin Bourget, Frédéric Cuppens, Nora Cuppens-Boulahia, Samuel Dubus, Simon N. Foley, Youssef Laarouchi:
Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes. DBSec 2018: 38-47 - [c201]Anis Bkakria, Nora Cuppens-Boulahia, Frédéric Cuppens:
Linking Differential Identifiability with Differential Privacy. ICICS 2018: 232-247 - [c200]Xiaoshu Ji, Gurvan Le Guernic, Nora Cuppens-Boulahia, Frédéric Cuppens:
USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework. ICICS 2018: 732-742 - [c199]Marco Lobe Kome, Frédéric Cuppens, Nora Cuppens-Boulahia, Vincent Frey:
CoAP Enhancement for a Better IoT Centric Protocol: CoAP 2.0. IoTSMS 2018: 139-146 - [c198]Mariem Graa, Ivan Marco Lobe Kome, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey:
Detection and Response to Data Exfiltration from Internet of Things Android Devices. SEC 2018: 339-354 - [e15]Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquín García-Alfaro:
Risks and Security of Internet and Systems - 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10694, Springer 2018, ISBN 978-3-319-76686-7 [contents] - [e14]Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Christos Kalloniatis, John Mylopoulos, Annie I. Antón, Stefanos Gritzalis:
Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10683, Springer 2018, ISBN 978-3-319-72816-2 [contents] - [e13]Giancarlo Fortino, Carlos Enrique Palau, Antonio Guerrieri, Nora Cuppens, Frédéric Cuppens, Hakima Chaouchi, Alban Gabillon:
Interoperability, Safety and Security in IoT - Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 242, Springer 2018, ISBN 978-3-319-93796-0 [contents] - 2017
- [c197]Reda Yaich, Nora Cuppens, Frédéric Cuppens:
Enabling Trust Assessment In Clouds-of-Clouds: A Similarity-Based Approach. ARES 2017: 8:1-8:9 - [c196]Nora Cuppens, Salaheddine Zerkane, Yanhuang Li, David Espes, Philippe Le Parc, Frédéric Cuppens:
Firewall Policies Provisioning Through SDN in the Cloud. DBSec 2017: 293-310 - [c195]Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
wirelessOrBAC: Towards an access-control-based IDS for Wireless Sensor Networks. ICCNS 2017: 96-103 - [c194]Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:
Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems. ICISS 2017: 127-145 - [c193]Marco Lobe Kome, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey:
DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT. ICISS 2017: 243-262 - [c192]Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
wIDS: A Multilayer IDS for Wireless-Based SCADA Systems. ICISS 2017: 387-404 - [c191]Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:
Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper). PST 2017: 253-258 - [c190]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet, Routa Moussaileb:
Detection of Side Channel Attacks Based on Data Tainting in Android Systems. SEC 2017: 205-218 - [e12]Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet, Axel Legay:
Risks and Security of Internet and Systems - 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10158, Springer 2017, ISBN 978-3-319-54875-3 [contents] - [e11]Nora Cuppens-Boulahia, Costas Lambrinoudakis, Frédéric Cuppens, Sokratis K. Katsikas:
Security of Industrial Control Systems and Cyber-Physical Systems - Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10166, Springer 2017, ISBN 978-3-319-61436-6 [contents] - [e10]Frédéric Cuppens, Lingyu Wang, Nora Cuppens-Boulahia, Nadia Tawbi, Joaquín García-Alfaro:
Foundations and Practice of Security - 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10128, Springer 2017, ISBN 978-3-319-51965-4 [contents] - 2016
- [j44]Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Guy Pujolle:
Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform. World Wide Web 19(1): 41-68 (2016) - [c189]Lyes Bayou, Nora Cuppens-Boulahia, David Espes, Frédéric Cuppens:
Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks. ARES 2016: 157-166 - [c188]Salaheddine Zerkane, David Espes, Philippe Le Parc, Frédéric Cuppens:
A Proactive Stateful Firewall for Software Defined Networking. CRiSIS 2016: 123-138 - [c187]Tarek Bouyahia, Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel:
Multi-Criteria Recommender Approach for Supporting Intrusion Response System. FPS 2016: 51-67 - [c186]Salaheddine Zerkane, David Espes, Philippe Le Parc, Frédéric Cuppens:
Vulnerability Analysis of Software Defined Networking. FPS 2016: 97-116 - [c185]Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
Security Analysis of WirelessHART Communication Scheme. FPS 2016: 223-238 - [c184]Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia:
Building a Fair System Using Access Rights. ICISS 2016: 89-108 - [c183]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:
Tracking Explicit and Control Flows in Java and Native Android Apps Code. ICISSP 2016: 307-316 - [c182]Nada Essaouini, Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens:
Toward an off-line analysis of obligation with deadline policies. PST 2016: 178-186 - [c181]Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia:
Towards a new generation of industrial firewalls: Operational-process aware filtering. PST 2016: 615-622 - [c180]Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey:
Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud. SEC 2016: 105-118 - [c179]Salaheddine Zerkane, David Espes, Philippe Le Parc, Frédéric Cuppens:
Software Defined Networking Reactive Stateful Firewall. SEC 2016: 119-132 - [e9]Adrien Bécue, Nora Cuppens-Boulahia, Frédéric Cuppens, Sokratis K. Katsikas, Costas Lambrinoudakis:
Security of Industrial Control Systems and Cyber Physical Systems - First Workshop, CyberICS 2015 and First Workshop, WOS-CPS 2015, Vienna, Austria, September 21-22, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9588, Springer 2016, ISBN 978-3-319-40384-7 [contents] - 2015
- [j43]Hanieh Azkia, Nora Cuppens-Boulahia, Frédéric Cuppens, Gouenou Coatrieux, Said Oulmakhzoune:
Deployment of a posteriori access control using IHE ATNA. Int. J. Inf. Sec. 14(5): 471-483 (2015) - [j42]Safaà Hachana, Nora Cuppens-Boulahia, Frédéric Cuppens:
Mining a high level access control policy in a network with multiple firewalls. J. Inf. Secur. Appl. 20: 61-73 (2015) - [c178]Tarek Bouyahia, Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens:
Context Aware Intrusion Response Based on Argumentation Logic. CRiSIS 2015: 91-106 - [c177]Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
Security Issue of WirelessHART Based SCADA Systems. CRiSIS 2015: 225-241 - [c176]Ibrahim Lazrig, Tarik Moataz, Indrajit Ray, Indrakshi Ray, Toan Ong, Michael G. Kahn, Frédéric Cuppens, Nora Cuppens-Boulahia:
Privacy Preserving Record Matching Using Automated Semi-trusted Broker. DBSec 2015: 103-118 - [c175]Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens:
WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks Simulator. CyberICS/WOS-CPS@ESORICS 2015: 63-78 - [c174]Léa El Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Serge Papillon, Waël Kanoun, Samuel Dubus:
On the Fly Design and Co-simulation of Responses Against Simultaneous Attacks. ESORICS (2) 2015: 642-661 - [c173]Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard:
Security Mechanisms Planning to Enforce Security Policies. FPS 2015: 85-101 - [c172]Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey, Xiaoshu Ji:
Similarity Measure for Security Policies in Service Provider Selection. ICISS 2015: 227-242 - [c171]Javier Franco-Contreras, Gouenou Coatrieux, Philippe Massari, Stéfan Jacques Darmoni, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux:
Data Quality Evaluation in Medical Database Watermarking. MIE 2015: 276-280 - [c170]Samiha Ayed, Muhammad Sabir Idrees, Nora Cuppens-Boulahia, Frédéric Cuppens:
Dynamic deployment of access and usage control policies using aspects. CFIP/NOTERE 2015: 1-6 - [c169]Salvador Martínez Perez, Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Jordi Cabot:
Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems. SEC 2015: 218-233 - [c168]Muhammad Sabir Idrees, Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Dynamic Security Policies Enforcement and Adaptation Using Aspects. TrustCom/BigDataSE/ISPA (1) 2015: 1374-1379 - [e8]Frédéric Cuppens, Joaquín García-Alfaro, Nur Zincir-Heywood, Philip W. L. Fong:
Foundations and Practice of Security - 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8930, Springer 2015, ISBN 978-3-319-17039-8 [contents] - 2014
- [j41]Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci, Mahmoud Barhamgi, Djamal Benslimane:
Privacy query rewriting algorithm instrumented by a privacy-aware access control model. Ann. des Télécommunications 69(1-2): 3-19 (2014) - [j40]Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam:
Conflict detection in obligation with deadline policies. EURASIP J. Inf. Secur. 2014: 13 (2014) - [j39]Hanieh Azkia, Nora Cuppens-Boulahia, Frédéric Cuppens, Gouenou Coatrieux:
Log content extraction engine based on ontology for the purpose of a posteriori access control. Int. J. Knowl. Learn. 9(1/2): 23-42 (2014) - [j38]Wiem Tounsi, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Yannick Chevalier, Frédéric Cuppens:
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems. J. Netw. Comput. Appl. 39: 152-166 (2014) - [j37]Javier Franco-Contreras, Gouenou Coatrieux, Frédéric Cuppens, Nora Cuppens-Boulahia, Christian Roux:
Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation. IEEE Trans. Inf. Forensics Secur. 9(3): 397-410 (2014) - [c167]Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard:
Specification and Deployment of Integrated Security Policies for Outsourced Data. DBSec 2014: 17-32 - [c166]Tarik Moataz, Benjamin Justus, Indrakshi Ray, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray:
Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds. DBSec 2014: 66-81 - [c165]Tarik Moataz, Nora Cuppens-Boulahia, Frédéric Cuppens, Indrajit Ray, Indrakshi Ray:
ELITE: zEro Links Identity managemenT systEm. DBSec 2014: 195-210 - [c164]Javier Franco-Contreras, Gouenou Coatrieux, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux:
Ontology-guided distortion control for robust-lossless database watermarking: Application to inpatient hospital stay records. EMBC 2014: 4491-4494 - [c163]Tarek Bouyahia, Muhammad Sabir Idrees, Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel:
Metric for Security Activities Assisted by Argumentative Logic. DPM/SETOP/QASA 2014: 183-197 - [c162]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps. FPS 2014: 337-346 - [c161]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Détection de flux de contrôle illégaux dans les Smartphones. INFORSID 2014: 27-43 - [c160]Javier Franco-Contreras, Gouenou Coatrieux, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux:
Adapted Quantization Index Modulation for Database Watermarking. IWDW 2014: 120-134 - [c159]Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam:
Specifying and enforcing constraints in dynamic access control policies. PST 2014: 290-297 - [c158]Andreas Schaad, Anis Bkakria, Florian Kerschbaum, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard:
Optimized and controlled provisioning of encrypted outsourced data. SACMAT 2014: 141-152 - [c157]Léa El Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Serge Papillon, Wael Kanoun, Samuel Dubus:
Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks. SecureComm (1) 2014: 524-529 - [c156]Wiem Tounsi, Benjamin Justus, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro:
Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm. SERE (Companion) 2014: 113-120 - [c155]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems. SERE (Companion) 2014: 149-157 - [c154]Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey:
Reaching Agreement in Security Policy Negotiation. TrustCom 2014: 98-105 - [c153]Muhammad Sabir Idrees, Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Car2X Communication - Putting Security Negotiation into Practice. VTC Fall 2014: 1-5 - [e7]Nora Cuppens-Boulahia, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans:
ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. IFIP Advances in Information and Communication Technology 428, Springer 2014, ISBN 978-3-642-55414-8 [contents] - [i4]Frédéric Cuppens, Alban Gabillon:
Cover Story Management. CoRR abs/1405.5628 (2014) - 2013
- [j36]Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Joaquín García-Alfaro, Dimitra I. Kaklamani, Iakovos S. Venieris, Frédéric Cuppens, Nora Cuppens-Boulahia:
A privacy-aware access control model for distributed network monitoring. Comput. Electr. Eng. 39(7): 2263-2281 (2013) - [j35]Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Salvador Martínez Perez, Jordi Cabot:
Management of stateful firewall misconfiguration. Comput. Secur. 39: 64-85 (2013) - [j34]Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro:
Semantic analysis of role mining results and shadowed roles detection. Inf. Secur. Tech. Rep. 17(4): 131-147 (2013) - [j33]Frédéric Cuppens, Nora Cuppens-Boulahia, Ernesto Damiani, Radu State, Joaquín García-Alfaro, Nadia Tawbi:
Editorial. J. Inf. Secur. Appl. 18(1): 1 (2013) - [j32]Frédéric Cuppens, Nora Cuppens-Boulahia, Meriam Ben-Ghorbel-Talbi, Stephane Morucci, Nada Essaouini:
Smatch: Formal dynamic session management model for RBAC. J. Inf. Secur. Appl. 18(1): 30-44 (2013) - [j31]Frédéric Cuppens, Nora Cuppens-Boulahia, Yehia Elrakaiby:
Formal specification and management of security policies with collective group obligations. J. Comput. Secur. 21(1): 149-190 (2013) - [j30]Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, José M. Fernandez, David Gross-Amblard:
Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(2): 39-62 (2013) - [j29]Djamal Benslimane, Mahmoud Barhamgi, Frédéric Cuppens, Franck Morvan, Bruno Defude, Ebrahim Nageba, François Paulus, Stephane Morucci, Michael Mrissa, Nora Cuppens-Boulahia, Chirine Ghedira, Riad Mokadem, Said Oulmakhzoune, Jocelyne Fayn:
PAIRSE: a privacy-preserving service-oriented data integration system. SIGMOD Rec. 42(3): 42-47 (2013) - [j28]Gouenou Coatrieux, Wei Pan, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux:
Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting. IEEE Trans. Inf. Forensics Secur. 8(1): 111-120 (2013) - [c152]Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam:
Conflict Management in Obligation with Deadline Policies. ARES 2013: 52-61 - [c151]Mahmoud Barhamgi, Djamal Benslimane, Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Michael Mrissa, Hajer Taktak:
Secure and Privacy-Preserving Execution Model for Data Services. CAiSE 2013: 35-50 - [c150]Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro:
Privacy-enhanced filtering and collection middleware in EPCglobal networks. CRiSIS 2013: 1-8 - [c149]Layal Samarji, Frédéric Cuppens, Nora Cuppens-Boulahia, Wael Kanoun, Samuel Dubus:
Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks. CSS 2013: 132-150 - [c148]Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere:
Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase. DBSec 2013: 274-281 - [c147]Salvador Martínez Perez, Valerio Cosentino, Jordi Cabot, Frédéric Cuppens:
Reverse Engineering of Database Security Policies. DEXA (2) 2013: 442-449 - [c146]Mahmoud Barhamgi, Djamal Benslimane, Youssef Amghar, Nora Cuppens-Boulahia, Frédéric Cuppens:
PrivComp: a privacy-aware data service composition system. EDBT 2013: 757-760 - [c145]Eugenia I. Papagiannakopoulou, Maria N. Koukovini, Georgios V. Lioudakis, Nikolaos L. Dellas, Joaquín García-Alfaro, Dimitra I. Kaklamani, Iakovos S. Venieris, Nora Cuppens-Boulahia, Frédéric Cuppens:
Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model. FPS 2013: 209-226 - [c144]Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri, Stephane Morucci:
Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management. ICISS 2013: 133-147 - [c143]Tarik Moataz, Abdullatif Shikfa, Nora Cuppens-Boulahia, Frédéric Cuppens:
Semantic search over encrypted data. ICT 2013: 1-5 - [c142]Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, José M. Fernandez:
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data. ICT-EurAsia 2013: 426-440 - [c141]Salvador Martínez Perez, Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Jordi Cabot:
Towards an Access-Control Metamodel for Web Content Management Systems. ICWE Workshops 2013: 148-155 - [c140]Florent Fourcot, Laurent Toutain, Stefan Köpsell, Frédéric Cuppens, Nora Cuppens-Boulahia:
IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices. EUNICE 2013: 148-160 - [c139]Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro:
Fine-grained privacy control for the RFID middleware of EPCglobal networks. MEDES 2013: 60-67 - [c138]Salvador Martínez Perez, Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Jordi Cabot:
Model-Driven Extraction and Analysis of Network Security Policies. MoDELS 2013: 52-68 - [c137]Benjamin Justus, Frédéric Cuppens, Nora Cuppens-Boulahia, Julien Bringer, Hervé Chabanne, Olivier Cipiere:
Define privacy-preserving setbase drawer size standard: A ∊-closeness perspective. PST 2013: 362-365 - [c136]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Formal Characterization of Illegal Control Flow in Android System. SITIS 2013: 293-300 - [c135]Samiha Ayed, Muhammad Sabir Idrees, Nora Cuppens-Boulahia, Frédéric Cuppens, Mónica Pinto, Lidia Fuentes:
Security Aspects: A Framework for Enforcement of Security Policies Using AOP. SITIS 2013: 301-308 - [c134]Javier Franco-Contreras, Gouenou Coatrieux, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux:
Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation. STM 2013: 207-222 - [e6]Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi:
Foundations and Practice of Security - 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7743, Springer 2013, ISBN 978-3-642-37118-9 [contents] - 2012
- [j27]Wael Kanoun, Samuel Dubus, Serge Papillon, Nora Cuppens-Boulahia, Frédéric Cuppens:
Towards Dynamic Risk Management: Success Likelihood of Ongoing Attacks. Bell Labs Tech. J. 17(3): 61-78 (2012) - [j26]Yehia Elrakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia:
Formal enforcement and management of obligation policies. Data Knowl. Eng. 71(1): 127-147 (2012) - [j25]Safaà Hachana, Nora Cuppens-Boulahia, Frédéric Cuppens:
Role Mining to Assist Authorization Governance: How Far Have We Gone? Int. J. Secur. Softw. Eng. 3(4): 45-64 (2012) - [c133]Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro:
Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications. ARES 2012: 123-132 - [c132]Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci:
Privacy Policy Preferences Enforced by SPARQL Query Rewriting. ARES 2012: 335-342 - [c131]Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses. CSS 2012: 33-47 - [c130]Frédéric Cuppens, Nora Cuppens-Boulahia, Eduardo Pena Viña:
Adaptive Access Control Enforcement in Social Network Using Aspect Weaving. DASFAA Workshops 2012: 154-167 - [c129]Javier Franco-Contreras, Gouenou Coatrieux, Emmanuel Chazard, Frédéric Cuppens, Nora Cuppens-Boulahia, Christian Roux:
Robust lossless watermarking based on circular interpretation of bijective transformations for the protection of medical databases. EMBC 2012: 5875-5878 - [c128]Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Stephane Morucci:
Towards Session-Aware RBAC Delegation: Function Switch. DPM/SETOP 2012: 287-302 - [c127]Wael Kanoun, Layal Samarji, Nora Cuppens-Boulahia, Samuel Dubus, Frédéric Cuppens:
Towards a Temporal Response Taxonomy. DPM/SETOP 2012: 318-331 - [c126]Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens:
Enabling Dynamic Security Policy in the Java Security Manager. FPS 2012: 180-193 - [c125]Salvador Martínez Perez, Jordi Cabot, Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia:
A model-driven approach for the extraction of network access-control policies. MDsec@MoDELS 2012: 5 - [c124]Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Tarik Moataz, Xavier Rimasson:
Handling Stateful Firewall Anomalies. SEC 2012: 174-186 - [e5]Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro:
Data and Applications Security and Privacy XXVI - 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings. Lecture Notes in Computer Science 7371, Springer 2012, ISBN 978-3-642-31539-8 [contents] - 2011
- [j24]Yehia Elrakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia:
An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations. Int. J. Mob. Comput. Multim. Commun. 3(2): 33-51 (2011) - [j23]Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Laurent Toutain:
Dynamic deployment of context-aware access control policies for constrained security devices. J. Syst. Softw. 84(7): 1144-1159 (2011) - [c123]Nora Cuppens-Boulahia, Frédéric Cuppens, Marie Nuadi:
Smatch Model: Extending RBAC Sessions in Virtualization Environment. ARES 2011: 17-26 - [c122]Julien A. Thomas, Nora Cuppens-Boulahia, Frédéric Cuppens:
Declassification Policy Management in Dynamic Information Systems. ARES 2011: 143-152 - [c121]Wei Pan, Gouenou Coatrieux, Nora Cuppens, Frédéric Cuppens, Christian Roux:
Reversible watermarking based on invariant image classification and dynamical error histogram shifting. EMBC 2011: 4477-4480 - [c120]Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia, Frédéric Cuppens, Gouenou Coatrieux, Ana R. Cavalli, Amel Mammar:
Using Requirements Engineering in an Automatic Security Policy Derivation Process. DPM/SETOP 2011: 155-172 - [c119]Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro:
Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress. FPS 2011: 242-251 - [c118]Julien A. Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia:
Consistency Policies for Dynamic Information Systems with Declassification Flows. ICISS 2011: 87-101 - [c117]Nabil Ajam, Nora Cuppens-Boulahia, Frédéric Cuppens:
Privacy Enforcement of Composed Services in Cellular Networks. NOTERE 2011: 1-8 - [c116]Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Daniel Le Métayer, Guillaume Piolle:
Delegation of Obligations and Responsibility. SEC 2011: 197-209 - [e4]Frédéric Cuppens, Simon N. Foley, Bogdan Groza, Marius Minea:
CRiSIS 2011, Proceedings of the Sixth International Conference on Risks and Security of Internet and Systems, Timișoara, Romania, September 26-28, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-1889-2 [contents] - [r2]Frédéric Cuppens, Nora Cuppens-Boulahia:
Cover Story. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 264-265 - [r1]Frédéric Cuppens, Nora Cuppens-Boulahia:
Multilevel Security Policies. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 811-812 - 2010
- [j22]Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula:
A delegation model for extended RBAC. Int. J. Inf. Sec. 9(3): 209-236 (2010) - [c115]Yehia Elrakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia:
From Contextual Permission to Dynamic Pre-obligation: An Integrated Approach. ARES 2010: 70-78 - [c114]Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Laurent Toutain:
Architecture-Aware Adaptive Deployment of Contextual Security Policies. ARES 2010: 87-95 - [c113]Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, Antony Martin:
Intelligent response system to mitigate the success likelihood of ongoing attacks. IAS 2010: 99-105 - [c112]Hanieh Azkia, Nora Cuppens-Boulahia, Frédéric Cuppens, Gouenou Coatrieux:
Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment. IAS 2010: 197-203 - [c111]Wiem Tounsi, Joaquín García-Alfaro, Nora Cuppens-Boulahia, Frédéric Cuppens:
Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks. CNSR 2010: 284-291 - [c110]Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci:
fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality. DBSec 2010: 146-161 - [c109]Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Stere Preda:
MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies. DPM/SETOP 2010: 203-215 - [c108]Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar:
A Service Dependency Model for Cost-Sensitive Intrusion Response. ESORICS 2010: 626-642 - [c107]Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro, Laurent Toutain:
Model-Driven Security Policy Deployment: Property Oriented Approach. ESSoS 2010: 123-139 - [c106]Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci:
Rewriting of SPARQL/Update Queries for Securing Data Access. ICICS 2010: 4-15 - [c105]Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia:
Negotiating and delegating obligations. MEDES 2010: 281-288 - [c104]Julien A. Thomas, Nora Cuppens-Boulahia, Frédéric Cuppens:
Expression and enforcement of confidentiality policy in active databases. MEDES 2010: 289-296 - [c103]Hervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens:
Service Dependencies in Information Systems Security. MMM-ACNS 2010: 1-20 - [c102]Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus:
Risk-Aware Framework for Activating and Deactivating Policy-Based Response. NSS 2010: 207-215 - [c101]Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar:
Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment. SEC 2010: 148-160 - [c100]Nabil Ajam, Nora Cuppens-Boulahia, Frédéric Cuppens:
Privacy Administration in Distributed Service Infrastructure. SecureComm 2010: 53-70 - [c99]Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux:
Watermarking to Enforce Medical Image Access and Usage Control Policy. SITIS 2010: 251-260 - [i3]Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula:
Managing Delegation in Access Control Models. CoRR abs/1012.2720 (2010)
2000 – 2009
- 2009
- [j21]Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar:
XeNA: an access negotiation framework using XACML. Ann. des Télécommunications 64(1-2): 155-169 (2009) - [j20]Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel, Hervé Debar:
An ontology-based approach to react to network attacks. Int. J. Inf. Comput. Secur. 3(3/4): 280-305 (2009) - [c98]Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Deploying Security Policy in Intra and Inter Workflow Management Systems. ARES 2009: 58-65 - [c97]Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Laurent Toutain, Yehia Elrakaiby:
Semantic context aware security policy deployment. AsiaCCS 2009: 251-261 - [c96]Stere Preda, Laurent Toutain, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro:
A secured delegation of remote services on IPv6 home networks. CRiSIS 2009: 12-18 - [c95]Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, Antony Martin:
Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems. CSE (3) 2009: 83-91 - [c94]Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens:
Reaction Policy Model Based on Dynamic Organizations and Threat Context. DBSec 2009: 49-64 - [c93]Nizar Kheir, Hervé Debar, Frédéric Cuppens, Nora Cuppens-Boulahia, Jouni Viinikka:
A Service Dependency Modeling Framework for Policy-Based Response Enforcement. DIMVA 2009: 176-195 - [c92]Nabil Ajam, Nora Cuppens-Boulahia, Frédéric Cuppens:
Contextual Privacy Management in Extended Role Based Access Control Model. DPM/SETOP 2009: 121-135 - [c91]Wei Pan, Gouenou Coatrieux, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux:
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking. DPM/SETOP 2009: 153-162 - [c90]Yehia El Rakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia:
From state-based to event-based contextual security policies. ICDIM 2009: 241-247 - [c89]Yehia El Rakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia:
Formalization and Management of Group Obligations. POLICY 2009: 158-165 - [c88]Julien A. Thomas, Nora Cuppens-Boulahia, Frédéric Cuppens:
Modeling and Controlling Downgrading Operations in Information Systems. SITIS 2009: 377-384 - [c87]Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula:
An Extended Role-Based Access Control Model for Delegating Obligations. TrustBus 2009: 127-137 - [i2]Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro, Laurent Toutain:
Reliable Process for Security Policy Deployment. CoRR abs/0905.1362 (2009) - 2008
- [j19]Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Deploying Access and Flow Control in Distributed Workflows. J. Res. Pract. Inf. Technol. 40(4): 231-254 (2008) - [j18]Joaquín García-Alfaro, Nora Boulahia-Cuppens, Frédéric Cuppens:
Complete analysis of configuration rules to guarantee reliable network security policies. Int. J. Inf. Sec. 7(2): 103-122 (2008) - [j17]Frédéric Cuppens, Nora Cuppens-Boulahia:
Modeling contextual security policies. Int. J. Inf. Sec. 7(4): 285-305 (2008) - [c86]Céline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Context Ontology for Secure Interoperability. ARES 2008: 821-827 - [c85]Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Managing access and flow control requirements in distributed workflows. AICCSA 2008: 702-710 - [c84]Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Deploying Access Control in Distributed Workflow. AISC 2008: 9-17 - [c83]Cam Tu Phan Le, Frédéric Cuppens, Nora Cuppens-Boulahia, Patrick Maillé:
Evaluating the Trustworthiness of Contributors in a Collaborative Environment. CollaborateCom 2008: 451-460 - [c82]Nora Cuppens-Boulahia, Frédéric Cuppens, Jorge E. López de Vergara, Enrique Vázquez, Javier Guerra, Hervé Debar:
An ontology-based approach to react to network attacks. CRiSIS 2008: 27-35 - [c81]Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, José Araujo:
Automated reaction based on risk analysis and attackers skills in intrusion detection systems. CRiSIS 2008: 117-124 - [c80]Nora Cuppens-Boulahia, Frédéric Cuppens:
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic. DEON 2008: 65-80 - [c79]Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula:
Revocation Schemes for Delegation Licences. ICICS 2008: 190-205 - [c78]Frédéric Cuppens, Nora Cuppens-Boulahia, Julien A. Thomas:
A Robust Reputation Scheme for Decentralized Group Management Systems. ICISS 2008: 71-85 - [c77]Nora Cuppens-Boulahia, Frédéric Cuppens, Diala Abi Haidar, Hervé Debar:
Negotiation of Prohibition: An Approach Based on Policy Rewriting. SEC 2008: 173-187 - [c76]Yehia ElRakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia:
Interactivity for Reactive Access Control. SECRYPT 2008: 57-64 - [c75]Frédéric Cuppens, Nora Cuppens-Boulahia, Yacine Bouzida, Wael Kanoun, Aurélien Croissant:
Expression and Deployment of Reaction Policies. SITIS 2008: 118-127 - [c74]Céline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli:
Interoperability of Context Based System Policies Using O2O Contract. SITIS 2008: 137-144 - [i1]Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia:
Aggregating and Deploying Network Access Control Policies. CoRR abs/0803.0653 (2008) - 2007
- [j16]Frédéric Cuppens, Hervé Debar, Danielle Boulanger, Alban Gabillon:
Introduction Selection of articles from the SAR-SSI 2006. Ann. des Télécommunications 62(11-12): 1327 (2007) - [j15]Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia:
A Framework to Enforce Access Control, Usage Control and Obligations. Ann. des Télécommunications 62(11-12): 1329-1352 (2007) - [j14]Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia:
Enabling automated threat response through the use of a dynamic security policy. J. Comput. Virol. 3(3): 195-210 (2007) - [c73]Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia:
Aggregating and Deploying Network Access Control Policies. ARES 2007: 532-542 - [c72]Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar:
Resource Classification Based Negotiation in Web Services. IAS 2007: 313-318 - [c71]Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
An Integrated Model for Access Control and Information Flow Requirements. ASIAN 2007: 111-125 - [c70]Julien Brunel, Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Jean-Paul Bodeveix:
Security policy compliance with violation management. FMSE 2007: 31-40 - [c69]Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel:
Advanced Reaction Using Risk Assessment in Intrusion Detection Systems. CRITIS 2007: 58-70 - [c68]Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans:
XML-BB: A Model to Handle Relationships Protection in XML Documents. KES (3) 2007: 1107-1114 - [c67]Frédéric Cuppens, Nora Cuppens-Boulahia, Tony Ramard, Julien A. Thomas:
Misbehaviors Detection to Ensure Availability in OLSR. MSN 2007: 799-813 - [c66]Wissam Mallouli, Jean-Marie Orset, Ana R. Cavalli, Nora Cuppens-Boulahia, Frédéric Cuppens:
A formal approach for testing security rules. SACMAT 2007: 127-132 - [c65]Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia:
Management of Exceptions on Access Control Policies. SEC 2007: 97-108 - [c64]Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia:
OPA: Onion Policy Administration Model - Another approach to manage rights in DRM. SEC 2007: 349-360 - [c63]Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro, Laurent Toutain:
Reliable Process for Security Policy Deployment. SECRYPT 2007: 5-15 - 2006
- [j13]Frédéric Cuppens, Fabien Autrel, Yacine Bouzida, Joaquín García, Sylvain Gombault, Thierry Sans:
Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Ann. des Télécommunications 61(1-2): 197-217 (2006) - [j12]Frédéric Cuppens, Hervé Debar, Elisa Bertino:
Foreword. Ann. des Télécommunications 61(3-4): 242-244 (2006) - [j11]Fabien Autrel, Frédéric Cuppens:
CRIM: un module de corrélation d'alertes et de réaction aux attaques. Ann. des Télécommunications 61(9-10): 1172-1192 (2006) - [c62]Frédéric Cuppens, Nora Cuppens-Boulahia, Tony Ramard:
Availability Enforcement by Obligations and Aspects Identification. ARES 2006: 229-239 - [c61]Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia:
FORM : A Federated Rights Expression Model for Open DRM Frameworks. ASIAN 2006: 45-59 - [c60]Hervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens:
Using Contextual Security Policies for Threat Response. DIMVA 2006: 109-128 - [c59]Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia:
Analysis of Policy Anomalies on Distributed Network Security Setups. ESORICS 2006: 496-511 - [c58]Yacine Bouzida, Frédéric Cuppens, Sylvain Gombault:
Detecting and Reacting against Distributed Denial of Service Attacks. ICC 2006: 2394-2400 - [c57]Frédéric Cuppens, Nora Cuppens-Boulahia, Céline Coma:
O2O: Virtual Private Organizations to Manage Security Policy Interoperability. ICISS 2006: 101-115 - [c56]Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia:
Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. SAFECOMP 2006: 182-194 - [c55]Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia:
A Flexible and Distributed Architecture to Enforce Dynamic Access Control. SEC 2006: 183-195 - [c54]Yacine Bouzida, Frédéric Cuppens:
Detecting Known and Novel Network Intrusions. SEC 2006: 258-270 - [c53]Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar:
An extended RBAC profile of XACML. SWS 2006: 13-22 - [c52]Frédéric Cuppens, Nora Cuppens-Boulahia, Meriam Ben Ghorbel:
High Level Conflict Management Strategies in Advanced Access Control Models. ICS@SYNASC 2006: 3-26 - 2005
- [c51]Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans:
Nomad: A Security Model with Non Atomic Actions and Deadlines. CSFW 2005: 186-196 - [c50]Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans:
Protection of Relationships in XML Documents with the XML-BB Model. ICISS 2005: 148-163 - [c49]Joaquín García, Frédéric Cuppens, Fabien Autrel, Jordi Castellà-Roca, Joan Borrell, Guillermo Navarro, Jose A. Ortega-Ruiz:
Protecting On-Line Casinos against Fraudulent Player Drop-Out. ITCC (1) 2005: 500-505 - 2004
- [j10]Fabien Autrel, Salem Benferhat, Frédéric Cuppens:
Utilisation de la corrélation pondérée dans un processus de détection d'intrusions. Ann. des Télécommunications 59(9-10): 1072-1091 (2004) - [j9]Frédéric Cuppens, Alexandre Miège:
AdOrBAC: an administration model for Or-BAC. Comput. Syst. Sci. Eng. 19(3) (2004) - [j8]Hervé Debar, Benjamin Morin, Frédéric Cuppens, Fabien Autrel, Ludovic Mé, Bernard Vivinis, Salem Benferhat, Mireille Ducassé, Rodolphe Ortalo:
Détection d'intrusions : corrélation d'alertes. Tech. Sci. Informatiques 23(3): 359-390 (2004) - [c48]Frédéric Cuppens, Sylvain Gombault, Thierry Sans:
Selecting Appropriate Counter-Measures in an Intrusion Detection Framework. CSFW 2004: 78-87 - [c47]Joaquín García, Fabien Autrel, Joan Borrell, Sergio Castillo, Frédéric Cuppens, Guillermo Navarro:
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation. ICICS 2004: 223-235 - [c46]Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Alexandre Miège:
A Formal Approach to Specify and Deploy a Network Security Policy. Formal Aspects in Security and Trust 2004: 203-218 - [c45]Souhila Kaci, Abdeslam Ali-Laouar, Frédéric Cuppens:
Health care and social inference systems: An unauthorized inference control based on fuzzy logic. WOSIS 2004: 217-226 - [e3]Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang:
Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France. IFIP 148, Kluwer 2004, ISBN 1-4020-8144-8 [contents] - [e2]Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang:
Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France. IFIP 147, Kluwer / Springer 2004, ISBN 1-4020-8142-1 [contents] - 2003
- [c44]Frédéric Cuppens, Alexandre Miège:
Modelling Contexts in the Or-BAC Model. ACSAC 2003: 416-425 - [c43]Salem Benferhat, Rania El Baida, Frédéric Cuppens:
A Possibilistic Logic Encoding of Access Control. FLAIRS 2003: 481-485 - [c42]Salem Benferhat, Fabien Autrel, Frédéric Cuppens:
Enhanced Correlation in an Intrusion Detection Process. MMM-ACNS 2003: 157-170 - [c41]Frédéric Cuppens, Alexandre Miège:
Administration Model for Or-BAC. OTM Workshops 2003: 754-768 - [c40]Anas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida, Frédéric Cuppens, Claire Saurel, Philippe Balbiani, Yves Deswarte, Gilles Trouessin:
Organization based access contro. POLICY 2003: 120- - [c39]Salem Benferhat, Rania El Baida, Frédéric Cuppens:
A stratification-based approach for handling conflicts in access control. SACMAT 2003: 189-195 - 2002
- [c38]Frédéric Cuppens, Fabien Autrel, Alexandre Miège, Salem Benferhat:
Recognizing Malicious Intention in an Intrusion Detection Process. HIS 2002: 806-817 - [c37]Frédéric Cuppens, Alexandre Miège:
Alert Correlation in a Cooperative Intrusion Detection Framework. S&P 2002: 202-215 - 2001
- [j7]Frédéric Cuppens, Alban Gabillon:
Cover story management. Data Knowl. Eng. 37(2): 177-201 (2001) - [j6]Isabelle Bloch, Anthony Hunter, Alain Appriou, André Ayoun, Salem Benferhat, Philippe Besnard, Laurence Cholvy, Roger M. Cooke, Frédéric Cuppens, Didier Dubois, Hélène Fargier, Michel Grabisch, Rudolf Kruse, Jérôme Lang, Serafín Moral, Henri Prade, Alessandro Saffiotti, Philippe Smets, Claudio Sossai:
Fusion: General concepts and characteristics. Int. J. Intell. Syst. 16(10): 1107-1134 (2001) - [j5]Frédéric Cuppens, Laurence Cholvy, Claire Saurel, Jérôme Carrère:
Merging regulations: Analysis of a practical example. Int. J. Intell. Syst. 16(11): 1223-1243 (2001) - [c36]Frédéric Cuppens:
Managing Alerts in a Multi-Intrusion Detection Environmen. ACSAC 2001: 22-31 - 2000
- [c35]Jérôme Carrère, Frédéric Cuppens, Claire Saurel:
LExIS: A Query Language to Scan Information Flow. NLDB 2000: 369 - [c34]Frédéric Cuppens, Rodolphe Ortalo:
LAMBDA: A Language to Model a Database for Detection of Attacks. Recent Advances in Intrusion Detection 2000: 197-216 - [e1]Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner:
Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings. Lecture Notes in Computer Science 1895, Springer 2000, ISBN 3-540-41031-7 [contents]
1990 – 1999
- 1999
- [j4]Frédéric Cuppens, Alban Gabillon:
Logical Foundations of Multilevel Databases. Data Knowl. Eng. 29(3): 259-291 (1999) - 1998
- [c33]Frédéric Cuppens, Laurence Cholvy, Claire Saurel, Jérôme Carrère:
Merging Security Policies: Analysis of a Practical Example. CSFW 1998: 123-136 - [c32]Jérôme Carrère, Frédéric Cuppens, Claire Saurel:
SACADDOS: A Support Tool to Manage Multilevel Documents. DBSec 1998: 173-188 - [c31]Frédéric Cuppens, Alban Gabillon:
Rules for Designing Multilevel Object-Oriented Databases. ESORICS 1998: 159-174 - [c30]Frédéric Cuppens, Claire Saurel:
A Logical Formalization of Integrity Policies for Database Management Systems. IICIS 1998: 231-254 - 1997
- [c29]Laurence Cholvy, Frédéric Cuppens, Claire Saurel:
Towards a Logical Formalization of Responsibility. ICAIL 1997: 233-242 - [c28]Frédéric Cuppens, Robert Demolombe:
A Modal Logical Framework for Security Policies. ISMIS 1997: 579-589 - [c27]Laurence Cholvy, Frédéric Cuppens:
Analyzing Consistency of Security Policies. S&P 1997: 103-112 - 1996
- [c26]Frédéric Cuppens, Alban Gabillon:
Formalisation de la Confidentialité dans une Base de Données à Objets. BDA 1996: 417- - [c25]Frédéric Cuppens, Claire Saurel:
Specifying a security policy: a case study. CSFW 1996: 123- - [c24]Frédéric Cuppens, Alban Gabillon:
A Logical Approach to Model a Multilevel Object-Oriented Database. DBSec 1996: 145-166 - [c23]Frédéric Cuppens, Robert Demolombe:
A Deontic Logic for Reasoning about Confidentiality. DEON 1996: 66-79 - [c22]Frédéric Cuppens:
Querying a Multilevel Database: A Logical Analysis. VLDB 1996: 484-494 - 1995
- [c21]Frédéric Cuppens, Alban Gabillon:
Modelling a Multilevel Database with Temporal Downgrading Functionalities. DBSec 1995: 145-164 - [c20]Laurence Cholvy, Frédéric Cuppens:
Solving Normative Conflicts by Merging Roles. ICAIL 1995: 201-209 - 1994
- [c19]Laurence Cholvy, Frédéric Cuppens:
Providing Consistent Views in a Polyinstantiated Database. DBSec 1994: 277-296 - [c18]Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian:
Decomposition of Multilevel Objects in an Object-Oriented Database. ESORICS 1994: 375-402 - [c17]Frédéric Cuppens, Gilles Trouessin:
Information Flow Controls vs Interference Controls: An Integrated Approach. ESORICS 1994: 447-468 - [c16]Nora Boulahia-Cuppens, Frédéric Cuppens:
Asynchronous composition and required security conditions. S&P 1994: 68-78 - 1993
- [c15]Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian:
MultiView model for object-oriented database. ACSAC 1993: 222-231 - [c14]Frédéric Cuppens:
A Logical Formalization of Secrecy. CSFW 1993: 53-62 - [c13]Kioumars Yazdanian, Frédéric Cuppens:
Neighborhood data and database security. NSPW 1993: 150-154 - [c12]Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian:
Multilevel Security in Object-Oriented Databases. Security for Object-Oriented Systems 1993: 79-89 - [c11]Frédéric Cuppens:
A logical analysis of authorized and prohibited information flows. S&P 1993: 100-109 - 1992
- [j3]Pierre Bieber, Frédéric Cuppens:
A Logical View of Secure Dependencies. J. Comput. Secur. 1(1): 99-130 (1992) - [c10]Pierre Bieber, Frédéric Cuppens:
Secure Dependencies with Dynamic Level Assignments. CSFW 1992: 63-75 - [c9]Frédéric Cuppens, Kioumars Yazdanian:
A 'natural' decomposition of multi-level relations. S&P 1992: 273-284 - 1991
- [j2]Frédéric Cuppens, Robert Demolombe:
Extending answers to neighbour entities in a cooperative answering context. Decis. Support Syst. 7(1): 1-11 (1991) - [c8]Pierre Bieber, Frédéric Cuppens:
A Definition of Secure Dependencies Using the Logic of Security. CSFW 1991: 2-11 - [c7]Frédéric Cuppens, Kioumars Yazdanian:
Logic Hints and Security in Relational Databases. DBSec 1991: 227-238 - [c6]Frédéric Cuppens:
A Modal Logic Framework to Solve Aggregation Problems. DBSec 1991: 315-332 - 1990
- [c5]Frédéric Cuppens:
An Epistemic and Deontic Logic for Reasoning about Computer Security. ESORICS 1990: 135-145
1980 – 1989
- 1989
- [j1]Frédéric Cuppens, Robert Demolombe:
How to recognize interesting topics to provide cooperative answering. Inf. Syst. 14(2): 163-173 (1989) - [c4]Frédéric Cuppens:
Un langage de requêtes pour obtenir des résponses intelligentes. BDA 1989: 249- - 1988
- [c3]Frédéric Cuppens, Robert Demolombe:
Comment reconnaître les centres d'intérêt pour fournir des réponses coopératives. BDA 1988: 257-268 - [c2]Frédéric Cuppens, Robert Demolombe:
Cooperative Answering: A Methodology to Provide Intelligent Access to databases. Expert Database Conf. 1988: 621-643 - [c1]Frédéric Cuppens, Robert Demolombe:
A Prolog-Relational DBMS Interface Using Delayed Evaluation. JCDKB 1988: 135-148
Coauthor Index
aka: Meriam Ben Ghorbel
aka: Joaquín García-Alfaro
aka: Waël Kanoun
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 20:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint