Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Nora Cuppens
@proceedings{DBLP:conf/esorics/2023w1, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Costas Lambrinoudakis and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Pantaleone Nespoli and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {Computer Security. {ESORICS} 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14398}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54204-6}, doi = {10.1007/978-3-031-54204-6}, isbn = {978-3-031-54203-9}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2023w1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-00420, author = {Lucas Schott and Jos{\'{e}}phine Delas and Hatem Hajri and Elies Gherbi and Reda Yaich and Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Sylvain Lamprier}, title = {Robust Deep Reinforcement Learning Through Adversarial Attacks and Training : {A} Survey}, journal = {CoRR}, volume = {abs/2403.00420}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.00420}, doi = {10.48550/ARXIV.2403.00420}, eprinttype = {arXiv}, eprint = {2403.00420}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-00420.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CharpentierNBCY23, author = {Axel Charpentier and Christopher Neal and Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Reda Yaich}, title = {Real-Time Defensive Strategy Selection via Deep Reinforcement Learning}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {15:1--15:11}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3600176}, doi = {10.1145/3600160.3600176}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CharpentierNBCY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MerzoukCBY23, author = {Mohamed Amine Merzouk and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens and Reda Yaich}, title = {Parameterizing poisoning attacks in federated learning-based intrusion detection}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {104:1--104:8}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605090}, doi = {10.1145/3600160.3605090}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MerzoukCBY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MiloudiSBCP23, author = {Aicha Miloudi and Luis Carlos Su{\'{a}}rez and Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Stere Preda}, editor = {Jianying Zhou and Lejla Batina and Zengpeng Li and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Daisuke Mashima and Weizhi Meng and Stjepan Picek and Mohammad Ashiqur Rahman and Jun Shao and Masaki Shimaoka and Ezekiel O. Soremekun and Chunhua Su and Je Sen Teh and Aleksei Udovenko and Cong Wang and Leo Yu Zhang and Yury Zhauniarovich}, title = {Trust Management Framework for Containerized Workloads Applications to 5G Networks}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13907}, pages = {378--393}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41181-6\_21}, doi = {10.1007/978-3-031-41181-6\_21}, timestamp = {Mon, 16 Oct 2023 19:47:08 +0200}, biburl = {https://dblp.org/rec/conf/acns/MiloudiSBCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RousselotCB23, author = {Axel Rousselot and Nora Cuppens and Samra Bouakkaz}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{AIS} Authentication Using Certificateless Cryptography}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {49--61}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012054600003555}, doi = {10.5220/0012054600003555}, timestamp = {Mon, 31 Jul 2023 15:34:21 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RousselotCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crisis/2022, editor = {Slim Kallel and Mohamed Jmaiel and Mohammad Zulkernine and Ahmed Hadj Kacem and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens}, title = {Risks and Security of Internet and Systems - 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13857}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31108-6}, doi = {10.1007/978-3-031-31108-6}, isbn = {978-3-031-31107-9}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/MerzoukCBY22, author = {Mohamed Amine Merzouk and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens and Reda Yaich}, title = {Investigating the practicality of adversarial evasion attacks on network intrusion detection}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {77}, number = {11-12}, pages = {763--775}, year = {2022}, url = {https://doi.org/10.1007/s12243-022-00910-1}, doi = {10.1007/S12243-022-00910-1}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adt/MerzoukCBY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/MoussailebCLB21, author = {Routa Moussaileb and Nora Cuppens and Jean{-}Louis Lanet and H{\'{e}}l{\`{e}}ne Le Bouder}, title = {A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms}, journal = {{ACM} Comput. Surv.}, volume = {54}, number = {6}, pages = {117:1--117:36}, year = {2022}, url = {https://doi.org/10.1145/3453153}, doi = {10.1145/3453153}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/MoussailebCLB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MerzoukDNCBY22, author = {Mohamed Amine Merzouk and Jos{\'{e}}phine Delas and Christopher Neal and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens and Reda Yaich}, title = {Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {31:1--31:6}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3539006}, doi = {10.1145/3538969.3539006}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MerzoukDNCBY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CharpentierCCY22, author = {Axel Charpentier and Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Reda Yaich}, title = {Deep Reinforcement Learning-Based Defense Strategy Selection}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {110:1--110:11}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3543789}, doi = {10.1145/3538969.3543789}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CharpentierCCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/CrocheletNBC22, author = {Pierre Crochelet and Christopher Neal and Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Xingliang Yuan and Guangdong Bai and Cristina Alcaraz and Suryadipta Majumdar}, title = {Attacker Attribution via Characteristics Inference Using Honeypot Data}, booktitle = {Network and System Security - 16th International Conference, {NSS} 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13787}, pages = {155--169}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23020-2\_9}, doi = {10.1007/978-3-031-23020-2\_9}, timestamp = {Thu, 08 Dec 2022 15:13:16 +0100}, biburl = {https://dblp.org/rec/conf/nss/CrocheletNBC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crisis/2021, editor = {Bo Luo and Mohamed Mosbah and Fr{\'{e}}d{\'{e}}ric Cuppens and Lotfi Ben Othmane and Nora Cuppens and Slim Kallel}, title = {Risks and Security of Internet and Systems - 16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 12-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13204}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-02067-4}, doi = {10.1007/978-3-031-02067-4}, isbn = {978-3-031-02066-7}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2021cicps, editor = {Sokratis K. Katsikas and Costas Lambrinoudakis and Nora Cuppens and John Mylopoulos and Christos Kalloniatis and Weizhi Meng and Steven Furnell and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Jorge Maestre Vidal and Marco Antonio Sotelo Monge}, title = {Computer Security. {ESORICS} 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT{\&}SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13106}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-95484-0}, doi = {10.1007/978-3-030-95484-0}, isbn = {978-3-030-95483-3}, timestamp = {Wed, 09 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2021cicps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-04016, author = {K{\'{e}}ren Saint{-}Hilaire and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Ontology-based Attack Graph Enrichment}, journal = {CoRR}, volume = {abs/2202.04016}, year = {2022}, url = {https://arxiv.org/abs/2202.04016}, eprinttype = {arXiv}, eprint = {2202.04016}, timestamp = {Thu, 10 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-04016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BarbeauCCDG21, author = {Michel Barbeau and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Romain Dagnas and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics}, journal = {{IEEE} Access}, volume = {9}, pages = {46462--46475}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3066108}, doi = {10.1109/ACCESS.2021.3066108}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BarbeauCCDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/NavasCBTP21, author = {Renzo E. Navas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens and Laurent Toutain and Georgios Z. Papadopoulos}, title = {Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for {DSSS} anti-jamming}, journal = {Comput. Networks}, volume = {187}, pages = {107751}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2020.107751}, doi = {10.1016/J.COMNET.2020.107751}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/NavasCBTP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/NavasCBTP21, author = {Renzo E. Navas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens and Laurent Toutain and Georgios Z. Papadopoulos}, title = {MTD, Where Art Thou? {A} Systematic Review of Moving Target Defense Techniques for IoT}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {10}, pages = {7818--7832}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3040358}, doi = {10.1109/JIOT.2020.3040358}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/NavasCBTP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KallelCCKO21, author = {Slim Kallel and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens and Ahmed Hadj Kacem and Lotfi Ben Othmane}, title = {Special issue on risk and security of smart systems}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102925}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102925}, doi = {10.1016/J.JISA.2021.102925}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KallelCCKO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isivc/AnselPCB21, author = {Guillaume Ansel and Dominique Pastor and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens}, title = {Asymptotic Random Distortion Testing and Application to Change-in-Mean Detection}, booktitle = {10th International Symposium on Signal, Image, Video and Communications, {ISIVC} 2021, Saint-Etienne, France, April 7-9, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISIVC49222.2021.9487550}, doi = {10.1109/ISIVC49222.2021.9487550}, timestamp = {Tue, 03 Aug 2021 16:22:20 +0200}, biburl = {https://dblp.org/rec/conf/isivc/AnselPCB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crisis/2020, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jean Leneutre and Nora Cuppens and Reda Yaich}, title = {Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12528}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-68887-5}, doi = {10.1007/978-3-030-68887-5}, isbn = {978-3-030-68886-8}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MoussailebNC20, author = {Routa Moussaileb and Renzo E. Navas and Nora Cuppens}, title = {Watch out! Doxware on the way..}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102668}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102668}, doi = {10.1016/J.JISA.2020.102668}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MoussailebNC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BkakriaCC20, author = {Anis Bkakria and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Privacy-Preserving Pattern Matching on Encrypted Data}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12492}, pages = {191--220}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64834-3\_7}, doi = {10.1007/978-3-030-64834-3\_7}, timestamp = {Thu, 10 Dec 2020 10:09:50 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BkakriaCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/avr/KabilDC20, author = {Alexandre Kabil and Thierry Duval and Nora Cuppens}, editor = {Lucio Tommaso De Paolis and Patrick Bourdot}, title = {Alert Characterization by Non-expert Users in a Cybersecurity Virtual Environment: {A} Usability Study}, booktitle = {Augmented Reality, Virtual Reality, and Computer Graphics - 7th International Conference, {AVR} 2020, Lecce, Italy, September 7-10, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12242}, pages = {82--101}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58465-8\_6}, doi = {10.1007/978-3-030-58465-8\_6}, timestamp = {Mon, 31 Aug 2020 16:55:55 +0200}, biburl = {https://dblp.org/rec/conf/avr/KabilDC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BourgetCC20, author = {Edwin Bourget and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Sokratis K. Katsikas and Cristina Alcaraz}, title = {PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis}, booktitle = {Proceedings of the 6th {ACM} Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020}, pages = {30--41}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384941.3409590}, doi = {10.1145/3384941.3409590}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BourgetCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/MerzoukCBY20, author = {Mohamed Amine Merzouk and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens and Reda Yaich}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jean Leneutre and Nora Cuppens and Reda Yaich}, title = {A Deeper Analysis of Adversarial Examples in Intrusion Detection}, booktitle = {Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12528}, pages = {67--84}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68887-5\_4}, doi = {10.1007/978-3-030-68887-5\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/MerzoukCBY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/DernaikaCCR20, author = {Farah Dernaika and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Olivier Raynaud}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jean Leneutre and Nora Cuppens and Reda Yaich}, title = {A Posteriori Analysis of Policy Temporal Compliance}, booktitle = {Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12528}, pages = {133--148}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68887-5\_8}, doi = {10.1007/978-3-030-68887-5\_8}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/DernaikaCCR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/SmineECC20, author = {Manel Smine and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Anoop Singhal and Jaideep Vaidya}, title = {Network Functions Virtualization Access Control as a Service}, booktitle = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP} {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12122}, pages = {100--117}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49669-2\_6}, doi = {10.1007/978-3-030-49669-2\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/SmineECC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/SmineECCP20, author = {Manel Smine and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Marc{-}Oliver Pahl}, editor = {Gabriela Nicolescu and Assia Tria and Jos{\'{e}} M. Fernandez and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {A Priority-Based Domain Type Enforcement for Exception Management}, booktitle = {Foundations and Practice of Security - 13th International Symposium, {FPS} 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12637}, pages = {65--81}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70881-8\_5}, doi = {10.1007/978-3-030-70881-8\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/SmineECCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/NavasSCCTP20, author = {Renzo E. Navas and H{\aa}kon Sandaker and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Laurent Toutain and Georgios Z. Papadopoulos}, title = {{IANVS:} {A} Moving Target Defense Framework for a Resilient Internet of Things}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2020, Rennes, France, July 7-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISCC50000.2020.9219728}, doi = {10.1109/ISCC50000.2020.9219728}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/NavasSCCTP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/quatic/DernaikaCCR20, author = {Farah Dernaika and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Olivier Raynaud}, editor = {Martin J. Shepperd and Fernando Brito e Abreu and Alberto Rodrigues da Silva and Ricardo P{\'{e}}rez{-}Castillo}, title = {Accountability in the {A} Posteriori Access Control: {A} Requirement and a Mechanism}, booktitle = {Quality of Information and Communications Technology - 13th International Conference, {QUATIC} 2020, Faro, Portugal, September 9-11, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1266}, pages = {332--342}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58793-2\_27}, doi = {10.1007/978-3-030-58793-2\_27}, timestamp = {Tue, 15 Sep 2020 17:11:57 +0200}, biburl = {https://dblp.org/rec/conf/quatic/DernaikaCCR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BarbeauCCDG20, author = {Michel Barbeau and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Romain Dagnas and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {Metrics to Enhance the Resilience of Cyber-Physical Systems}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {1167--1172}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00156}, doi = {10.1109/TRUSTCOM50675.2020.00156}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BarbeauCCDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crisis/2019, editor = {Slim Kallel and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Ahmed Hadj Kacem}, title = {Risks and Security of Internet and Systems, 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12026}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-41568-6}, doi = {10.1007/978-3-030-41568-6}, isbn = {978-3-030-41567-9}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2019cicps, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Weizhi Meng and Steven Furnell and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11980}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-42048-2}, doi = {10.1007/978-3-030-42048-2}, isbn = {978-3-030-42047-5}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2019cicps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2020cicps, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Weizhi Meng and Steven Furnell}, title = {Computer Security - {ESORICS} 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12501}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64330-0}, doi = {10.1007/978-3-030-64330-0}, isbn = {978-3-030-64329-4}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2020cicps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BkakriaCC20, author = {Anis Bkakria and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Privacy-Preserving Pattern Matching on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2020}, url = {https://eprint.iacr.org/2020/422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BkakriaCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CledelCC19, author = {Thomas Cl{\'{e}}del and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Managing the Overestimation of Resilience}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {35:1--35:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340333}, doi = {10.1145/3339252.3340333}, timestamp = {Sun, 11 Aug 2019 18:58:56 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CledelCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Es-SalhiEC19, author = {Khaoula Es{-}Salhi and David Espes and Nora Cuppens}, title = {{DTE} Access Control Model for Integrated {ICS} Systems}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {79:1--79:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340498}, doi = {10.1145/3339252.3340498}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Es-SalhiEC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DernaikaCCR19, author = {Farah Dernaika and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Olivier Raynaud}, title = {Semantic Mediation for {A} Posteriori Log Analysis}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {88:1--88:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340104}, doi = {10.1145/3339252.3340104}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/DernaikaCCR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/MoussailebBDCL19, author = {Routa Moussaileb and Charles Berti and Guillaume Deboisdeffre and Nora Cuppens and Jean{-}Louis Lanet}, editor = {Slim Kallel and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Ahmed Hadj Kacem}, title = {Watch Out! Doxware on the Way..}, booktitle = {Risks and Security of Internet and Systems, 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12026}, pages = {279--292}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41568-6\_18}, doi = {10.1007/978-3-030-41568-6\_18}, timestamp = {Tue, 03 Mar 2020 17:17:08 +0100}, biburl = {https://dblp.org/rec/conf/crisis/MoussailebBDCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SegoviaCCRG19, author = {Mariana Segovia and Ana Rosa Cavalli and Nora Cuppens and Jose Rubio{-}Hernan and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Weizhi Meng and Steven Furnell and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Reflective Attenuation of Cyber-Physical Attacks}, booktitle = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11980}, pages = {19--34}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42048-2\_2}, doi = {10.1007/978-3-030-42048-2\_2}, timestamp = {Thu, 18 Feb 2021 13:46:45 +0100}, biburl = {https://dblp.org/rec/conf/esorics/SegoviaCCRG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/MoussailebCLB19, author = {Routa Moussaileb and Nora Cuppens and Jean{-}Louis Lanet and H{\'{e}}l{\`{e}}ne Le Bouder}, editor = {Abdelmalek Benzekri and Michel Barbeau and Guang Gong and Romain Laborde and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Ransomware Network Traffic Analysis for Pre-encryption Alert}, booktitle = {Foundations and Practice of Security - 12th International Symposium, {FPS} 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12056}, pages = {20--38}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-45371-8\_2}, doi = {10.1007/978-3-030-45371-8\_2}, timestamp = {Wed, 07 Dec 2022 23:10:28 +0100}, biburl = {https://dblp.org/rec/conf/fps/MoussailebCLB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crisis/2018, editor = {Akka Zemmari and Mohamed Mosbah and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11391}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12143-3}, doi = {10.1007/978-3-030-12143-3}, isbn = {978-3-030-12142-6}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2018cicps, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and John Mylopoulos and Christos Kalloniatis}, title = {Computer Security - {ESORICS} 2018 International Workshops, CyberICPS 2018 and {SECPRE} 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11387}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12786-2}, doi = {10.1007/978-3-030-12786-2}, isbn = {978-3-030-12785-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2018cicps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-07283, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Misconfiguration Management of Network Security Components}, journal = {CoRR}, volume = {abs/1912.07283}, year = {2019}, url = {http://arxiv.org/abs/1912.07283}, eprinttype = {arXiv}, eprint = {1912.07283}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-07283.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AyedICC18, author = {Samiha Ayed and Muhammad Sabir Idrees and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Achieving dynamicity in security policies enforcement using aspects}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {1}, pages = {83--103}, year = {2018}, url = {https://doi.org/10.1007/s10207-016-0357-6}, doi = {10.1007/S10207-016-0357-6}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/AyedICC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MoatazRRSCC18, author = {Tarik Moataz and Indrajit Ray and Indrakshi Ray and Abdullatif Shikfa and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens}, title = {Substring search over encrypted data}, journal = {J. Comput. Secur.}, volume = {26}, number = {1}, pages = {1--30}, year = {2018}, url = {https://doi.org/10.3233/JCS-14652}, doi = {10.3233/JCS-14652}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MoatazRRSCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MoussailebBPBCL18, author = {Routa Moussaileb and Benjamin Bouget and Aur{\'{e}}lien Palisse and H{\'{e}}l{\`{e}}ne Le Bouder and Nora Cuppens and Jean{-}Louis Lanet}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {Ransomware's Early Mitigation Mechanisms}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {2:1--2:10}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3234691}, doi = {10.1145/3230833.3234691}, timestamp = {Thu, 17 Jan 2019 22:19:51 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/MoussailebBPBCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhoc-now/NavasBCCP18, author = {Renzo E. Navas and H{\'{e}}l{\`{e}}ne Le Bouder and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Georgios Z. Papadopoulos}, editor = {Nicolas Montavont and Georgios Z. Papadopoulos}, title = {Demo: Do Not Trust Your Neighbors! {A} Small IoT Platform Illustrating a Man-in-the-Middle Attack}, booktitle = {Ad-hoc, Mobile, and Wireless Networks - 17th International Conference on Ad Hoc Networks and Wireless, {ADHOC-NOW} 2018, Saint-Malo, France, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11104}, pages = {120--125}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00247-3\_11}, doi = {10.1007/978-3-030-00247-3\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/adhoc-now/NavasBCCP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/CuppensC18, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Pierangela Samarati and Indrajit Ray and Indrakshi Ray}, title = {Stratification Based Model for Security Policy with Exceptions and Contraries to Duty}, booktitle = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday}, series = {Lecture Notes in Computer Science}, volume = {11170}, pages = {78--103}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-04834-1\_4}, doi = {10.1007/978-3-030-04834-1\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/CuppensC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdve/KabilDCCHP18, author = {Alexandre Kabil and Thierry Duval and Nora Cuppens and G{\'{e}}rard Le Comte and Yoran Halgand and Christophe Ponchel}, editor = {Yuhua Luo}, title = {3D CyberCOP: {A} Collaborative Platform for Cybersecurity Data Analysis and Training}, booktitle = {Cooperative Design, Visualization, and Engineering - 15th International Conference, {CDVE} 2018, Hangzhou, China, October 21-24, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11151}, pages = {176--183}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00560-3\_24}, doi = {10.1007/978-3-030-00560-3\_24}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cdve/KabilDCCHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/BayouECC18, author = {Lyes Bayou and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Akka Zemmari and Mohamed Mosbah and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems}, booktitle = {Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11391}, pages = {35--40}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_3}, doi = {10.1007/978-3-030-12143-3\_3}, timestamp = {Tue, 11 Oct 2022 14:59:07 +0200}, biburl = {https://dblp.org/rec/conf/crisis/BayouECC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/KomeCCF18, author = {Ivan Marco Lobe Kome and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Vincent Frey}, editor = {Akka Zemmari and Mohamed Mosbah and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {A Certificate-Less Key Exchange Protocol for IoT}, booktitle = {Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11391}, pages = {65--79}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_6}, doi = {10.1007/978-3-030-12143-3\_6}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/KomeCCF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/Es-SalhiEC18, author = {Khaoula Es{-}Salhi and David Espes and Nora Cuppens}, editor = {Akka Zemmari and Mohamed Mosbah and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {{RIICS:} Risk Based {IICS} Segmentation Method}, booktitle = {Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11391}, pages = {143--157}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_13}, doi = {10.1007/978-3-030-12143-3\_13}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/Es-SalhiEC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/SmineCC18, author = {Manel Smine and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Akka Zemmari and Mohamed Mosbah and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense}, booktitle = {Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11391}, pages = {158--171}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_14}, doi = {10.1007/978-3-030-12143-3\_14}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/SmineCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/BkakriaTCCBF18, author = {Anis Bkakria and Aimilia Tasidou and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Fatma Bouattour and Feten Ben Fredj}, editor = {Akka Zemmari and Mohamed Mosbah and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Optimal Distribution of Privacy Budget in Differential Privacy}, booktitle = {Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11391}, pages = {222--236}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_18}, doi = {10.1007/978-3-030-12143-3\_18}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/BkakriaTCCBF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/CledelFCCKDLC18, author = {Thomas Cl{\'{e}}del and Simon N. Foley and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Yvon Kermarrec and Fr{\'{e}}d{\'{e}}ric Dubois and Youssef Laarouchi and G{\'{e}}rard Le Comte}, editor = {Arcangelo Castiglione and Florin Pop and Massimo Ficco and Francesco Palmieri}, title = {Towards the Evaluation of End-to-End Resilience Through External Consistency}, booktitle = {Cyberspace Safety and Security - 10th International Symposium, {CSS} 2018, Amalfi, Italy, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11161}, pages = {99--114}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01689-0\_8}, doi = {10.1007/978-3-030-01689-0\_8}, timestamp = {Wed, 06 Jan 2021 11:52:38 +0100}, biburl = {https://dblp.org/rec/conf/css/CledelFCCKDLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BourgetCCDFL18, author = {Edwin Bourget and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Samuel Dubus and Simon N. Foley and Youssef Laarouchi}, editor = {Florian Kerschbaum and Stefano Paraboschi}, title = {Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes}, booktitle = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP} {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10980}, pages = {38--47}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95729-6\_3}, doi = {10.1007/978-3-319-95729-6\_3}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BourgetCCDFL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/SegoviaCCG18, author = {Mariana Segovia and Ana Rosa Cavalli and Nora Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Nur Zincir{-}Heywood and Guillaume Bonfante and Mourad Debbabi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper)}, booktitle = {Foundations and Practice of Security - 11th International Symposium, {FPS} 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11358}, pages = {257--264}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-18419-3\_17}, doi = {10.1007/978-3-030-18419-3\_17}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/SegoviaCCG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/Bouder0BGCL18, author = {H{\'{e}}l{\`{e}}ne Le Bouder and Ga{\"{e}}l Thomas and Edwin Bourget and Mariem Graa and Nora Cuppens and Jean{-}Louis Lanet}, editor = {Pierangela Samarati and Mohammad S. Obaidat}, title = {Theoretical Security Evaluation of the Human Semantic Authentication Protocol}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018}, pages = {498--505}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006841704980505}, doi = {10.5220/0006841704980505}, timestamp = {Wed, 29 Aug 2018 15:17:20 +0200}, biburl = {https://dblp.org/rec/conf/icete/Bouder0BGCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/BkakriaCC18, author = {Anis Bkakria and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {David Naccache and Shouhuai Xu and Sihan Qing and Pierangela Samarati and Gregory Blanc and Rongxing Lu and Zonghua Zhang and Ahmed Meddahi}, title = {Linking Differential Identifiability with Differential Privacy}, booktitle = {Information and Communications Security - 20th International Conference, {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11149}, pages = {232--247}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01950-1\_14}, doi = {10.1007/978-3-030-01950-1\_14}, timestamp = {Sat, 05 Sep 2020 18:01:07 +0200}, biburl = {https://dblp.org/rec/conf/icics/BkakriaCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/JiGCC18, author = {Xiaoshu Ji and Gurvan Le Guernic and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {David Naccache and Shouhuai Xu and Sihan Qing and Pierangela Samarati and Gregory Blanc and Rongxing Lu and Zonghua Zhang and Ahmed Meddahi}, title = {{USB} Packets Filtering Policies and an Associated Low-Cost Simulation Framework}, booktitle = {Information and Communications Security - 20th International Conference, {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11149}, pages = {732--742}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01950-1\_44}, doi = {10.1007/978-3-030-01950-1\_44}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/JiGCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/Es-SalhiEC18, author = {Khaoula Es{-}Salhi and David Espes and Nora Cuppens}, editor = {Vinod Ganapathy and Trent Jaeger and R. K. Shyamasundar}, title = {{SONICS:} {A} Segmentation Method for Integrated {ICS} and Corporate System}, booktitle = {Information Systems Security - 14th International Conference, {ICISS} 2018, Bangalore, India, December 17-19, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {231--250}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05171-6\_12}, doi = {10.1007/978-3-030-05171-6\_12}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/Es-SalhiEC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/KabilDCCHP18, author = {Alexandre Kabil and Thierry Duval and Nora Cuppens and G{\'{e}}rard Le Comte and Yoran Halgand and Christophe Ponchel}, editor = {Vinod Ganapathy and Trent Jaeger and R. K. Shyamasundar}, title = {From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform}, booktitle = {Information Systems Security - 14th International Conference, {ICISS} 2018, Bangalore, India, December 17-19, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11281}, pages = {272--287}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05171-6\_14}, doi = {10.1007/978-3-030-05171-6\_14}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/KabilDCCHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotsms/KomeCCF18, author = {Marco Lobe Kome and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Vincent Frey}, title = {CoAP Enhancement for a Better IoT Centric Protocol: CoAP 2.0}, booktitle = {2018 Fifth International Conference on Internet of Things: Systems, Management and Security, IoTSMS 2018, Valencia, Spain, October 15-18, 2018}, pages = {139--146}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IoTSMS.2018.8554494}, doi = {10.1109/IOTSMS.2018.8554494}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iotsms/KomeCCF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/GraaKCCF18, author = {Mariem Graa and Ivan Marco Lobe Kome and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Vincent Frey}, editor = {Lech Jan Janczewski and Miroslaw Kutylowski}, title = {Detection and Response to Data Exfiltration from Internet of Things Android Devices}, booktitle = {{ICT} Systems Security and Privacy Protection - 33rd {IFIP} {TC} 11 International Conference, {SEC} 2018, Held at the 24th {IFIP} World Computer Congress, {WCC} 2018, Poznan, Poland, September 18-20, 2018, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {529}, pages = {339--354}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99828-2\_24}, doi = {10.1007/978-3-319-99828-2\_24}, timestamp = {Tue, 11 Sep 2018 09:39:51 +0200}, biburl = {https://dblp.org/rec/conf/sec/GraaKCCF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crisis/2017, editor = {Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Jean{-}Louis Lanet and Axel Legay and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Risks and Security of Internet and Systems - 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10694}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76687-4}, doi = {10.1007/978-3-319-76687-4}, isbn = {978-3-319-76686-7}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2017cicps, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS 2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10683}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-72817-9}, doi = {10.1007/978-3-319-72817-9}, isbn = {978-3-319-72816-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2017cicps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/interiot/2017, editor = {Giancarlo Fortino and Carlos Enrique Palau and Antonio Guerrieri and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Hakima Chaouchi and Alban Gabillon}, title = {Interoperability, Safety and Security in IoT - Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {242}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93797-7}, doi = {10.1007/978-3-319-93797-7}, isbn = {978-3-319-93796-0}, timestamp = {Fri, 17 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/interiot/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/YaichCC17, author = {Reda Yaich and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Enabling Trust Assessment In Clouds-of-Clouds: {A} Similarity-Based Approach}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {8:1--8:9}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3098970}, doi = {10.1145/3098954.3098970}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/YaichCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CuppensZLEPC17, author = {Nora Cuppens and Salaheddine Zerkane and Yanhuang Li and David Espes and Philippe Le Parc and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Giovanni Livraga and Sencun Zhu}, title = {Firewall Policies Provisioning Through {SDN} in the Cloud}, booktitle = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP} {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10359}, pages = {293--310}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61176-1\_16}, doi = {10.1007/978-3-319-61176-1\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/CuppensZLEPC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/BayouECC17, author = {Lyes Bayou and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {wirelessOrBAC: Towards an access-control-based {IDS} for Wireless Sensor Networks}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {96--103}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163077}, doi = {10.1145/3163058.3163077}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/BayouECC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/BkakriaGCCL17, author = {Anis Bkakria and Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Jean{-}Louis Lanet}, editor = {Rudrapatna K. Shyamasundar and Virendra Singh and Jaideep Vaidya}, title = {Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems}, booktitle = {Information Systems Security - 13th International Conference, {ICISS} 2017, Mumbai, India, December 16-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {127--145}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72598-7\_8}, doi = {10.1007/978-3-319-72598-7\_8}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/BkakriaGCCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/KomeGCCF17, author = {Marco Lobe Kome and Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Vincent Frey}, editor = {Rudrapatna K. Shyamasundar and Virendra Singh and Jaideep Vaidya}, title = {DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT}, booktitle = {Information Systems Security - 13th International Conference, {ICISS} 2017, Mumbai, India, December 16-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {243--262}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72598-7\_15}, doi = {10.1007/978-3-319-72598-7\_15}, timestamp = {Sat, 09 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/KomeGCCF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/BayouECC17, author = {Lyes Bayou and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Rudrapatna K. Shyamasundar and Virendra Singh and Jaideep Vaidya}, title = {wIDS: {A} Multilayer {IDS} for Wireless-Based {SCADA} Systems}, booktitle = {Information Systems Security - 13th International Conference, {ICISS} 2017, Mumbai, India, December 16-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {387--404}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72598-7\_24}, doi = {10.1007/978-3-319-72598-7\_24}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/BayouECC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/Es-SalhiEC17, author = {Khaoula Es{-}Salhi and David Espes and Nora Cuppens}, title = {A New Segmentation Method for Integrated {ICS} (Short Paper)}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {87--94}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00020}, doi = {10.1109/PST.2017.00020}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/Es-SalhiEC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/BkakriaGCCL17, author = {Anis Bkakria and Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Jean{-}Louis Lanet}, title = {Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper)}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {253--258}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00037}, doi = {10.1109/PST.2017.00037}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/BkakriaGCCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/GraaCCLM17, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Jean{-}Louis Lanet and Routa Moussaileb}, editor = {Sabrina De Capitani di Vimercati and Fabio Martinelli}, title = {Detection of Side Channel Attacks Based on Data Tainting in Android Systems}, booktitle = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11 International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {502}, pages = {205--218}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-58469-0\_14}, doi = {10.1007/978-3-319-58469-0\_14}, timestamp = {Wed, 17 May 2017 12:30:16 +0200}, biburl = {https://dblp.org/rec/conf/sec/GraaCCLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crisis/2016, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Jean{-}Louis Lanet and Axel Legay}, title = {Risks and Security of Internet and Systems - 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10158}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-54876-0}, doi = {10.1007/978-3-319-54876-0}, isbn = {978-3-319-54875-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2016cybericps, editor = {Nora Cuppens{-}Boulahia and Costas Lambrinoudakis and Fr{\'{e}}d{\'{e}}ric Cuppens and Sokratis K. Katsikas}, title = {Security of Industrial Control Systems and Cyber-Physical Systems - Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10166}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61437-3}, doi = {10.1007/978-3-319-61437-3}, isbn = {978-3-319-61436-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2016cybericps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fps/2016, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Lingyu Wang and Nora Cuppens{-}Boulahia and Nadia Tawbi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Foundations and Practice of Security - 9th International Symposium, {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10128}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-51966-1}, doi = {10.1007/978-3-319-51966-1}, isbn = {978-3-319-51965-4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/TounsiCCP16, author = {Wiem Tounsi and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Guy Pujolle}, title = {Access and privacy control enforcement in {RFID} middleware systems: Proposal and implementation on the fosstrak platform}, journal = {World Wide Web}, volume = {19}, number = {1}, pages = {41--68}, year = {2016}, url = {https://doi.org/10.1007/s11280-015-0325-5}, doi = {10.1007/S11280-015-0325-5}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/www/TounsiCCP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BayouCEC16, author = {Lyes Bayou and Nora Cuppens{-}Boulahia and David Espes and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks}, booktitle = {11th International Conference on Availability, Reliability and Security, {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016}, pages = {157--166}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ARES.2016.48}, doi = {10.1109/ARES.2016.48}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BayouCEC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/BouyahiaCCA16, author = {Tarek Bouyahia and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Fabien Autrel}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Lingyu Wang and Nora Cuppens{-}Boulahia and Nadia Tawbi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Multi-Criteria Recommender Approach for Supporting Intrusion Response System}, booktitle = {Foundations and Practice of Security - 9th International Symposium, {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10128}, pages = {51--67}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-51966-1\_4}, doi = {10.1007/978-3-319-51966-1\_4}, timestamp = {Sun, 02 Oct 2022 16:01:32 +0200}, biburl = {https://dblp.org/rec/conf/fps/BouyahiaCCA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/BayouECC16, author = {Lyes Bayou and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Lingyu Wang and Nora Cuppens{-}Boulahia and Nadia Tawbi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Security Analysis of WirelessHART Communication Scheme}, booktitle = {Foundations and Practice of Security - 9th International Symposium, {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10128}, pages = {223--238}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-51966-1\_15}, doi = {10.1007/978-3-319-51966-1\_15}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fps/BayouECC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/EssaouiniCC16, author = {Nada Essaouini and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Indrajit Ray and Manoj Singh Gaur and Mauro Conti and Dheeraj Sanghi and V. Kamakoti}, title = {Building a Fair System Using Access Rights}, booktitle = {Information Systems Security - 12th International Conference, {ICISS} 2016, Jaipur, India, December 16-20, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {89--108}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49806-5\_5}, doi = {10.1007/978-3-319-49806-5\_5}, timestamp = {Thu, 10 Sep 2020 09:33:08 +0200}, biburl = {https://dblp.org/rec/conf/iciss/EssaouiniCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GraaCCL16, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Jean{-}Louis Lanet}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Tracking Explicit and Control Flows in Java and Native Android Apps Code}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {307--316}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005686603070316}, doi = {10.5220/0005686603070316}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GraaCCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/EssaouiniOCC16, author = {Nada Essaouini and Said Oulmakhzoune and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Toward an off-line analysis of obligation with deadline policies}, booktitle = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016, Auckland, New Zealand, December 12-14, 2016}, pages = {178--186}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/PST.2016.7906924}, doi = {10.1109/PST.2016.7906924}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pst/EssaouiniOCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/HachanaCC16, author = {Safa{\`{a}} Hachana and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {Towards a new generation of industrial firewalls: Operational-process aware filtering}, booktitle = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016, Auckland, New Zealand, December 12-14, 2016}, pages = {615--622}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/PST.2016.7906996}, doi = {10.1109/PST.2016.7906996}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/HachanaCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LiCCCF16, author = {Yanhuang Li and Nora Cuppens{-}Boulahia and Jean{-}Michel Crom and Fr{\'{e}}d{\'{e}}ric Cuppens and Vincent Frey}, editor = {Jaap{-}Henk Hoepman and Stefan Katzenbeisser}, title = {Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud}, booktitle = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11 International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {471}, pages = {105--118}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-33630-5\_8}, doi = {10.1007/978-3-319-33630-5\_8}, timestamp = {Fri, 19 May 2017 01:25:11 +0200}, biburl = {https://dblp.org/rec/conf/sec/LiCCCF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2015cyberics, editor = {Adrien B{\'{e}}cue and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sokratis K. Katsikas and Costas Lambrinoudakis}, title = {Security of Industrial Control Systems and Cyber Physical Systems - First Workshop, CyberICS 2015 and First Workshop, {WOS-CPS} 2015, Vienna, Austria, September 21-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9588}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40385-4}, doi = {10.1007/978-3-319-40385-4}, isbn = {978-3-319-40384-7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2015cyberics.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AzkiaCCCO15, author = {Hanieh Azkia and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Gouenou Coatrieux and Said Oulmakhzoune}, title = {Deployment of a posteriori access control using {IHE} {ATNA}}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {5}, pages = {471--483}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0265-6}, doi = {10.1007/S10207-014-0265-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AzkiaCCCO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HachanaCC15, author = {Safa{\`{a}} Hachana and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Mining a high level access control policy in a network with multiple firewalls}, journal = {J. Inf. Secur. Appl.}, volume = {20}, pages = {61--73}, year = {2015}, url = {https://doi.org/10.1016/j.jisa.2014.10.010}, doi = {10.1016/J.JISA.2014.10.010}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HachanaCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DoussAACF15, author = {Aida Ben Chehida Douss and Samiha Ayed and Ryma Abassi and Nora Cuppens and Sihem Guemara El Fatmi}, title = {Trust Negotiation Based Approach to Enforce {MANET} Routing Security}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {360--366}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.99}, doi = {10.1109/ARES.2015.99}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/DoussAACF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/BouyahiaACC15, author = {Tarek Bouyahia and Fabien Autrel and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Costas Lambrinoudakis and Alban Gabillon}, title = {Context Aware Intrusion Response Based on Argumentation Logic}, booktitle = {Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9572}, pages = {91--106}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31811-0\_6}, doi = {10.1007/978-3-319-31811-0\_6}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/crisis/BouyahiaACC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/BayouECC15, author = {Lyes Bayou and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Costas Lambrinoudakis and Alban Gabillon}, title = {Security Issue of WirelessHART Based {SCADA} Systems}, booktitle = {Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9572}, pages = {225--241}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31811-0\_14}, doi = {10.1007/978-3-319-31811-0\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/BayouECC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LazrigMRROKCC15, author = {Ibrahim Lazrig and Tarik Moataz and Indrajit Ray and Indrakshi Ray and Toan Ong and Michael G. Kahn and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Pierangela Samarati}, title = {Privacy Preserving Record Matching Using Automated Semi-trusted Broker}, booktitle = {Data and Applications Security and Privacy {XXIX} - 29th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9149}, pages = {103--118}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20810-7\_7}, doi = {10.1007/978-3-319-20810-7\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/LazrigMRROKCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BayouECC15, author = {Lyes Bayou and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Adrien B{\'{e}}cue and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sokratis K. Katsikas and Costas Lambrinoudakis}, title = {WirelessHART NetSIM: {A} WirelessHART SCADA-Based Wireless Sensor Networks Simulator}, booktitle = {Security of Industrial Control Systems and Cyber Physical Systems - First Workshop, CyberICS 2015 and First Workshop, {WOS-CPS} 2015, Vienna, Austria, September 21-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9588}, pages = {63--78}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-40385-4\_5}, doi = {10.1007/978-3-319-40385-4\_5}, timestamp = {Mon, 03 Jan 2022 22:15:09 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BayouECC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SamarjiCCPKD15, author = {L{\'{e}}a El Samarji and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Serge Papillon and Wa{\"{e}}l Kanoun and Samuel Dubus}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {On the Fly Design and Co-simulation of Responses Against Simultaneous Attacks}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9327}, pages = {642--661}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24177-7\_32}, doi = {10.1007/978-3-319-24177-7\_32}, timestamp = {Sat, 19 Oct 2019 20:00:24 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SamarjiCCPKD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/BkakriaCCG15, author = {Anis Bkakria and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and David Gross{-}Amblard}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Evangelos Kranakis and Guillaume Bonfante}, title = {Security Mechanisms Planning to Enforce Security Policies}, booktitle = {Foundations and Practice of Security - 8th International Symposium, {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9482}, pages = {85--101}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30303-1\_6}, doi = {10.1007/978-3-319-30303-1\_6}, timestamp = {Fri, 27 Dec 2019 21:23:06 +0100}, biburl = {https://dblp.org/rec/conf/fps/BkakriaCCG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/LiCCCFJ15, author = {Yanhuang Li and Nora Cuppens{-}Boulahia and Jean{-}Michel Crom and Fr{\'{e}}d{\'{e}}ric Cuppens and Vincent Frey and Xiaoshu Ji}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Similarity Measure for Security Policies in Service Provider Selection}, booktitle = {Information Systems Security - 11th International Conference, {ICISS} 2015, Kolkata, India, December 16-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {227--242}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26961-0\_14}, doi = {10.1007/978-3-319-26961-0\_14}, timestamp = {Wed, 25 Sep 2019 18:06:16 +0200}, biburl = {https://dblp.org/rec/conf/iciss/LiCCCFJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mie/Franco-Contreras15, author = {Javier Franco{-}Contreras and Gouenou Coatrieux and Philippe Massari and St{\'{e}}fan Jacques Darmoni and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Christian Roux}, editor = {Ronald Cornet and Lacramioara Stoicu{-}Tivadar and Alexander H{\"{o}}rbst and Carlos Luis Parra Calder{\'{o}}n and Stig Kj{\ae}r Andersen and Mira Hercigonja{-}Szekeres}, title = {Data Quality Evaluation in Medical Database Watermarking}, booktitle = {Digital Healthcare Empowering Europeans - Proceedings of MIE2015, Madrid Spain, 27-29 May, 2015}, series = {Studies in Health Technology and Informatics}, volume = {210}, pages = {276--280}, publisher = {{IOS} Press}, year = {2015}, url = {https://doi.org/10.3233/978-1-61499-512-8-276}, doi = {10.3233/978-1-61499-512-8-276}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mie/Franco-Contreras15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/notere/AyedICC15, author = {Samiha Ayed and Muhammad Sabir Idrees and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Dynamic deployment of access and usage control policies using aspects}, booktitle = {International Conference on Protocol Engineering, {ICPE} 2015, and International Conference on New Technologies of Distributed Systems, {NTDS} 2015 {[CFIP} (Colloque francophone sur l'ing{\'{e}}nierie des protocoles) / {NOTERE} (Nouvelles Technologies de la R{\'{e}}partition)], Paris, France, July 22-24, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/NOTERE.2015.7293500}, doi = {10.1109/NOTERE.2015.7293500}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/notere/AyedICC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/PerezGCCC15, author = {Salvador Mart{\'{\i}}nez Perez and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Jordi Cabot}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {218--233}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_15}, doi = {10.1007/978-3-319-18467-8\_15}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/PerezGCCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/IdreesACC15, author = {Muhammad Sabir Idrees and Samiha Ayed and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Dynamic Security Policies Enforcement and Adaptation Using Aspects}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1374--1379}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.533}, doi = {10.1109/TRUSTCOM.2015.533}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/IdreesACC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/OulmakhzouneCCMBB14, author = {Said Oulmakhzoune and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Stephane Morucci and Mahmoud Barhamgi and Djamal Benslimane}, title = {Privacy query rewriting algorithm instrumented by a privacy-aware access control model}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {69}, number = {1-2}, pages = {3--19}, year = {2014}, url = {https://doi.org/10.1007/s12243-013-0365-8}, doi = {10.1007/S12243-013-0365-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/OulmakhzouneCCMBB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/EssaouiniCCK14, author = {Nada Essaouini and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Anas Abou El Kalam}, title = {Conflict detection in obligation with deadline policies}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {13}, year = {2014}, url = {https://doi.org/10.1186/s13635-014-0013-5}, doi = {10.1186/S13635-014-0013-5}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/EssaouiniCCK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijkl/AzkiaCCC14, author = {Hanieh Azkia and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Gouenou Coatrieux}, title = {Log content extraction engine based on ontology for the purpose of a posteriori access control}, journal = {Int. J. Knowl. Learn.}, volume = {9}, number = {1/2}, pages = {23--42}, year = {2014}, url = {https://doi.org/10.1504/IJKL.2014.067149}, doi = {10.1504/IJKL.2014.067149}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijkl/AzkiaCCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isi/LammariCL14, author = {Nadira Lammari and Nora Cuppens{-}Boulahia and R{\'{e}}gine Laleau}, title = {Introduction}, journal = {Ing{\'{e}}nierie des Syst{\`{e}}mes d Inf.}, volume = {19}, number = {6}, pages = {7--8}, year = {2014}, url = {http://isi.revuesonline.com/article.jsp?articleId=19994}, timestamp = {Tue, 16 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isi/LammariCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TounsiCGCC14, author = {Wiem Tounsi and Nora Cuppens{-}Boulahia and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Yannick Chevalier and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {{KEDGEN2:} {A} key establishment and derivation protocol for {EPC} Gen2 {RFID} systems}, journal = {J. Netw. Comput. Appl.}, volume = {39}, pages = {152--166}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.06.002}, doi = {10.1016/J.JNCA.2013.06.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/TounsiCGCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Franco-ContrerasCCCR14, author = {Javier Franco{-}Contreras and Gouenou Coatrieux and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Christian Roux}, title = {Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {3}, pages = {397--410}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2013.2294240}, doi = {10.1109/TIFS.2013.2294240}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Franco-ContrerasCCCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BkakriaCCG14, author = {Anis Bkakria and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and David Gross{-}Amblard}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Specification and Deployment of Integrated Security Policies for Outsourced Data}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {17--32}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_2}, doi = {10.1007/978-3-662-43936-4\_2}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BkakriaCCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MoatazJRCCR14, author = {Tarik Moataz and Benjamin Justus and Indrakshi Ray and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Indrajit Ray}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {66--81}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_5}, doi = {10.1007/978-3-662-43936-4\_5}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MoatazJRCCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MoatazCCRR14, author = {Tarik Moataz and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Indrajit Ray and Indrakshi Ray}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {{ELITE:} zEro Links Identity managemenT systEm}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {195--210}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_13}, doi = {10.1007/978-3-662-43936-4\_13}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MoatazCCRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/embc/Franco-Contreras14, author = {Javier Franco{-}Contreras and Gouenou Coatrieux and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Christian Roux}, title = {Ontology-guided distortion control for robust-lossless database watermarking: Application to inpatient hospital stay records}, booktitle = {36th Annual International Conference of the {IEEE} Engineering in Medicine and Biology Society, {EMBC} 2014, Chicago, IL, USA, August 26-30, 2014}, pages = {4491--4494}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/EMBC.2014.6944621}, doi = {10.1109/EMBC.2014.6944621}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/embc/Franco-Contreras14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BouyahiaICCA14, author = {Tarek Bouyahia and Muhammad Sabir Idrees and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Fabien Autrel}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Metric for Security Activities Assisted by Argumentative Logic}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {183--197}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_12}, doi = {10.1007/978-3-319-17016-9\_12}, timestamp = {Sun, 25 Oct 2020 22:34:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BouyahiaICCA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/GraaCCC14, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Ana R. Cavalli}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood and Philip W. L. Fong}, title = {Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps}, booktitle = {Foundations and Practice of Security - 7th International Symposium, {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8930}, pages = {337--346}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17040-4\_22}, doi = {10.1007/978-3-319-17040-4\_22}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/GraaCCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/inforsid/GraaCCC14, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Ana R. Cavalli}, title = {D{\'{e}}tection de flux de contr{\^{o}}le ill{\'{e}}gaux dans les Smartphones}, booktitle = {Actes du XXXII{\`{e}}me Congr{\`{e}}s INFORSID, Lyon, France, 20-23 Mai 2014}, pages = {27--43}, year = {2014}, url = {http://inforsid.fr/actes/2014/2\_paper\_56.pdf}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/inforsid/GraaCCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/Franco-Contreras14, author = {Javier Franco{-}Contreras and Gouenou Coatrieux and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Christian Roux}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Ching{-}Nung Yang}, title = {Adapted Quantization Index Modulation for Database Watermarking}, booktitle = {Digital-Forensics and Watermarking - 13th International Workshop, {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9023}, pages = {120--134}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-19321-2\_9}, doi = {10.1007/978-3-319-19321-2\_9}, timestamp = {Thu, 28 May 2020 12:51:40 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/Franco-Contreras14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/EssaouiniCCK14, author = {Nada Essaouini and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Anas Abou El Kalam}, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Specifying and enforcing constraints in dynamic access control policies}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {290--297}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PST.2014.6890951}, doi = {10.1109/PST.2014.6890951}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/EssaouiniCCK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SchaadBKCCG14, author = {Andreas Schaad and Anis Bkakria and Florian Kerschbaum and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and David Gross{-}Amblard}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Optimized and controlled provisioning of encrypted outsourced data}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {141--152}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613100}, doi = {10.1145/2613087.2613100}, timestamp = {Wed, 02 Jun 2021 09:13:31 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/SchaadBKCCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/SamarjiCCPKD14, author = {L{\'{e}}a El Samarji and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Serge Papillon and Wael Kanoun and Samuel Dubus}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {152}, pages = {524--529}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23829-6\_37}, doi = {10.1007/978-3-319-23829-6\_37}, timestamp = {Tue, 23 May 2017 01:12:12 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/SamarjiCCPKD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/TounsiJCCA14, author = {Wiem Tounsi and Benjamin Justus and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {113--120}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.29}, doi = {10.1109/SERE-C.2014.29}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/TounsiJCCA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/GraaCCC14, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Ana R. Cavalli}, title = {Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {149--157}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.33}, doi = {10.1109/SERE-C.2014.33}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/GraaCCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiCCCF14, author = {Yanhuang Li and Nora Cuppens{-}Boulahia and Jean{-}Michel Crom and Fr{\'{e}}d{\'{e}}ric Cuppens and Vincent Frey}, title = {Reaching Agreement in Security Policy Negotiation}, booktitle = {13th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014}, pages = {98--105}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/TrustCom.2014.17}, doi = {10.1109/TRUSTCOM.2014.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiCCCF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/IdreesACC14, author = {Muhammad Sabir Idrees and Samiha Ayed and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Car2X Communication - Putting Security Negotiation into Practice}, booktitle = {{IEEE} 80th Vehicular Technology Conference, {VTC} Fall 2014, Vancouver, BC, Canada, September 14-17, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/VTCFall.2014.6965896}, doi = {10.1109/VTCFALL.2014.6965896}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/vtc/IdreesACC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2013-8247, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Georgios V. Lioudakis and Nora Cuppens{-}Boulahia and Simon N. Foley and William M. Fitzgerald}, title = {Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, {DPM} 2013, and 6th International Workshop, {SETOP} 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8247}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54568-9}, doi = {10.1007/978-3-642-54568-9}, isbn = {978-3-642-54567-2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2013-8247.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sec/2014, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Anas Abou El Kalam and Thierry Sans}, title = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11 International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {428}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55415-5}, doi = {10.1007/978-3-642-55415-5}, isbn = {978-3-642-55414-8}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/PapagiannakopoulouKLGKVCC13, author = {Eugenia I. Papagiannakopoulou and Maria N. Koukovini and Georgios V. Lioudakis and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Dimitra I. Kaklamani and Iakovos S. Venieris and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {A privacy-aware access control model for distributed network monitoring}, journal = {Comput. Electr. Eng.}, volume = {39}, number = {7}, pages = {2263--2281}, year = {2013}, url = {https://doi.org/10.1016/j.compeleceng.2012.08.003}, doi = {10.1016/J.COMPELECENG.2012.08.003}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/PapagiannakopoulouKLGKVCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Garcia-AlfaroCCPC13, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Salvador Mart{\'{\i}}nez Perez and Jordi Cabot}, title = {Management of stateful firewall misconfiguration}, journal = {Comput. Secur.}, volume = {39}, pages = {64--85}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.01.004}, doi = {10.1016/J.COSE.2013.01.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Garcia-AlfaroCCPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HachanaCCG13, author = {Safa{\`{a}} Hachana and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Semantic analysis of role mining results and shadowed roles detection}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {4}, pages = {131--147}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2013.03.001}, doi = {10.1016/J.ISTR.2013.03.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HachanaCCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CuppensCDSGT13, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Ernesto Damiani and Radu State and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nadia Tawbi}, title = {Editorial}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {1}, pages = {1}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.08.004}, doi = {10.1016/J.JISA.2013.08.004}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CuppensCDSGT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CuppensCBME13, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Meriam Ben{-}Ghorbel{-}Talbi and Stephane Morucci and Nada Essaouini}, title = {Smatch: Formal dynamic session management model for {RBAC}}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {1}, pages = {30--44}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.07.001}, doi = {10.1016/J.JISA.2013.07.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/CuppensCBME13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CuppensCE13, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Yehia Elrakaiby}, title = {Formal specification and management of security policies with collective group obligations}, journal = {J. Comput. Secur.}, volume = {21}, number = {1}, pages = {149--190}, year = {2013}, url = {https://doi.org/10.3233/JCS-2012-0459}, doi = {10.3233/JCS-2012-0459}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CuppensCE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BkakriaCCFG13, author = {Anis Bkakria and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Jos{\'{e}} M. Fernandez and David Gross{-}Amblard}, title = {Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {39--62}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.039}, doi = {10.22667/JOWUA.2013.06.31.039}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BkakriaCCFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmod/BenslimaneBCMDN13, author = {Djamal Benslimane and Mahmoud Barhamgi and Fr{\'{e}}d{\'{e}}ric Cuppens and Franck Morvan and Bruno Defude and Ebrahim Nageba and Fran{\c{c}}ois Paulus and Stephane Morucci and Michael Mrissa and Nora Cuppens{-}Boulahia and Chirine Ghedira and Riad Mokadem and Said Oulmakhzoune and Jocelyne Fayn}, title = {{PAIRSE:} a privacy-preserving service-oriented data integration system}, journal = {{SIGMOD} Rec.}, volume = {42}, number = {3}, pages = {42--47}, year = {2013}, url = {https://doi.org/10.1145/2536669.2536677}, doi = {10.1145/2536669.2536677}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigmod/BenslimaneBCMDN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CoatrieuxPCCR13, author = {Gouenou Coatrieux and Wei Pan and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Christian Roux}, title = {Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {1}, pages = {111--120}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2012.2224108}, doi = {10.1109/TIFS.2012.2224108}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CoatrieuxPCCR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/EssaouiniCCK13, author = {Nada Essaouini and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Anas Abou El Kalam}, title = {Conflict Management in Obligation with Deadline Policies}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {52--61}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.12}, doi = {10.1109/ARES.2013.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/EssaouiniCCK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/BarhamgiBOCCMT13, author = {Mahmoud Barhamgi and Djamal Benslimane and Said Oulmakhzoune and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Michael Mrissa and Hajer Taktak}, editor = {Camille Salinesi and Moira C. Norrie and Oscar Pastor}, title = {Secure and Privacy-Preserving Execution Model for Data Services}, booktitle = {Advanced Information Systems Engineering - 25th International Conference, CAiSE 2013, Valencia, Spain, June 17-21, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7908}, pages = {35--50}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38709-8\_3}, doi = {10.1007/978-3-642-38709-8\_3}, timestamp = {Mon, 18 Jan 2021 08:56:37 +0100}, biburl = {https://dblp.org/rec/conf/caise/BarhamgiBOCCMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/TounsiCCG13, author = {Wiem Tounsi and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Bruno Crispo and Ravi S. Sandhu and Nora Cuppens{-}Boulahia and Mauro Conti and Jean{-}Louis Lanet}, title = {Privacy-enhanced filtering and collection middleware in EPCglobal networks}, booktitle = {2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23-25, 2013}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CRiSIS.2013.6766358}, doi = {10.1109/CRISIS.2013.6766358}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/TounsiCCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/SamarjiCCKD13, author = {Layal Samarji and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Wael Kanoun and Samuel Dubus}, editor = {Guojun Wang and Indrakshi Ray and Dengguo Feng and Muttukrishnan Rajarajan}, title = {Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks}, booktitle = {Cyberspace Safety and Security - 5th International Symposium, {CSS} 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8300}, pages = {132--150}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03584-0\_11}, doi = {10.1007/978-3-319-03584-0\_11}, timestamp = {Fri, 05 Aug 2022 08:50:55 +0200}, biburl = {https://dblp.org/rec/conf/css/SamarjiCCKD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/JustusCCBCC13, author = {Benjamin Justus and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Julien Bringer and Herv{\'{e}} Chabanne and Olivier Cipiere}, editor = {Lingyu Wang and Basit Shafiq}, title = {Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {274--281}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_19}, doi = {10.1007/978-3-642-39256-6\_19}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/JustusCCBCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/BarhamgiBACC13, author = {Mahmoud Barhamgi and Djamal Benslimane and Youssef Amghar and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Giovanna Guerrini and Norman W. Paton}, title = {PrivComp: a privacy-aware data service composition system}, booktitle = {Joint 2013 {EDBT/ICDT} Conferences, {EDBT} '13 Proceedings, Genoa, Italy, March 18-22, 2013}, pages = {757--760}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2452376.2452473}, doi = {10.1145/2452376.2452473}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edbt/BarhamgiBACC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/PapagiannakopoulouKLDGKVCC13, author = {Eugenia I. Papagiannakopoulou and Maria N. Koukovini and Georgios V. Lioudakis and Nikolaos L. Dellas and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Dimitra I. Kaklamani and Iakovos S. Venieris and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Jean{-}Luc Danger and Mourad Debbabi and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood}, title = {Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model}, booktitle = {Foundations and Practice of Security - 6th International Symposium, {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8352}, pages = {209--226}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05302-8\_13}, doi = {10.1007/978-3-319-05302-8\_13}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/PapagiannakopoulouKLDGKVCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/HachanaCCAM13, author = {Safa{\`{a}} Hachana and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Vijay Atluri and Stephane Morucci}, editor = {Aditya Bagchi and Indrakshi Ray}, title = {Policy Mining: {A} Bottom-Up Approach toward a Model Based Firewall Management}, booktitle = {Information Systems Security - 9th International Conference, {ICISS} 2013, Kolkata, India, December 16-20, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {133--147}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45204-8\_10}, doi = {10.1007/978-3-642-45204-8\_10}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/HachanaCCAM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict/MoatazSCC13, author = {Tarik Moataz and Abdullatif Shikfa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Semantic search over encrypted data}, booktitle = {20st International Conference on Telecommunications, {ICT} 2013, Casablanca, Morocco, May 6-8, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICTEL.2013.6632121}, doi = {10.1109/ICTEL.2013.6632121}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ict/MoatazSCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/BkakriaCCF13, author = {Anis Bkakria and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Jos{\'{e}} M. Fernandez}, editor = {Khabib Mustofa and Erich J. Neuhold and A Min Tjoa and Edgar R. Weippl and Ilsun You}, title = {Confidentiality-Preserving Query Execution of Fragmented Outsourced Data}, booktitle = {Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7804}, pages = {426--440}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36818-9\_47}, doi = {10.1007/978-3-642-36818-9\_47}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/BkakriaCCF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwe/PerezGCCC13, author = {Salvador Mart{\'{\i}}nez Perez and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Jordi Cabot}, editor = {Quan Z. Sheng and Jesper Kjeldskov}, title = {Towards an Access-Control Metamodel for Web Content Management Systems}, booktitle = {Current Trends in Web Engineering - {ICWE} 2013 International Workshops ComposableWeb, QWE, MDWE, DMSSW, EMotions, CSE, SSN, and PhD Symposium, Aalborg, Denmark, July 8-12, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8295}, pages = {148--155}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04244-2\_14}, doi = {10.1007/978-3-319-04244-2\_14}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icwe/PerezGCCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip6-6/FourcotTKCC13, author = {Florent Fourcot and Laurent Toutain and Stefan K{\"{o}}psell and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Thomas Bauschert}, title = {IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices}, booktitle = {Advances in Communication Networking - 19th {EUNICE/IFIP} {WG} 6.6 International Workshop, Chemnitz, Germany, August 28-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8115}, pages = {148--160}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40552-5\_14}, doi = {10.1007/978-3-642-40552-5\_14}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/ifip6-6/FourcotTKCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medes/TounsiCCG13, author = {Wiem Tounsi and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Latif Ladid and Antonio Montes and Peter A. Bruck and Fernando Ferri and Richard Chbeir}, title = {Fine-grained privacy control for the {RFID} middleware of EPCglobal networks}, booktitle = {Fifth International Conference on Management of Emergent Digital EcoSystems, {MEDES} '13, Luxembourg, Luxembourg, October 29-31, 2013}, pages = {60--67}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2536146.2536154}, doi = {10.1145/2536146.2536154}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/medes/TounsiCCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/PerezGCCC13, author = {Salvador Mart{\'{\i}}nez Perez and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Jordi Cabot}, editor = {Ana Moreira and Bernhard Sch{\"{a}}tz and Jeff Gray and Antonio Vallecillo and Peter J. Clarke}, title = {Model-Driven Extraction and Analysis of Network Security Policies}, booktitle = {Model-Driven Engineering Languages and Systems - 16th International Conference, {MODELS} 2013, Miami, FL, USA, September 29 - October 4, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8107}, pages = {52--68}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41533-3\_4}, doi = {10.1007/978-3-642-41533-3\_4}, timestamp = {Mon, 21 Jun 2021 12:26:18 +0200}, biburl = {https://dblp.org/rec/conf/models/PerezGCCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/JustusCCBCC13, author = {Benjamin Justus and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Julien Bringer and Herv{\'{e}} Chabanne and Olivier Cipiere}, editor = {Jordi Castell{\`{a}}{-}Roca and Josep Domingo{-}Ferrer and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Ali A. Ghorbani and Christian Damsgaard Jensen and Jes{\'{u}}s A. Manj{\'{o}}n and Iosif{-}Viorel Onut and Natalia Stakhanova and Vicen{\c{c}} Torra and Jie Zhang}, title = {Define privacy-preserving setbase drawer size standard: {A} {\unicode{8714}}-closeness perspective}, booktitle = {Eleventh Annual International Conference on Privacy, Security and Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013}, pages = {362--365}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PST.2013.6596090}, doi = {10.1109/PST.2013.6596090}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/JustusCCBCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/GraaCCC13, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Ana R. Cavalli}, editor = {Kokou Y{\'{e}}tongnon and Albert Dipanda and Richard Chbeir}, title = {Formal Characterization of Illegal Control Flow in Android System}, booktitle = {Ninth International Conference on Signal-Image Technology {\&} Internet-Based Systems, {SITIS} 2013, Kyoto, Japan, December 2-5, 2013}, pages = {293--300}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SITIS.2013.56}, doi = {10.1109/SITIS.2013.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/GraaCCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/AyedICCPF13, author = {Samiha Ayed and Muhammad Sabir Idrees and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and M{\'{o}}nica Pinto and Lidia Fuentes}, editor = {Kokou Y{\'{e}}tongnon and Albert Dipanda and Richard Chbeir}, title = {Security Aspects: {A} Framework for Enforcement of Security Policies Using {AOP}}, booktitle = {Ninth International Conference on Signal-Image Technology {\&} Internet-Based Systems, {SITIS} 2013, Kyoto, Japan, December 2-5, 2013}, pages = {301--308}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SITIS.2013.57}, doi = {10.1109/SITIS.2013.57}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/AyedICCPF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Franco-ContrerasCCCR13, author = {Javier Franco{-}Contreras and Gouenou Coatrieux and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Christian Roux}, editor = {Rafael Accorsi and Silvio Ranise}, title = {Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {207--222}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_14}, doi = {10.1007/978-3-642-41098-7\_14}, timestamp = {Wed, 25 Sep 2019 18:14:27 +0200}, biburl = {https://dblp.org/rec/conf/stm/Franco-ContrerasCCCR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crisis/2013, editor = {Bruno Crispo and Ravi S. Sandhu and Nora Cuppens{-}Boulahia and Mauro Conti and Jean{-}Louis Lanet}, title = {2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23-25, 2013}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6749561/proceeding}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fps/2012, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Ali Miri and Nadia Tawbi}, title = {Foundations and Practice of Security - 5th International Symposium, {FPS} 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7743}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37119-6}, doi = {10.1007/978-3-642-37119-6}, isbn = {978-3-642-37118-9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/KanounDPCC12, author = {Wael Kanoun and Samuel Dubus and Serge Papillon and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Towards Dynamic Risk Management: Success Likelihood of Ongoing Attacks}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {3}, pages = {61--78}, year = {2012}, url = {https://doi.org/10.1002/bltj.21558}, doi = {10.1002/BLTJ.21558}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/KanounDPCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cuppens-Boulahia12, author = {Nora Cuppens{-}Boulahia}, title = {Penetration Tester's Open Source Toolkit}, journal = {Comput. Secur.}, volume = {31}, number = {4}, pages = {630--632}, year = {2012}, url = {https://doi.org/10.1016/j.cose.2012.03.008}, doi = {10.1016/J.COSE.2012.03.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Cuppens-Boulahia12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/ElrakaibyCC12, author = {Yehia Elrakaiby and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {Formal enforcement and management of obligation policies}, journal = {Data Knowl. Eng.}, volume = {71}, number = {1}, pages = {127--147}, year = {2012}, url = {https://doi.org/10.1016/j.datak.2011.09.001}, doi = {10.1016/J.DATAK.2011.09.001}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/ElrakaibyCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/HachanaCC12, author = {Safa{\`{a}} Hachana and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Role Mining to Assist Authorization Governance: How Far Have We Gone?}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {4}, pages = {45--64}, year = {2012}, url = {https://doi.org/10.4018/jsse.2012100103}, doi = {10.4018/JSSE.2012100103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/HachanaCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HachanaCCG12, author = {Safa{\`{a}} Hachana and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {123--132}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.61}, doi = {10.1109/ARES.2012.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HachanaCCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/OulmakhzouneCCM12, author = {Said Oulmakhzoune and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Stephane Morucci}, title = {Privacy Policy Preferences Enforced by {SPARQL} Query Rewriting}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {335--342}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.86}, doi = {10.1109/ARES.2012.86}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/OulmakhzouneCCM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/GraaCCC12, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Ana R. Cavalli}, editor = {Yang Xiang and Javier L{\'{o}}pez and C.{-}C. Jay Kuo and Wanlei Zhou}, title = {Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses}, booktitle = {Cyberspace Safety and Security - 4th International Symposium, {CSS} 2012, Melbourne, Australia, December 12-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7672}, pages = {33--47}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35362-8\_4}, doi = {10.1007/978-3-642-35362-8\_4}, timestamp = {Fri, 22 Apr 2022 17:07:03 +0200}, biburl = {https://dblp.org/rec/conf/css/GraaCCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasfaa/CuppensCV12, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Eduardo Pena Vi{\~{n}}a}, editor = {Hwanjo Yu and Ge Yu and Wynne Hsu and Yang{-}Sae Moon and Rainer Unland and Jaesoo Yoo}, title = {Adaptive Access Control Enforcement in Social Network Using Aspect Weaving}, booktitle = {Database Systems for Advanced Applications - 17th International Conference, {DASFAA} 2012, International Workshops: FlashDB, ITEMS, SNSM, SIM3, DQDI, Busan, South Korea, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7240}, pages = {154--167}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29023-7\_17}, doi = {10.1007/978-3-642-29023-7\_17}, timestamp = {Fri, 16 Dec 2022 07:42:33 +0100}, biburl = {https://dblp.org/rec/conf/dasfaa/CuppensCV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/embc/Franco-Contreras12, author = {Javier Franco{-}Contreras and Gouenou Coatrieux and Emmanuel Chazard and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Christian Roux}, title = {Robust lossless watermarking based on circular interpretation of bijective transformations for the protection of medical databases}, booktitle = {Annual International Conference of the {IEEE} Engineering in Medicine and Biology Society, {EMBC} 2012, San Diego, CA, USA, August 28 - September 1, 2012}, pages = {5875--5878}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/EMBC.2012.6347330}, doi = {10.1109/EMBC.2012.6347330}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/embc/Franco-Contreras12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Ben-Ghorbel-TalbiCCM12, author = {Meriam Ben{-}Ghorbel{-}Talbi and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Stephane Morucci}, editor = {Roberto Di Pietro and Javier Herranz and Ernesto Damiani and Radu State}, title = {Towards Session-Aware {RBAC} Delegation: Function Switch}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security, 7th International Workshop, {DPM} 2012, and 5th International Workshop, {SETOP} 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7731}, pages = {287--302}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35890-6\_21}, doi = {10.1007/978-3-642-35890-6\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Ben-Ghorbel-TalbiCCM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KanounSCDC12, author = {Wael Kanoun and Layal Samarji and Nora Cuppens{-}Boulahia and Samuel Dubus and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Roberto Di Pietro and Javier Herranz and Ernesto Damiani and Radu State}, title = {Towards a Temporal Response Taxonomy}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security, 7th International Workshop, {DPM} 2012, and 5th International Workshop, {SETOP} 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7731}, pages = {318--331}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35890-6\_23}, doi = {10.1007/978-3-642-35890-6\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KanounSCDC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/AutrelCC12, author = {Fabien Autrel and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Ali Miri and Nadia Tawbi}, title = {Enabling Dynamic Security Policy in the Java Security Manager}, booktitle = {Foundations and Practice of Security - 5th International Symposium, {FPS} 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7743}, pages = {180--193}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37119-6\_12}, doi = {10.1007/978-3-642-37119-6\_12}, timestamp = {Sun, 02 Oct 2022 16:01:32 +0200}, biburl = {https://dblp.org/rec/conf/fps/AutrelCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/PerezCGCC12, author = {Salvador Mart{\'{\i}}nez Perez and Jordi Cabot and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {A model-driven approach for the extraction of network access-control policies}, booktitle = {Model-Driven Security Workshop, MDsec 2012, In conjunction with MoDELS 2012, Innsbruck, Austria, October 1, 2012}, pages = {5}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2422498.2422503}, doi = {10.1145/2422498.2422503}, timestamp = {Wed, 23 Feb 2022 12:16:49 +0100}, biburl = {https://dblp.org/rec/conf/models/PerezCGCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/CuppensCGMR12, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Tarik Moataz and Xavier Rimasson}, editor = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou}, title = {Handling Stateful Firewall Anomalies}, booktitle = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {376}, pages = {174--186}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30436-1\_15}, doi = {10.1007/978-3-642-30436-1\_15}, timestamp = {Sun, 02 Jun 2019 21:15:16 +0200}, biburl = {https://dblp.org/rec/conf/sec/CuppensCGMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2012, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP} {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7371}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31540-4}, doi = {10.1007/978-3-642-31540-4}, isbn = {978-3-642-31539-8}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2011-7122, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nora Cuppens{-}Boulahia and Sabrina De Capitani di Vimercati}, title = {Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, {DPM} 2011, and 4th International Workshop, {SETOP} 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7122}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28879-1}, doi = {10.1007/978-3-642-28879-1}, isbn = {978-3-642-28878-4}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2011-7122.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pst/2012, editor = {Nora Cuppens{-}Boulahia and Philip Fong and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Stephen Marsh and Jan{-}Philipp Stegh{\"{o}}fer}, title = {Tenth Annual International Conference on Privacy, Security and Trust, {PST} 2012, Paris, France, July 16-18, 2012}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6287257/proceeding}, isbn = {978-1-4673-2323-9}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/ElrakaibyCC11, author = {Yehia Elrakaiby and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {3}, number = {2}, pages = {33--51}, year = {2011}, url = {https://doi.org/10.4018/jmcmc.2011040103}, doi = {10.4018/JMCMC.2011040103}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/ElrakaibyCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/PredaCCGT11, author = {Stere Preda and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Laurent Toutain}, title = {Dynamic deployment of context-aware access control policies for constrained security devices}, journal = {J. Syst. Softw.}, volume = {84}, number = {7}, pages = {1144--1159}, year = {2011}, url = {https://doi.org/10.1016/j.jss.2011.02.005}, doi = {10.1016/J.JSS.2011.02.005}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/PredaCCGT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Cuppens-BoulahiaCN11, author = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Marie Nuadi}, title = {Smatch Model: Extending {RBAC} Sessions in Virtualization Environment}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {17--26}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.13}, doi = {10.1109/ARES.2011.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Cuppens-BoulahiaCN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ThomasCC11, author = {Julien A. Thomas and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Declassification Policy Management in Dynamic Information Systems}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {143--152}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.30}, doi = {10.1109/ARES.2011.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ThomasCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/embc/PanCCCR11, author = {Wei Pan and Gouenou Coatrieux and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Christian Roux}, title = {Reversible watermarking based on invariant image classification and dynamical error histogram shifting}, booktitle = {33rd Annual International Conference of the {IEEE} Engineering in Medicine and Biology Society, {EMBC} 2011, Boston, MA, USA, August 30 - Sept. 3, 2011}, pages = {4477--4480}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/IEMBS.2011.6091110}, doi = {10.1109/IEMBS.2011.6091110}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/embc/PanCCCR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GraaCAACCCM11, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fabien Autrel and Hanieh Azkia and Fr{\'{e}}d{\'{e}}ric Cuppens and Gouenou Coatrieux and Ana R. Cavalli and Amel Mammar}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nora Cuppens{-}Boulahia and Sabrina De Capitani di Vimercati}, title = {Using Requirements Engineering in an Automatic Security Policy Derivation Process}, booktitle = {Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, {DPM} 2011, and 4th International Workshop, {SETOP} 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7122}, pages = {155--172}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28879-1\_11}, doi = {10.1007/978-3-642-28879-1\_11}, timestamp = {Fri, 27 Dec 2019 21:19:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/GraaCAACCCM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/TounsiCCG11, author = {Wiem Tounsi and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Pascal Lafourcade}, title = {Formal Verification of a Key Establishment Protocol for {EPC} Gen2 {RFID} Systems: Work in Progress}, booktitle = {Foundations and Practice of Security - 4th Canada-France {MITACS} Workshop, {FPS} 2011, Paris, France, May 12-13, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6888}, pages = {242--251}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27901-0\_20}, doi = {10.1007/978-3-642-27901-0\_20}, timestamp = {Fri, 27 Dec 2019 21:23:06 +0100}, biburl = {https://dblp.org/rec/conf/fps/TounsiCCG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/ThomasCC11, author = {Julien A. Thomas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Consistency Policies for Dynamic Information Systems with Declassification Flows}, booktitle = {Information Systems Security - 7th International Conference, {ICISS} 2011, Kolkata, India, December 15-19, 2011, Procedings}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {87--101}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25560-1\_6}, doi = {10.1007/978-3-642-25560-1\_6}, timestamp = {Wed, 25 Sep 2019 18:06:16 +0200}, biburl = {https://dblp.org/rec/conf/iciss/ThomasCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/notere/AjamCC11, author = {Nabil Ajam and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Isabelle M. Demeure and Thomas Robert and Ahmed Serhrouchni}, title = {Privacy Enforcement of Composed Services in Cellular Networks}, booktitle = {11th Annual International Conference on New Technologies of Distributed Systems, {NOTERE} 2011, Paris, France, 9-13 May 2011}, pages = {1--8}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/NOTERE.2011.5957982}, doi = {10.1109/NOTERE.2011.5957982}, timestamp = {Wed, 11 Dec 2019 16:29:18 +0100}, biburl = {https://dblp.org/rec/conf/notere/AjamCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/TalbiCCMP11, author = {Meriam Ben{-}Ghorbel{-}Talbi and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Daniel Le M{\'{e}}tayer and Guillaume Piolle}, editor = {Jan Camenisch and Simone Fischer{-}H{\"{u}}bner and Yuko Murayama and Armand Portmann and Carlos Rieder}, title = {Delegation of Obligations and Responsibility}, booktitle = {Future Challenges in Security and Privacy for Academia and Industry - 26th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {354}, pages = {197--209}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21424-0\_16}, doi = {10.1007/978-3-642-21424-0\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/TalbiCCMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/CuppensC11, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Cover Story}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {264--265}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_674}, doi = {10.1007/978-1-4419-5906-5\_674}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/CuppensC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/CuppensC11a, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Multilevel Security Policies}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {811--812}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_824}, doi = {10.1007/978-1-4419-5906-5\_824}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/CuppensC11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Ben-Ghorbel-TalbiCCB10, author = {Meriam Ben{-}Ghorbel{-}Talbi and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Adel Bouhoula}, title = {A delegation model for extended {RBAC}}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {3}, pages = {209--236}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0104-3}, doi = {10.1007/S10207-010-0104-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Ben-Ghorbel-TalbiCCB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ElrakaibyCC10, author = {Yehia Elrakaiby and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {From Contextual Permission to Dynamic Pre-obligation: An Integrated Approach}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {70--78}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.71}, doi = {10.1109/ARES.2010.71}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ElrakaibyCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PredaCCT10, author = {Stere Preda and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Laurent Toutain}, title = {Architecture-Aware Adaptive Deployment of Contextual Security Policies}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {87--95}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.45}, doi = {10.1109/ARES.2010.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/PredaCCT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/KanounCCDM10, author = {Wael Kanoun and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Samuel Dubus and Antony Martin}, title = {Intelligent response system to mitigate the success likelihood of ongoing attacks}, booktitle = {Sixth International Conference on Information Assurance and Security, {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010}, pages = {99--105}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISIAS.2010.5604054}, doi = {10.1109/ISIAS.2010.5604054}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/KanounCCDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AzkiaCCC10, author = {Hanieh Azkia and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Gouenou Coatrieux}, title = {Reconciling {IHE-ATNA} profile with a posteriori contextual access and usage control policy in healthcare environment}, booktitle = {Sixth International Conference on Information Assurance and Security, {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010}, pages = {197--203}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISIAS.2010.5604060}, doi = {10.1109/ISIAS.2010.5604060}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/AzkiaCCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsr/TounsiGCC10, author = {Wiem Tounsi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Securing the Communications of Home Health Care Systems Based on {RFID} Sensor Networks}, booktitle = {8th Annual Conference on Communication Networks and Services Research, {CNSR} 2010, 11-14 May 2010, Montreal, Canada}, pages = {284--291}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CNSR.2010.38}, doi = {10.1109/CNSR.2010.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsr/TounsiGCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/OulmakhzouneCCM10, author = {Said Oulmakhzoune and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Stephane Morucci}, editor = {Sara Foresti and Sushil Jajodia}, title = {\emph{f}Query: {SPARQL} Query Rewriting to Enforce Data Confidentiality}, booktitle = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP} {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6166}, pages = {146--161}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13739-6\_10}, doi = {10.1007/978-3-642-13739-6\_10}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/OulmakhzouneCCM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Garcia-AlfaroCCP10, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Stere Preda}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Ana R. Cavalli and Jean Leneutre}, title = {{MIRAGE:} {A} Management Tool for the Analysis and Deployment of Network Security Policies}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, {DPM} 2010 and 3rd International Workshop, {SETOP} 2010, Athens, Greece, September 23, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6514}, pages = {203--215}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19348-4\_15}, doi = {10.1007/978-3-642-19348-4\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Garcia-AlfaroCCP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KheirCCD10, author = {Nizar Kheir and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {A Service Dependency Model for Cost-Sensitive Intrusion Response}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {626--642}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_38}, doi = {10.1007/978-3-642-15497-3\_38}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KheirCCD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/PredaCCGT10, author = {Stere Preda and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Laurent Toutain}, editor = {Fabio Massacci and Dan S. Wallach and Nicola Zannone}, title = {Model-Driven Security Policy Deployment: Property Oriented Approach}, booktitle = {Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5965}, pages = {123--139}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11747-3\_10}, doi = {10.1007/978-3-642-11747-3\_10}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/PredaCCGT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/OulmakhzouneCCM10, author = {Said Oulmakhzoune and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Stephane Morucci}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {Rewriting of SPARQL/Update Queries for Securing Data Access}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {4--15}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_2}, doi = {10.1007/978-3-642-17650-0\_2}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/OulmakhzouneCCM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medes/Ben-Ghorbel-TalbiCC10, author = {Meriam Ben{-}Ghorbel{-}Talbi and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Richard Chbeir}, title = {Negotiating and delegating obligations}, booktitle = {{MEDES} '10: International {ACM} Conference on Management of Emergent Digital EcoSystems, Bangkok, Thailand, October 26-29, 2010}, pages = {281--288}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1936254.1936310}, doi = {10.1145/1936254.1936310}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/medes/Ben-Ghorbel-TalbiCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medes/ThomasCC10, author = {Julien A. Thomas and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Richard Chbeir}, title = {Expression and enforcement of confidentiality policy in active databases}, booktitle = {{MEDES} '10: International {ACM} Conference on Management of Emergent Digital EcoSystems, Bangkok, Thailand, October 26-29, 2010}, pages = {289--296}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1936254.1936311}, doi = {10.1145/1936254.1936311}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/medes/ThomasCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DebarKCC10, author = {Herv{\'{e}} Debar and Nizar Kheir and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Service Dependencies in Information Systems Security}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {1--20}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_1}, doi = {10.1007/978-3-642-14706-7\_1}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DebarKCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/KanounCCD10, author = {Wael Kanoun and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Samuel Dubus}, editor = {Yang Xiang and Pierangela Samarati and Jiankun Hu and Wanlei Zhou and Ahmad{-}Reza Sadeghi}, title = {Risk-Aware Framework for Activating and Deactivating Policy-Based Response}, booktitle = {Fourth International Conference on Network and System Security, {NSS} 2010, Melbourne, Victoria, Australia, September 1-3, 2010}, pages = {207--215}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NSS.2010.80}, doi = {10.1109/NSS.2010.80}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/KanounCCD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KheirCCD10, author = {Nizar Kheir and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar}, editor = {Kai Rannenberg and Vijay Varadharajan and Christian Weber}, title = {Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment}, booktitle = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11} International Information Security Conference, {SEC} 2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {330}, pages = {148--160}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15257-3\_14}, doi = {10.1007/978-3-642-15257-3\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/KheirCCD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AjamCC10, author = {Nabil Ajam and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Sushil Jajodia and Jianying Zhou}, title = {Privacy Administration in Distributed Service Infrastructure}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {53--70}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_4}, doi = {10.1007/978-3-642-16161-2\_4}, timestamp = {Sun, 07 Jan 2018 16:52:46 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/AjamCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/PanCCCR10, author = {Wei Pan and Gouenou Coatrieux and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Christian Roux}, editor = {Kokou Y{\'{e}}tongnon and Albert Dipanda and Richard Chbeir}, title = {Watermarking to Enforce Medical Image Access and Usage Control Policy}, booktitle = {Sixth International Conference on Signal-Image Technology and Internet-Based Systems, {SITIS} 2010, Kuala Lumpur, Malaysia, December 15-18, 2010}, pages = {251--260}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SITIS.2010.50}, doi = {10.1109/SITIS.2010.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/PanCCCR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2010-5939, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nora Cuppens{-}Boulahia and Yves Roudier}, title = {Data Privacy Management and Autonomous Spontaneous Security, 4th International Workshop, {DPM} 2009 and Second International Workshop, {SETOP} 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5939}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11207-2}, doi = {10.1007/978-3-642-11207-2}, isbn = {978-3-642-11206-5}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2010-5939.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1012-2720, author = {Meriam Ben{-}Ghorbel{-}Talbi and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Adel Bouhoula}, title = {Managing Delegation in Access Control Models}, journal = {CoRR}, volume = {abs/1012.2720}, year = {2010}, url = {http://arxiv.org/abs/1012.2720}, eprinttype = {arXiv}, eprint = {1012.2720}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1012-2720.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/HaidarCCD09, author = {Diala Abi Haidar and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar}, title = {XeNA: an access negotiation framework using {XACML}}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {64}, number = {1-2}, pages = {155--169}, year = {2009}, url = {https://doi.org/10.1007/s12243-008-0050-5}, doi = {10.1007/S12243-008-0050-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/HaidarCCD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Cuppens-Boulahia09, author = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Fabien Autrel and Herv{\'{e}} Debar}, title = {An ontology-based approach to react to network attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {3/4}, pages = {280--305}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.031041}, doi = {10.1504/IJICS.2009.031041}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Cuppens-Boulahia09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AyedCC09, author = {Samiha Ayed and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Deploying Security Policy in Intra and Inter Workflow Management Systems}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {58--65}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.152}, doi = {10.1109/ARES.2009.152}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/AyedCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PredaCCGTE09, author = {Stere Preda and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Laurent Toutain and Yehia Elrakaiby}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {Semantic context aware security policy deployment}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {251--261}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533092}, doi = {10.1145/1533057.1533092}, timestamp = {Fri, 18 Mar 2022 11:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PredaCCGTE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/PredaTCCG09, author = {Stere Preda and Laurent Toutain and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Anas Abou El Kalam and Yves Deswarte and Mahmoud Mostafa}, title = {A secured delegation of remote services on IPv6 home networks}, booktitle = {CRiSIS 2009, Post-Proceedings of the Fourth International Conference on Risks and Security of Internet and Systems, Toulouse, France, October 19-22, 2009}, pages = {12--18}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CRISIS.2009.5411984}, doi = {10.1109/CRISIS.2009.5411984}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/crisis/PredaTCCG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/KanounCCDM09, author = {Wael Kanoun and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Samuel Dubus and Antony Martin}, title = {Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems}, booktitle = {Proceedings of the 12th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August 29-31, 2009}, pages = {83--91}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSE.2009.233}, doi = {10.1109/CSE.2009.233}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/KanounCCDM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AutrelCC09, author = {Fabien Autrel and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Reaction Policy Model Based on Dynamic Organizations and Threat Context}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {49--64}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_4}, doi = {10.1007/978-3-642-03007-9\_4}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/AutrelCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/KheirDCCV09, author = {Nizar Kheir and Herv{\'{e}} Debar and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Jouni Viinikka}, editor = {Ulrich Flegel and Danilo Bruschi}, title = {A Service Dependency Modeling Framework for Policy-Based Response Enforcement}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5587}, pages = {176--195}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02918-9\_11}, doi = {10.1007/978-3-642-02918-9\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/KheirDCCV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AjamCC09, author = {Nabil Ajam and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nora Cuppens{-}Boulahia and Yves Roudier}, title = {Contextual Privacy Management in Extended Role Based Access Control Model}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security, 4th International Workshop, {DPM} 2009 and Second International Workshop, {SETOP} 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5939}, pages = {121--135}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11207-2\_10}, doi = {10.1007/978-3-642-11207-2\_10}, timestamp = {Fri, 27 Dec 2019 21:19:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AjamCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PanCCCR09, author = {Wei Pan and Gouenou Coatrieux and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Christian Roux}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nora Cuppens{-}Boulahia and Yves Roudier}, title = {Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security, 4th International Workshop, {DPM} 2009 and Second International Workshop, {SETOP} 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5939}, pages = {153--162}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11207-2\_12}, doi = {10.1007/978-3-642-11207-2\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/PanCCCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdim/ElrakaibyCC09, author = {Yehia El Rakaiby and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Bill Grosky and Fr{\'{e}}d{\'{e}}ric Andr{\`{e}}s and Pit Pichappan}, title = {From state-based to event-based contextual security policies}, booktitle = {Fourth {IEEE} International Conference on Digital Information Management, {ICDIM} 2009, November 1-4, 2009, University of Michigan, Ann Arbor, Michigan, {USA}}, pages = {241--247}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICDIM.2009.5356768}, doi = {10.1109/ICDIM.2009.5356768}, timestamp = {Sat, 15 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdim/ElrakaibyCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/ElrakaibyCC09, author = {Yehia El Rakaiby and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {Formalization and Management of Group Obligations}, booktitle = {{POLICY} 2009, {IEEE} International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009}, pages = {158--165}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/POLICY.2009.10}, doi = {10.1109/POLICY.2009.10}, timestamp = {Sat, 15 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/policy/ElrakaibyCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/ThomasCC09, author = {Julien A. Thomas and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Kokou Y{\'{e}}tongnon and Richard Chbeir and Albert Dipanda}, title = {Modeling and Controlling Downgrading Operations in Information Systems}, booktitle = {Fifth International Conference on Signal-Image Technology {\&} Internet-Based Systems, {SITIS} 2009, Marrakesh, Morocco, November 29 - December 4, 2009}, pages = {377--384}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SITIS.2009.66}, doi = {10.1109/SITIS.2009.66}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/ThomasCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/Ben-Ghorbel-TalbiCCB09, author = {Meriam Ben{-}Ghorbel{-}Talbi and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Adel Bouhoula}, editor = {Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis and G{\"{u}}nther Pernul}, title = {An Extended Role-Based Access Control Model for Delegating Obligations}, booktitle = {Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5695}, pages = {127--137}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03748-1\_13}, doi = {10.1007/978-3-642-03748-1\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/Ben-Ghorbel-TalbiCCB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0905-1362, author = {Stere Preda and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Laurent Toutain}, title = {Reliable Process for Security Policy Deployment}, journal = {CoRR}, volume = {abs/0905.1362}, year = {2009}, url = {http://arxiv.org/abs/0905.1362}, eprinttype = {arXiv}, eprint = {0905.1362}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0905-1362.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/AyedCC08, author = {Samiha Ayed and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Deploying Access and Flow Control in Distributed Workflows}, journal = {J. Res. Pract. Inf. Technol.}, volume = {40}, number = {4}, pages = {231--254}, year = {2008}, url = {http://ws.acs.org.au/jrpit/JRPITVolumes/JRPIT40/JRPIT40.4.231.pdf}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/AyedCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Garcia-AlfaroBC08, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Complete analysis of configuration rules to guarantee reliable network security policies}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {2}, pages = {103--122}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0045-7}, doi = {10.1007/S10207-007-0045-7}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/Garcia-AlfaroBC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CuppensC08, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {Modeling contextual security policies}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {4}, pages = {285--305}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0051-9}, doi = {10.1007/S10207-007-0051-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/CuppensC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ComaCCC08, author = {C{\'{e}}line Coma and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Ana R. Cavalli}, title = {Context Ontology for Secure Interoperability}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {821--827}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.133}, doi = {10.1109/ARES.2008.133}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ComaCCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/AyedCC08, author = {Samiha Ayed and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Managing access and flow control requirements in distributed workflows}, booktitle = {The 6th {ACS/IEEE} International Conference on Computer Systems and Applications, {AICCSA} 2008, Doha, Qatar, March 31 - April 4, 2008}, pages = {702--710}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/AICCSA.2008.4493605}, doi = {10.1109/AICCSA.2008.4493605}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/AyedCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/AyedCC08, author = {Samiha Ayed and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {Deploying Access Control in Distributed Workflow}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {9--17}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Ayed.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/AyedCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/LeCCM08, author = {Cam Tu Phan Le and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Patrick Maill{\'{e}}}, editor = {Elisa Bertino and James B. D. Joshi}, title = {Evaluating the Trustworthiness of Contributors in a Collaborative Environment}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {10}, pages = {451--460}, publisher = {Springer / {ICST}}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03354-4\_34}, doi = {10.1007/978-3-642-03354-4\_34}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/LeCCM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/Cuppens-BoulahiaCVVGD08, author = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Jorge E. L{\'{o}}pez de Vergara and Enrique V{\'{a}}zquez and Javier Guerra and Herv{\'{e}} Debar}, editor = {Mohamed Jmaiel and Mohamed Mosbah}, title = {An ontology-based approach to react to network attacks}, booktitle = {CRiSIS '08, Third International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia, October 28-30, 2008}, pages = {27--35}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/CRISIS.2008.4757461}, doi = {10.1109/CRISIS.2008.4757461}, timestamp = {Tue, 11 Oct 2022 14:59:07 +0200}, biburl = {https://dblp.org/rec/conf/crisis/Cuppens-BoulahiaCVVGD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/KanounCCA08, author = {Wael Kanoun and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Jos{\'{e}} Araujo}, editor = {Mohamed Jmaiel and Mohamed Mosbah}, title = {Automated reaction based on risk analysis and attackers skills in intrusion detection systems}, booktitle = {CRiSIS '08, Third International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia, October 28-30, 2008}, pages = {117--124}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/CRISIS.2008.4757471}, doi = {10.1109/CRISIS.2008.4757471}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/KanounCCA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/deon/Cuppens-BoulahiaC08, author = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Ron van der Meyden and Leendert W. N. van der Torre}, title = {Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic}, booktitle = {Deontic Logic in Computer Science, 9th International Conference, {DEON} 2008, Luxembourg, Luxembourg, July 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5076}, pages = {65--80}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70525-3\_7}, doi = {10.1007/978-3-540-70525-3\_7}, timestamp = {Thu, 14 Oct 2021 10:16:00 +0200}, biburl = {https://dblp.org/rec/conf/deon/Cuppens-BoulahiaC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Ben-Ghorbel-TalbiCCB08, author = {Meriam Ben{-}Ghorbel{-}Talbi and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Adel Bouhoula}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {Revocation Schemes for Delegation Licences}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {190--205}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_13}, doi = {10.1007/978-3-540-88625-9\_13}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/icics/Ben-Ghorbel-TalbiCCB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/CuppensCT08, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Julien A. Thomas}, editor = {R. Sekar and Arun K. Pujari}, title = {A Robust Reputation Scheme for Decentralized Group Management Systems}, booktitle = {Information Systems Security, 4th International Conference, {ICISS} 2008, Hyderabad, India, December 16-20, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {71--85}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89862-7\_5}, doi = {10.1007/978-3-540-89862-7\_5}, timestamp = {Thu, 18 Nov 2021 17:21:37 +0100}, biburl = {https://dblp.org/rec/conf/iciss/CuppensCT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Cuppens-BoulahiaCHD08, author = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Diala Abi Haidar and Herv{\'{e}} Debar}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Negotiation of Prohibition: An Approach Based on Policy Rewriting}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {173--187}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_12}, doi = {10.1007/978-0-387-09699-5\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/Cuppens-BoulahiaCHD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ElrakaibyCC08, author = {Yehia ElRakaiby and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Interactivity for Reactive Access Control}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {57--64}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Sat, 15 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ElrakaibyCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/CuppensCBKC08, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Yacine Bouzida and Wael Kanoun and Aur{\'{e}}lien Croissant}, editor = {Richard Chbeir and Albert Dipanda and Kokou Y{\'{e}}tongnon}, title = {Expression and Deployment of Reaction Policies}, booktitle = {4th {IEEE} International Conference on Signal Image Technology and Internet Based Systems, {SITIS} 2008, Bali, Indonesia, November 30 - December 3, 2008}, pages = {118--127}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SITIS.2008.96}, doi = {10.1109/SITIS.2008.96}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/CuppensCBKC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/ComaCCC08, author = {C{\'{e}}line Coma and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Ana R. Cavalli}, editor = {Richard Chbeir and Albert Dipanda and Kokou Y{\'{e}}tongnon}, title = {Interoperability of Context Based System Policies Using {O2O} Contract}, booktitle = {4th {IEEE} International Conference on Signal Image Technology and Internet Based Systems, {SITIS} 2008, Bali, Indonesia, November 30 - December 3, 2008}, pages = {137--144}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SITIS.2008.68}, doi = {10.1109/SITIS.2008.68}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/ComaCCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0803-0653, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {Aggregating and Deploying Network Access Control Policies}, journal = {CoRR}, volume = {abs/0803.0653}, year = {2008}, url = {http://arxiv.org/abs/0803.0653}, eprinttype = {arXiv}, eprint = {0803.0653}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0803-0653.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/SansCC07, author = {Thierry Sans and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {A Framework to Enforce Access Control, Usage Control and Obligations}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {62}, number = {11-12}, pages = {1329--1352}, year = {2007}, url = {https://doi.org/10.1007/BF03253322}, doi = {10.1007/BF03253322}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/SansCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/DebarTCC07, author = {Herv{\'{e}} Debar and Yohann Thomas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {Enabling automated threat response through the use of a dynamic security policy}, journal = {J. Comput. Virol.}, volume = {3}, number = {3}, pages = {195--210}, year = {2007}, url = {https://doi.org/10.1007/s11416-007-0039-z}, doi = {10.1007/S11416-007-0039-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/DebarTCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Garcia-AlfaroCC07, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {Aggregating and Deploying Network Access Control Policies}, booktitle = {Proceedings of the The Second International Conference on Availability, Reliability and Security, {ARES} 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria}, pages = {532--542}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ARES.2007.34}, doi = {10.1109/ARES.2007.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Garcia-AlfaroCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/HaidarCCD07, author = {Diala Abi Haidar and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar}, editor = {Ning Zhang and Ajith Abraham}, title = {Resource Classification Based Negotiation in Web Services}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {313--318}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.54}, doi = {10.1109/IAS.2007.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/HaidarCCD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/AyedCC07, author = {Samiha Ayed and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Iliano Cervesato}, title = {An Integrated Model for Access Control and Information Flow Requirements}, booktitle = {Advances in Computer Science - {ASIAN} 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4846}, pages = {111--125}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76929-3\_12}, doi = {10.1007/978-3-540-76929-3\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/asian/AyedCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BrunelCCSB07, author = {Julien Brunel and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Thierry Sans and Jean{-}Paul Bodeveix}, editor = {Peng Ning and Vijay Atluri and Virgil D. Gligor and Heiko Mantel}, title = {Security policy compliance with violation management}, booktitle = {Proceedings of the 2007 {ACM} workshop on Formal methods in security engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {31--40}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314436.1314441}, doi = {10.1145/1314436.1314441}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BrunelCCSB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/KanounCCA07, author = {Wael Kanoun and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Fabien Autrel}, editor = {Javier L{\'{o}}pez and Bernhard M. H{\"{a}}mmerli}, title = {Advanced Reaction Using Risk Assessment in Intrusion Detection Systems}, booktitle = {Critical Information Infrastructures Security, Second International Workshop, {CRITIS} 2007, M{\'{a}}laga, Spain, October 3-5, 2007. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5141}, pages = {58--70}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-89173-4\_6}, doi = {10.1007/978-3-540-89173-4\_6}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/KanounCCA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/CuppensCS07, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Thierry Sans}, editor = {Bruno Apolloni and Robert J. Howlett and Lakhmi C. Jain}, title = {{XML-BB:} {A} Model to Handle Relationships Protection in {XML} Documents}, booktitle = {Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, {KES} 2007, {XVII} Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {4694}, pages = {1107--1114}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74829-8\_135}, doi = {10.1007/978-3-540-74829-8\_135}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/kes/CuppensCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/CuppensCRT07, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Tony Ramard and Julien A. Thomas}, editor = {Hongke Zhang and Stephan Olariu and Jiannong Cao and David B. Johnson}, title = {Misbehaviors Detection to Ensure Availability in {OLSR}}, booktitle = {Mobile Ad-Hoc and Sensor Networks, Third International Conference, {MSN} 2007, Beijing, China, December 12-14, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4864}, pages = {799--813}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77024-4\_72}, doi = {10.1007/978-3-540-77024-4\_72}, timestamp = {Tue, 14 Apr 2020 13:23:09 +0200}, biburl = {https://dblp.org/rec/conf/msn/CuppensCRT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/MallouliOCCC07, author = {Wissam Mallouli and Jean{-}Marie Orset and Ana R. Cavalli and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Volkmar Lotz and Bhavani Thuraisingham}, title = {A formal approach for testing security rules}, booktitle = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings}, pages = {127--132}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1266840.1266860}, doi = {10.1145/1266840.1266860}, timestamp = {Wed, 29 Jun 2022 15:37:42 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/MallouliOCCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Garcia-AlfaroCC07, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Hein S. Venter and Mariki M. Eloff and Les Labuschagne and Jan H. P. Eloff and Rossouw von Solms}, title = {Management of Exceptions on Access Control Policies}, booktitle = {New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the {IFIP} {TC-11} 22nd International Information Security Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa}, series = {{IFIP}}, volume = {232}, pages = {97--108}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-72367-9\_9}, doi = {10.1007/978-0-387-72367-9\_9}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/Garcia-AlfaroCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SansCC07, author = {Thierry Sans and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Hein S. Venter and Mariki M. Eloff and Les Labuschagne and Jan H. P. Eloff and Rossouw von Solms}, title = {{OPA:} Onion Policy Administration Model - Another approach to manage rights in {DRM}}, booktitle = {New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the {IFIP} {TC-11} 22nd International Information Security Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa}, series = {{IFIP}}, volume = {232}, pages = {349--360}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-72367-9\_30}, doi = {10.1007/978-0-387-72367-9\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/SansCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PredaCCGT07, author = {Stere Preda and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Laurent Toutain}, editor = {Javier Hernando and Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek}, title = {Reliable Process for Security Policy Deployment}, booktitle = {{SECRYPT} 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {5--15}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Fri, 04 Sep 2009 13:27:09 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PredaCCGT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CuppensCR06, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Tony Ramard}, title = {Availability Enforcement by Obligations and Aspects Identification}, booktitle = {Proceedings of the The First International Conference on Availability, Reliability and Security, {ARES} 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria}, pages = {229--239}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ARES.2006.36}, doi = {10.1109/ARES.2006.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/CuppensCR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/SansCC06, author = {Thierry Sans and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Mitsu Okada and Ichiro Satoh}, title = {{FORM} : {A} Federated Rights Expression Model for Open {DRM} Frameworks}, booktitle = {Advances in Computer Science - {ASIAN} 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4435}, pages = {45--59}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-77505-8\_5}, doi = {10.1007/978-3-540-77505-8\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/asian/SansCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/DebarTBC06, author = {Herv{\'{e}} Debar and Yohann Thomas and Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Roland B{\"{u}}schkes and Pavel Laskov}, title = {Using Contextual Security Policies for Threat Response}, booktitle = {Detection of Intrusions and Malware {\&} Vulnerability Assessment, Third International Conference, {DIMVA} 2006, Berlin, Germany, July 13-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4064}, pages = {109--128}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11790754\_7}, doi = {10.1007/11790754\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/DebarTBC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Garcia-AlfaroCC06, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {Analysis of Policy Anomalies on Distributed Network Security Setups}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, pages = {496--511}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908\_30}, doi = {10.1007/11863908\_30}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/Garcia-AlfaroCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/CuppensCC06, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and C{\'{e}}line Coma}, editor = {Aditya Bagchi and Vijayalakshmi Atluri}, title = {{O2O:} Virtual Private Organizations to Manage Security Policy Interoperability}, booktitle = {Information Systems Security, Second International Conference, {ICISS} 2006, Kolkata, India, December 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {101--115}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11961635\_7}, doi = {10.1007/11961635\_7}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/CuppensCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/Garcia-AlfaroCC06, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Janusz G{\'{o}}rski}, title = {Towards Filtering and Alerting Rule Rewriting on Single-Component Policies}, booktitle = {Computer Safety, Reliability, and Security, 25th International Conference, {SAFECOMP} 2006, Gdansk, Poland, September 27-29, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4166}, pages = {182--194}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11875567\_14}, doi = {10.1007/11875567\_14}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safecomp/Garcia-AlfaroCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SansCC06, author = {Thierry Sans and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Simone Fischer{-}H{\"{u}}bner and Kai Rannenberg and Louise Yngstr{\"{o}}m and Stefan Lindskog}, title = {A Flexible and Distributed Architecture to Enforce Dynamic Access Control}, booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP} {TC-11} 21st International Information Security Conference {(SEC} 2006), 22-24 May 2006, Karlstad, Sweden}, series = {{IFIP}}, volume = {201}, pages = {183--195}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-33406-8\_16}, doi = {10.1007/0-387-33406-8\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/SansCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sws/HaidarCCD06, author = {Diala Abi Haidar and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar}, editor = {Ari Juels and Ernesto Damiani and Alban Gabillon}, title = {An extended {RBAC} profile of {XACML}}, booktitle = {Proceedings of the 3rd {ACM} Workshop On Secure Web Services, {SWS} 2006, Alexandria, VA, USA, November 3, 2006}, pages = {13--22}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180367.1180372}, doi = {10.1145/1180367.1180372}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sws/HaidarCCD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CuppensCG07, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Meriam Ben Ghorbel}, editor = {Catalin Dima and Marius Minea and Ferucio Laurentiu Tiplea}, title = {High Level Conflict Management Strategies in Advanced Access Control Models}, booktitle = {Proceedings of the First Workshop in Information and Computer Security, ICS@SYNASC 2006, Timisoara, Romania, September 30, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {186}, pages = {3--26}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2007.01.064}, doi = {10.1016/J.ENTCS.2007.01.064}, timestamp = {Tue, 31 Jan 2023 14:10:47 +0100}, biburl = {https://dblp.org/rec/journals/entcs/CuppensCG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CuppensCS05, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Thierry Sans}, title = {Nomad: {A} Security Model with Non Atomic Actions and Deadlines}, booktitle = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005), 20-22 June 2005, Aix-en-Provence, France}, pages = {186--196}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSFW.2005.20}, doi = {10.1109/CSFW.2005.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/CuppensCS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/CuppensCS05, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Thierry Sans}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Protection of Relationships in {XML} Documents with the {XML-BB} Model}, booktitle = {Information Systems Security, First International Conference, {ICISS} 2005, Kolkata, India, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {148--163}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593980\_11}, doi = {10.1007/11593980\_11}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/CuppensCS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/CuppensCSM04, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Thierry Sans and Alexandre Mi{\`{e}}ge}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {A Formal Approach to Specify and Deploy a Network Security Policy}, booktitle = {Formal Aspects in Security and Trust: Second {IFIP} {TC1} {WG1.7} Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th {IFIP} World Computer Congress, August 22-27, 2004, Toulouse, France}, series = {{IFIP}}, volume = {173}, pages = {203--218}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-24098-5\_15}, doi = {10.1007/0-387-24098-5\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/CuppensCSM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Boulahia-CuppensCGY94, author = {Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Alban Gabillon and Kioumars Yazdanian}, editor = {Dieter Gollmann}, title = {Decomposition of Multilevel Objects in an Object-Oriented Database}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {875}, pages = {375--402}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58618-0\_75}, doi = {10.1007/3-540-58618-0\_75}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Boulahia-CuppensCGY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/refine/BieberB94, author = {Pierre Bieber and Nora Boulahia{-}Cuppens}, editor = {David Till}, title = {Formal Development of Authentication Protocols}, booktitle = {6th Refinement Workshop, Proceedings of the 6th Refinement Workshop, organised by BCS-FACS, London, UK, 5-7 January 1994}, series = {Workshops in Computing}, pages = {80--102}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/978-1-4471-3240-0\_5}, doi = {10.1007/978-1-4471-3240-0\_5}, timestamp = {Tue, 20 Aug 2019 12:41:38 +0200}, biburl = {https://dblp.org/rec/conf/refine/BieberB94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Boulahia-CuppensC94, author = {Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Asynchronous composition and required security conditions}, booktitle = {1994 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 16-18, 1994}, pages = {68--78}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/RISP.1994.296591}, doi = {10.1109/RISP.1994.296591}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/Boulahia-CuppensC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Boulahia-Cuppens93, author = {Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Alban Gabillon and Kioumars Yazdanian}, title = {MultiView model for object-oriented database}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {222--231}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315437}, doi = {10.1109/CSAC.1993.315437}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Boulahia-Cuppens93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BieberBLW93, author = {Pierre Bieber and Nora Boulahia{-}Cuppens and T. Lehmann and E. van Wickeren}, title = {Abstract Machines for Communication Security}, booktitle = {6th {IEEE} Computer Security Foundations Workshop - CSFW'93, Franconia, New Hampshire, USA, June 15-17, 1993, Proceedings}, pages = {137--146}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/CSFW.1993.246632}, doi = {10.1109/CSFW.1993.246632}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BieberBLW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/oopsla/Boulahia-CuppensCGY93, author = {Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Alban Gabillon and Kioumars Yazdanian}, editor = {Bhavani Thuraisingham and Ravi S. Sandhu and T. C. Ting}, title = {Multilevel Security in Object-Oriented Databases}, booktitle = {Security for Object-Oriented Systems, Proceedings of the {OOPSLA-93} Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993}, series = {Workshops in Computing}, pages = {79--89}, publisher = {Springer}, year = {1993}, timestamp = {Wed, 29 Jun 2022 15:37:45 +0200}, biburl = {https://dblp.org/rec/conf/oopsla/Boulahia-CuppensCGY93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.