Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Frédéric Cuppens
@proceedings{DBLP:conf/esorics/2023w1, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Costas Lambrinoudakis and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Pantaleone Nespoli and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {Computer Security. {ESORICS} 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14398}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54204-6}, doi = {10.1007/978-3-031-54204-6}, isbn = {978-3-031-54203-9}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2023w1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/WazanC23, author = {Ahmad Samer Wazan and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Cybersecurity in networking: adaptations, investigation, attacks, and countermeasures}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {78}, number = {3-4}, pages = {133--134}, year = {2023}, url = {https://doi.org/10.1007/s12243-023-00956-9}, doi = {10.1007/S12243-023-00956-9}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/WazanC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/AimeurLYDC23, author = {Esma A{\"{\i}}meur and Maryline Laurent and Reda Yaich and Beno{\^{\i}}t Dupont and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Foreword of the special issue on {\guillemotleft} {FPS} 2021{\guillemotright} symposium}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {78}, number = {7-8}, pages = {383}, year = {2023}, url = {https://doi.org/10.1007/s12243-023-00988-1}, doi = {10.1007/S12243-023-00988-1}, timestamp = {Sun, 10 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/AimeurLYDC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CharpentierNBCY23, author = {Axel Charpentier and Christopher Neal and Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Reda Yaich}, title = {Real-Time Defensive Strategy Selection via Deep Reinforcement Learning}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {15:1--15:11}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3600176}, doi = {10.1145/3600160.3600176}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CharpentierNBCY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MerzoukCBY23, author = {Mohamed Amine Merzouk and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens and Reda Yaich}, title = {Parameterizing poisoning attacks in federated learning-based intrusion detection}, booktitle = {Proceedings of the 18th International Conference on Availability, Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August 2023- 1 September 2023}, pages = {104:1--104:8}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600160.3605090}, doi = {10.1145/3600160.3605090}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MerzoukCBY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/MiloudiSBCP23, author = {Aicha Miloudi and Luis Carlos Su{\'{a}}rez and Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Stere Preda}, editor = {Jianying Zhou and Lejla Batina and Zengpeng Li and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Daisuke Mashima and Weizhi Meng and Stjepan Picek and Mohammad Ashiqur Rahman and Jun Shao and Masaki Shimaoka and Ezekiel O. Soremekun and Chunhua Su and Je Sen Teh and Aleksei Udovenko and Cong Wang and Leo Yu Zhang and Yury Zhauniarovich}, title = {Trust Management Framework for Containerized Workloads Applications to 5G Networks}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13907}, pages = {378--393}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41181-6\_21}, doi = {10.1007/978-3-031-41181-6\_21}, timestamp = {Mon, 16 Oct 2023 19:47:08 +0200}, biburl = {https://dblp.org/rec/conf/acns/MiloudiSBCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crisis/2022, editor = {Slim Kallel and Mohamed Jmaiel and Mohammad Zulkernine and Ahmed Hadj Kacem and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens}, title = {Risks and Security of Internet and Systems - 17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13857}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31108-6}, doi = {10.1007/978-3-031-31108-6}, isbn = {978-3-031-31107-9}, timestamp = {Tue, 23 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2022w, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Christos Kalloniatis and John Mylopoulos and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Jorge Maestre Vidal and Marco Antonio Sotelo Monge and Massimiliano Albanese and Basel Katt and Sandeep Pirbhulal and Ankur Shukla}, title = {Computer Security. {ESORICS} 2022 International Workshops - CyberICPS 2022, {SECPRE} 2022, {SPOSE} 2022, {CPS4CIP} 2022, CDT{\&}SECOMANE 2022, {EIS} 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13785}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-25460-4}, doi = {10.1007/978-3-031-25460-4}, isbn = {978-3-031-25459-8}, timestamp = {Tue, 21 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2022w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/MerzoukCBY22, author = {Mohamed Amine Merzouk and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens and Reda Yaich}, title = {Investigating the practicality of adversarial evasion attacks on network intrusion detection}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {77}, number = {11-12}, pages = {763--775}, year = {2022}, url = {https://doi.org/10.1007/s12243-022-00910-1}, doi = {10.1007/S12243-022-00910-1}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adt/MerzoukCBY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MerzoukDNCBY22, author = {Mohamed Amine Merzouk and Jos{\'{e}}phine Delas and Christopher Neal and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens and Reda Yaich}, title = {Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {31:1--31:6}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3539006}, doi = {10.1145/3538969.3539006}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/MerzoukDNCBY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CharpentierCCY22, author = {Axel Charpentier and Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Reda Yaich}, title = {Deep Reinforcement Learning-Based Defense Strategy Selection}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {110:1--110:11}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3543789}, doi = {10.1145/3538969.3543789}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CharpentierCCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/CrocheletNBC22, author = {Pierre Crochelet and Christopher Neal and Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Xingliang Yuan and Guangdong Bai and Cristina Alcaraz and Suryadipta Majumdar}, title = {Attacker Attribution via Characteristics Inference Using Honeypot Data}, booktitle = {Network and System Security - 16th International Conference, {NSS} 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13787}, pages = {155--169}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23020-2\_9}, doi = {10.1007/978-3-031-23020-2\_9}, timestamp = {Thu, 08 Dec 2022 15:13:16 +0100}, biburl = {https://dblp.org/rec/conf/nss/CrocheletNBC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crisis/2021, editor = {Bo Luo and Mohamed Mosbah and Fr{\'{e}}d{\'{e}}ric Cuppens and Lotfi Ben Othmane and Nora Cuppens and Slim Kallel}, title = {Risks and Security of Internet and Systems - 16th International Conference, CRiSIS 2021, Virtual Event, Ames, USA, November 12-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13204}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-02067-4}, doi = {10.1007/978-3-031-02067-4}, isbn = {978-3-031-02066-7}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-04016, author = {K{\'{e}}ren Saint{-}Hilaire and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Ontology-based Attack Graph Enrichment}, journal = {CoRR}, volume = {abs/2202.04016}, year = {2022}, url = {https://arxiv.org/abs/2202.04016}, eprinttype = {arXiv}, eprint = {2202.04016}, timestamp = {Thu, 10 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-04016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BarbeauCCDG21, author = {Michel Barbeau and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Romain Dagnas and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics}, journal = {{IEEE} Access}, volume = {9}, pages = {46462--46475}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3066108}, doi = {10.1109/ACCESS.2021.3066108}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BarbeauCCDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/NavasCBTP21, author = {Renzo E. Navas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens and Laurent Toutain and Georgios Z. Papadopoulos}, title = {Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for {DSSS} anti-jamming}, journal = {Comput. Networks}, volume = {187}, pages = {107751}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2020.107751}, doi = {10.1016/J.COMNET.2020.107751}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/NavasCBTP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/NavasCBTP21, author = {Renzo E. Navas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens and Laurent Toutain and Georgios Z. Papadopoulos}, title = {MTD, Where Art Thou? {A} Systematic Review of Moving Target Defense Techniques for IoT}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {10}, pages = {7818--7832}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3040358}, doi = {10.1109/JIOT.2020.3040358}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/NavasCBTP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KallelCCKO21, author = {Slim Kallel and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens and Ahmed Hadj Kacem and Lotfi Ben Othmane}, title = {Special issue on risk and security of smart systems}, journal = {J. Inf. Secur. Appl.}, volume = {61}, pages = {102925}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102925}, doi = {10.1016/J.JISA.2021.102925}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KallelCCKO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isivc/AnselPCB21, author = {Guillaume Ansel and Dominique Pastor and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens}, title = {Asymptotic Random Distortion Testing and Application to Change-in-Mean Detection}, booktitle = {10th International Symposium on Signal, Image, Video and Communications, {ISIVC} 2021, Saint-Etienne, France, April 7-9, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISIVC49222.2021.9487550}, doi = {10.1109/ISIVC49222.2021.9487550}, timestamp = {Tue, 03 Aug 2021 16:22:20 +0200}, biburl = {https://dblp.org/rec/conf/isivc/AnselPCB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BkakriaCC20, author = {Anis Bkakria and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Privacy-Preserving Pattern Matching on Encrypted Data}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12492}, pages = {191--220}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64834-3\_7}, doi = {10.1007/978-3-030-64834-3\_7}, timestamp = {Thu, 10 Dec 2020 10:09:50 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BkakriaCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BourgetCC20, author = {Edwin Bourget and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Sokratis K. Katsikas and Cristina Alcaraz}, title = {PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis}, booktitle = {Proceedings of the 6th {ACM} Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020}, pages = {30--41}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384941.3409590}, doi = {10.1145/3384941.3409590}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BourgetCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/MerzoukCBY20, author = {Mohamed Amine Merzouk and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Boulahia{-}Cuppens and Reda Yaich}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jean Leneutre and Nora Cuppens and Reda Yaich}, title = {A Deeper Analysis of Adversarial Examples in Intrusion Detection}, booktitle = {Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12528}, pages = {67--84}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68887-5\_4}, doi = {10.1007/978-3-030-68887-5\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/MerzoukCBY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/DernaikaCCR20, author = {Farah Dernaika and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Olivier Raynaud}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jean Leneutre and Nora Cuppens and Reda Yaich}, title = {A Posteriori Analysis of Policy Temporal Compliance}, booktitle = {Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12528}, pages = {133--148}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68887-5\_8}, doi = {10.1007/978-3-030-68887-5\_8}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/DernaikaCCR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/SuarezECPBP20, author = {Luis Carlos Su{\'{a}}rez and David Espes and Fr{\'{e}}d{\'{e}}ric Cuppens and Cao{-}Thanh Phan and Philippe Bertin and Philippe Le Parc}, editor = {Anoop Singhal and Jaideep Vaidya}, title = {Managing Secure Inter-slice Communication in 5G Network Slice Chains}, booktitle = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP} {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12122}, pages = {24--41}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49669-2\_2}, doi = {10.1007/978-3-030-49669-2\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/SuarezECPBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/SmineECC20, author = {Manel Smine and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Anoop Singhal and Jaideep Vaidya}, title = {Network Functions Virtualization Access Control as a Service}, booktitle = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP} {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12122}, pages = {100--117}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49669-2\_6}, doi = {10.1007/978-3-030-49669-2\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/SmineECC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/SmineECCP20, author = {Manel Smine and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Marc{-}Oliver Pahl}, editor = {Gabriela Nicolescu and Assia Tria and Jos{\'{e}} M. Fernandez and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {A Priority-Based Domain Type Enforcement for Exception Management}, booktitle = {Foundations and Practice of Security - 13th International Symposium, {FPS} 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12637}, pages = {65--81}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70881-8\_5}, doi = {10.1007/978-3-030-70881-8\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/SmineECCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/NavasSCCTP20, author = {Renzo E. Navas and H{\aa}kon Sandaker and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Laurent Toutain and Georgios Z. Papadopoulos}, title = {{IANVS:} {A} Moving Target Defense Framework for a Resilient Internet of Things}, booktitle = {{IEEE} Symposium on Computers and Communications, {ISCC} 2020, Rennes, France, July 7-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISCC50000.2020.9219728}, doi = {10.1109/ISCC50000.2020.9219728}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/NavasSCCTP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nof/SuarezECBPP20, author = {Luis Carlos Su{\'{a}}rez and David Espes and Fr{\'{e}}d{\'{e}}ric Cuppens and Philippe Bertin and Cao{-}Thanh Phan and Philippe Le Parc}, editor = {Prosper Chemouil and Francine Krief and Toufik Ahmed and Tobias Ho{\ss}feld and Stefano Secci and Razvan Stanica}, title = {Formalization of a security access control model for the 5G system}, booktitle = {11th International Conference on Network of the Future, NoF 2020, Bordeaux, France, October 12-14, 2020}, pages = {150--158}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/NoF50125.2020.9249137}, doi = {10.1109/NOF50125.2020.9249137}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nof/SuarezECBPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/quatic/DernaikaCCR20, author = {Farah Dernaika and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Olivier Raynaud}, editor = {Martin J. Shepperd and Fernando Brito e Abreu and Alberto Rodrigues da Silva and Ricardo P{\'{e}}rez{-}Castillo}, title = {Accountability in the {A} Posteriori Access Control: {A} Requirement and a Mechanism}, booktitle = {Quality of Information and Communications Technology - 13th International Conference, {QUATIC} 2020, Faro, Portugal, September 9-11, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1266}, pages = {332--342}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58793-2\_27}, doi = {10.1007/978-3-030-58793-2\_27}, timestamp = {Tue, 15 Sep 2020 17:11:57 +0200}, biburl = {https://dblp.org/rec/conf/quatic/DernaikaCCR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BarbeauCCDG20, author = {Michel Barbeau and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Romain Dagnas and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {Metrics to Enhance the Resilience of Cyber-Physical Systems}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {1167--1172}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00156}, doi = {10.1109/TRUSTCOM50675.2020.00156}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BarbeauCCDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crisis/2019, editor = {Slim Kallel and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Ahmed Hadj Kacem}, title = {Risks and Security of Internet and Systems, 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12026}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-41568-6}, doi = {10.1007/978-3-030-41568-6}, isbn = {978-3-030-41567-9}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2019cicps, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Weizhi Meng and Steven Furnell and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11980}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-42048-2}, doi = {10.1007/978-3-030-42048-2}, isbn = {978-3-030-42047-5}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2019cicps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2020cicps, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Weizhi Meng and Steven Furnell}, title = {Computer Security - {ESORICS} 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12501}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64330-0}, doi = {10.1007/978-3-030-64330-0}, isbn = {978-3-030-64329-4}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2020cicps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BkakriaCC20, author = {Anis Bkakria and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Privacy-Preserving Pattern Matching on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2020}, url = {https://eprint.iacr.org/2020/422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BkakriaCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CledelCC19, author = {Thomas Cl{\'{e}}del and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Managing the Overestimation of Resilience}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {35:1--35:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340333}, doi = {10.1145/3339252.3340333}, timestamp = {Sun, 11 Aug 2019 18:58:56 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CledelCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DernaikaCCR19, author = {Farah Dernaika and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Olivier Raynaud}, title = {Semantic Mediation for {A} Posteriori Log Analysis}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {88:1--88:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340104}, doi = {10.1145/3339252.3340104}, timestamp = {Sun, 11 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/DernaikaCCR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucnc/SuarezEPC19, author = {Luis Carlos Su{\'{a}}rez and David Espes and Philippe Le Parc and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Defining a communication service management function for 5G network slices}, booktitle = {European Conference on Networks and Communications, EuCNC 2019, Valencia, Spain, June 18-21, 2019}, pages = {144--148}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuCNC.2019.8802010}, doi = {10.1109/EUCNC.2019.8802010}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eucnc/SuarezEPC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crisis/2018, editor = {Akka Zemmari and Mohamed Mosbah and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11391}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12143-3}, doi = {10.1007/978-3-030-12143-3}, isbn = {978-3-030-12142-6}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2018cicps, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and John Mylopoulos and Christos Kalloniatis}, title = {Computer Security - {ESORICS} 2018 International Workshops, CyberICPS 2018 and {SECPRE} 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11387}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12786-2}, doi = {10.1007/978-3-030-12786-2}, isbn = {978-3-030-12785-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2018cicps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-07283, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Misconfiguration Management of Network Security Components}, journal = {CoRR}, volume = {abs/1912.07283}, year = {2019}, url = {http://arxiv.org/abs/1912.07283}, eprinttype = {arXiv}, eprint = {1912.07283}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-07283.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AyedICC18, author = {Samiha Ayed and Muhammad Sabir Idrees and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Achieving dynamicity in security policies enforcement using aspects}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {1}, pages = {83--103}, year = {2018}, url = {https://doi.org/10.1007/s10207-016-0357-6}, doi = {10.1007/S10207-016-0357-6}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/AyedICC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MoatazRRSCC18, author = {Tarik Moataz and Indrajit Ray and Indrakshi Ray and Abdullatif Shikfa and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens}, title = {Substring search over encrypted data}, journal = {J. Comput. Secur.}, volume = {26}, number = {1}, pages = {1--30}, year = {2018}, url = {https://doi.org/10.3233/JCS-14652}, doi = {10.3233/JCS-14652}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MoatazRRSCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhoc-now/NavasBCCP18, author = {Renzo E. Navas and H{\'{e}}l{\`{e}}ne Le Bouder and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Georgios Z. Papadopoulos}, editor = {Nicolas Montavont and Georgios Z. Papadopoulos}, title = {Demo: Do Not Trust Your Neighbors! {A} Small IoT Platform Illustrating a Man-in-the-Middle Attack}, booktitle = {Ad-hoc, Mobile, and Wireless Networks - 17th International Conference on Ad Hoc Networks and Wireless, {ADHOC-NOW} 2018, Saint-Malo, France, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11104}, pages = {120--125}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00247-3\_11}, doi = {10.1007/978-3-030-00247-3\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/adhoc-now/NavasBCCP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/CuppensC18, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Pierangela Samarati and Indrajit Ray and Indrakshi Ray}, title = {Stratification Based Model for Security Policy with Exceptions and Contraries to Duty}, booktitle = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday}, series = {Lecture Notes in Computer Science}, volume = {11170}, pages = {78--103}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-04834-1\_4}, doi = {10.1007/978-3-030-04834-1\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/CuppensC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/BayouECC18, author = {Lyes Bayou and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Akka Zemmari and Mohamed Mosbah and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems}, booktitle = {Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11391}, pages = {35--40}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_3}, doi = {10.1007/978-3-030-12143-3\_3}, timestamp = {Tue, 11 Oct 2022 14:59:07 +0200}, biburl = {https://dblp.org/rec/conf/crisis/BayouECC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/KomeCCF18, author = {Ivan Marco Lobe Kome and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Vincent Frey}, editor = {Akka Zemmari and Mohamed Mosbah and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {A Certificate-Less Key Exchange Protocol for IoT}, booktitle = {Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11391}, pages = {65--79}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_6}, doi = {10.1007/978-3-030-12143-3\_6}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/KomeCCF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/SmineCC18, author = {Manel Smine and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Akka Zemmari and Mohamed Mosbah and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense}, booktitle = {Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11391}, pages = {158--171}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_14}, doi = {10.1007/978-3-030-12143-3\_14}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/SmineCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/BkakriaTCCBF18, author = {Anis Bkakria and Aimilia Tasidou and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Fatma Bouattour and Feten Ben Fredj}, editor = {Akka Zemmari and Mohamed Mosbah and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Optimal Distribution of Privacy Budget in Differential Privacy}, booktitle = {Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11391}, pages = {222--236}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_18}, doi = {10.1007/978-3-030-12143-3\_18}, timestamp = {Fri, 25 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/BkakriaTCCBF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/CledelFCCKDLC18, author = {Thomas Cl{\'{e}}del and Simon N. Foley and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Yvon Kermarrec and Fr{\'{e}}d{\'{e}}ric Dubois and Youssef Laarouchi and G{\'{e}}rard Le Comte}, editor = {Arcangelo Castiglione and Florin Pop and Massimo Ficco and Francesco Palmieri}, title = {Towards the Evaluation of End-to-End Resilience Through External Consistency}, booktitle = {Cyberspace Safety and Security - 10th International Symposium, {CSS} 2018, Amalfi, Italy, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11161}, pages = {99--114}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01689-0\_8}, doi = {10.1007/978-3-030-01689-0\_8}, timestamp = {Wed, 06 Jan 2021 11:52:38 +0100}, biburl = {https://dblp.org/rec/conf/css/CledelFCCKDLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BourgetCCDFL18, author = {Edwin Bourget and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Samuel Dubus and Simon N. Foley and Youssef Laarouchi}, editor = {Florian Kerschbaum and Stefano Paraboschi}, title = {Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes}, booktitle = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP} {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10980}, pages = {38--47}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95729-6\_3}, doi = {10.1007/978-3-319-95729-6\_3}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BourgetCCDFL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/BkakriaCC18, author = {Anis Bkakria and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {David Naccache and Shouhuai Xu and Sihan Qing and Pierangela Samarati and Gregory Blanc and Rongxing Lu and Zonghua Zhang and Ahmed Meddahi}, title = {Linking Differential Identifiability with Differential Privacy}, booktitle = {Information and Communications Security - 20th International Conference, {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11149}, pages = {232--247}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01950-1\_14}, doi = {10.1007/978-3-030-01950-1\_14}, timestamp = {Sat, 05 Sep 2020 18:01:07 +0200}, biburl = {https://dblp.org/rec/conf/icics/BkakriaCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/JiGCC18, author = {Xiaoshu Ji and Gurvan Le Guernic and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {David Naccache and Shouhuai Xu and Sihan Qing and Pierangela Samarati and Gregory Blanc and Rongxing Lu and Zonghua Zhang and Ahmed Meddahi}, title = {{USB} Packets Filtering Policies and an Associated Low-Cost Simulation Framework}, booktitle = {Information and Communications Security - 20th International Conference, {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11149}, pages = {732--742}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01950-1\_44}, doi = {10.1007/978-3-030-01950-1\_44}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/JiGCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotsms/KomeCCF18, author = {Marco Lobe Kome and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Vincent Frey}, title = {CoAP Enhancement for a Better IoT Centric Protocol: CoAP 2.0}, booktitle = {2018 Fifth International Conference on Internet of Things: Systems, Management and Security, IoTSMS 2018, Valencia, Spain, October 15-18, 2018}, pages = {139--146}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IoTSMS.2018.8554494}, doi = {10.1109/IOTSMS.2018.8554494}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iotsms/KomeCCF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/GraaKCCF18, author = {Mariem Graa and Ivan Marco Lobe Kome and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Vincent Frey}, editor = {Lech Jan Janczewski and Miroslaw Kutylowski}, title = {Detection and Response to Data Exfiltration from Internet of Things Android Devices}, booktitle = {{ICT} Systems Security and Privacy Protection - 33rd {IFIP} {TC} 11 International Conference, {SEC} 2018, Held at the 24th {IFIP} World Computer Congress, {WCC} 2018, Poznan, Poland, September 18-20, 2018, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {529}, pages = {339--354}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99828-2\_24}, doi = {10.1007/978-3-319-99828-2\_24}, timestamp = {Tue, 11 Sep 2018 09:39:51 +0200}, biburl = {https://dblp.org/rec/conf/sec/GraaKCCF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crisis/2017, editor = {Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Jean{-}Louis Lanet and Axel Legay and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Risks and Security of Internet and Systems - 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10694}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76687-4}, doi = {10.1007/978-3-319-76687-4}, isbn = {978-3-319-76686-7}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2017cicps, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS 2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10683}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-72817-9}, doi = {10.1007/978-3-319-72817-9}, isbn = {978-3-319-72816-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2017cicps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/interiot/2017, editor = {Giancarlo Fortino and Carlos Enrique Palau and Antonio Guerrieri and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Hakima Chaouchi and Alban Gabillon}, title = {Interoperability, Safety and Security in IoT - Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {242}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93797-7}, doi = {10.1007/978-3-319-93797-7}, isbn = {978-3-319-93796-0}, timestamp = {Fri, 17 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/interiot/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/YaichCC17, author = {Reda Yaich and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Enabling Trust Assessment In Clouds-of-Clouds: {A} Similarity-Based Approach}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {8:1--8:9}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3098970}, doi = {10.1145/3098954.3098970}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/YaichCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CuppensZLEPC17, author = {Nora Cuppens and Salaheddine Zerkane and Yanhuang Li and David Espes and Philippe Le Parc and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Giovanni Livraga and Sencun Zhu}, title = {Firewall Policies Provisioning Through {SDN} in the Cloud}, booktitle = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP} {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10359}, pages = {293--310}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61176-1\_16}, doi = {10.1007/978-3-319-61176-1\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/CuppensZLEPC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/BayouECC17, author = {Lyes Bayou and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {wirelessOrBAC: Towards an access-control-based {IDS} for Wireless Sensor Networks}, booktitle = {Proceedings of the 7th International Conference on Communication and Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017}, pages = {96--103}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3163058.3163077}, doi = {10.1145/3163058.3163077}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccns/BayouECC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/BkakriaGCCL17, author = {Anis Bkakria and Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Jean{-}Louis Lanet}, editor = {Rudrapatna K. Shyamasundar and Virendra Singh and Jaideep Vaidya}, title = {Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems}, booktitle = {Information Systems Security - 13th International Conference, {ICISS} 2017, Mumbai, India, December 16-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {127--145}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72598-7\_8}, doi = {10.1007/978-3-319-72598-7\_8}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/BkakriaGCCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/KomeGCCF17, author = {Marco Lobe Kome and Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Vincent Frey}, editor = {Rudrapatna K. Shyamasundar and Virendra Singh and Jaideep Vaidya}, title = {DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT}, booktitle = {Information Systems Security - 13th International Conference, {ICISS} 2017, Mumbai, India, December 16-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {243--262}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72598-7\_15}, doi = {10.1007/978-3-319-72598-7\_15}, timestamp = {Sat, 09 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/KomeGCCF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/BayouECC17, author = {Lyes Bayou and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Rudrapatna K. Shyamasundar and Virendra Singh and Jaideep Vaidya}, title = {wIDS: {A} Multilayer {IDS} for Wireless-Based {SCADA} Systems}, booktitle = {Information Systems Security - 13th International Conference, {ICISS} 2017, Mumbai, India, December 16-20, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10717}, pages = {387--404}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72598-7\_24}, doi = {10.1007/978-3-319-72598-7\_24}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/BayouECC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/BkakriaGCCL17, author = {Anis Bkakria and Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Jean{-}Louis Lanet}, title = {Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper)}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {253--258}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00037}, doi = {10.1109/PST.2017.00037}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/BkakriaGCCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/GraaCCLM17, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Jean{-}Louis Lanet and Routa Moussaileb}, editor = {Sabrina De Capitani di Vimercati and Fabio Martinelli}, title = {Detection of Side Channel Attacks Based on Data Tainting in Android Systems}, booktitle = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11 International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {502}, pages = {205--218}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-58469-0\_14}, doi = {10.1007/978-3-319-58469-0\_14}, timestamp = {Wed, 17 May 2017 12:30:16 +0200}, biburl = {https://dblp.org/rec/conf/sec/GraaCCLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crisis/2016, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Jean{-}Louis Lanet and Axel Legay}, title = {Risks and Security of Internet and Systems - 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10158}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-54876-0}, doi = {10.1007/978-3-319-54876-0}, isbn = {978-3-319-54875-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2016cybericps, editor = {Nora Cuppens{-}Boulahia and Costas Lambrinoudakis and Fr{\'{e}}d{\'{e}}ric Cuppens and Sokratis K. Katsikas}, title = {Security of Industrial Control Systems and Cyber-Physical Systems - Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10166}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61437-3}, doi = {10.1007/978-3-319-61437-3}, isbn = {978-3-319-61436-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2016cybericps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fps/2016, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Lingyu Wang and Nora Cuppens{-}Boulahia and Nadia Tawbi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Foundations and Practice of Security - 9th International Symposium, {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10128}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-51966-1}, doi = {10.1007/978-3-319-51966-1}, isbn = {978-3-319-51965-4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/TounsiCCP16, author = {Wiem Tounsi and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Guy Pujolle}, title = {Access and privacy control enforcement in {RFID} middleware systems: Proposal and implementation on the fosstrak platform}, journal = {World Wide Web}, volume = {19}, number = {1}, pages = {41--68}, year = {2016}, url = {https://doi.org/10.1007/s11280-015-0325-5}, doi = {10.1007/S11280-015-0325-5}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/www/TounsiCCP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BayouCEC16, author = {Lyes Bayou and Nora Cuppens{-}Boulahia and David Espes and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks}, booktitle = {11th International Conference on Availability, Reliability and Security, {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016}, pages = {157--166}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ARES.2016.48}, doi = {10.1109/ARES.2016.48}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BayouCEC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/ZerkaneEPC16, author = {Salaheddine Zerkane and David Espes and Philippe Le Parc and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Jean{-}Louis Lanet and Axel Legay}, title = {A Proactive Stateful Firewall for Software Defined Networking}, booktitle = {Risks and Security of Internet and Systems - 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10158}, pages = {123--138}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54876-0\_10}, doi = {10.1007/978-3-319-54876-0\_10}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/ZerkaneEPC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/BouyahiaCCA16, author = {Tarek Bouyahia and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Fabien Autrel}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Lingyu Wang and Nora Cuppens{-}Boulahia and Nadia Tawbi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Multi-Criteria Recommender Approach for Supporting Intrusion Response System}, booktitle = {Foundations and Practice of Security - 9th International Symposium, {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10128}, pages = {51--67}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-51966-1\_4}, doi = {10.1007/978-3-319-51966-1\_4}, timestamp = {Sun, 02 Oct 2022 16:01:32 +0200}, biburl = {https://dblp.org/rec/conf/fps/BouyahiaCCA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/ZerkaneEPC16, author = {Salaheddine Zerkane and David Espes and Philippe Le Parc and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Lingyu Wang and Nora Cuppens{-}Boulahia and Nadia Tawbi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Vulnerability Analysis of Software Defined Networking}, booktitle = {Foundations and Practice of Security - 9th International Symposium, {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10128}, pages = {97--116}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-51966-1\_7}, doi = {10.1007/978-3-319-51966-1\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/ZerkaneEPC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/BayouECC16, author = {Lyes Bayou and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Lingyu Wang and Nora Cuppens{-}Boulahia and Nadia Tawbi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Security Analysis of WirelessHART Communication Scheme}, booktitle = {Foundations and Practice of Security - 9th International Symposium, {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10128}, pages = {223--238}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-51966-1\_15}, doi = {10.1007/978-3-319-51966-1\_15}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fps/BayouECC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/EssaouiniCC16, author = {Nada Essaouini and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Indrajit Ray and Manoj Singh Gaur and Mauro Conti and Dheeraj Sanghi and V. Kamakoti}, title = {Building a Fair System Using Access Rights}, booktitle = {Information Systems Security - 12th International Conference, {ICISS} 2016, Jaipur, India, December 16-20, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10063}, pages = {89--108}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49806-5\_5}, doi = {10.1007/978-3-319-49806-5\_5}, timestamp = {Thu, 10 Sep 2020 09:33:08 +0200}, biburl = {https://dblp.org/rec/conf/iciss/EssaouiniCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/GraaCCL16, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Jean{-}Louis Lanet}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Tracking Explicit and Control Flows in Java and Native Android Apps Code}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {307--316}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005686603070316}, doi = {10.5220/0005686603070316}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/GraaCCL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/EssaouiniOCC16, author = {Nada Essaouini and Said Oulmakhzoune and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Toward an off-line analysis of obligation with deadline policies}, booktitle = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016, Auckland, New Zealand, December 12-14, 2016}, pages = {178--186}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/PST.2016.7906924}, doi = {10.1109/PST.2016.7906924}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pst/EssaouiniOCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/HachanaCC16, author = {Safa{\`{a}} Hachana and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {Towards a new generation of industrial firewalls: Operational-process aware filtering}, booktitle = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016, Auckland, New Zealand, December 12-14, 2016}, pages = {615--622}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/PST.2016.7906996}, doi = {10.1109/PST.2016.7906996}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/HachanaCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LiCCCF16, author = {Yanhuang Li and Nora Cuppens{-}Boulahia and Jean{-}Michel Crom and Fr{\'{e}}d{\'{e}}ric Cuppens and Vincent Frey}, editor = {Jaap{-}Henk Hoepman and Stefan Katzenbeisser}, title = {Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud}, booktitle = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11 International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {471}, pages = {105--118}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-33630-5\_8}, doi = {10.1007/978-3-319-33630-5\_8}, timestamp = {Fri, 19 May 2017 01:25:11 +0200}, biburl = {https://dblp.org/rec/conf/sec/LiCCCF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ZerkaneEPC16, author = {Salaheddine Zerkane and David Espes and Philippe Le Parc and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Jaap{-}Henk Hoepman and Stefan Katzenbeisser}, title = {Software Defined Networking Reactive Stateful Firewall}, booktitle = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11 International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {471}, pages = {119--132}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-33630-5\_9}, doi = {10.1007/978-3-319-33630-5\_9}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ZerkaneEPC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2015cyberics, editor = {Adrien B{\'{e}}cue and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sokratis K. Katsikas and Costas Lambrinoudakis}, title = {Security of Industrial Control Systems and Cyber Physical Systems - First Workshop, CyberICS 2015 and First Workshop, {WOS-CPS} 2015, Vienna, Austria, September 21-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9588}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40385-4}, doi = {10.1007/978-3-319-40385-4}, isbn = {978-3-319-40384-7}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2015cyberics.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/AzkiaCCCO15, author = {Hanieh Azkia and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Gouenou Coatrieux and Said Oulmakhzoune}, title = {Deployment of a posteriori access control using {IHE} {ATNA}}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {5}, pages = {471--483}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0265-6}, doi = {10.1007/S10207-014-0265-6}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/AzkiaCCCO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HachanaCC15, author = {Safa{\`{a}} Hachana and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Mining a high level access control policy in a network with multiple firewalls}, journal = {J. Inf. Secur. Appl.}, volume = {20}, pages = {61--73}, year = {2015}, url = {https://doi.org/10.1016/j.jisa.2014.10.010}, doi = {10.1016/J.JISA.2014.10.010}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HachanaCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/BouyahiaACC15, author = {Tarek Bouyahia and Fabien Autrel and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Costas Lambrinoudakis and Alban Gabillon}, title = {Context Aware Intrusion Response Based on Argumentation Logic}, booktitle = {Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9572}, pages = {91--106}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31811-0\_6}, doi = {10.1007/978-3-319-31811-0\_6}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/crisis/BouyahiaACC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/BayouECC15, author = {Lyes Bayou and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Costas Lambrinoudakis and Alban Gabillon}, title = {Security Issue of WirelessHART Based {SCADA} Systems}, booktitle = {Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9572}, pages = {225--241}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31811-0\_14}, doi = {10.1007/978-3-319-31811-0\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/BayouECC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LazrigMRROKCC15, author = {Ibrahim Lazrig and Tarik Moataz and Indrajit Ray and Indrakshi Ray and Toan Ong and Michael G. Kahn and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Pierangela Samarati}, title = {Privacy Preserving Record Matching Using Automated Semi-trusted Broker}, booktitle = {Data and Applications Security and Privacy {XXIX} - 29th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9149}, pages = {103--118}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20810-7\_7}, doi = {10.1007/978-3-319-20810-7\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/LazrigMRROKCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BayouECC15, author = {Lyes Bayou and David Espes and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Adrien B{\'{e}}cue and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sokratis K. Katsikas and Costas Lambrinoudakis}, title = {WirelessHART NetSIM: {A} WirelessHART SCADA-Based Wireless Sensor Networks Simulator}, booktitle = {Security of Industrial Control Systems and Cyber Physical Systems - First Workshop, CyberICS 2015 and First Workshop, {WOS-CPS} 2015, Vienna, Austria, September 21-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9588}, pages = {63--78}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-40385-4\_5}, doi = {10.1007/978-3-319-40385-4\_5}, timestamp = {Mon, 03 Jan 2022 22:15:09 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BayouECC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SamarjiCCPKD15, author = {L{\'{e}}a El Samarji and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Serge Papillon and Wa{\"{e}}l Kanoun and Samuel Dubus}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {On the Fly Design and Co-simulation of Responses Against Simultaneous Attacks}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9327}, pages = {642--661}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24177-7\_32}, doi = {10.1007/978-3-319-24177-7\_32}, timestamp = {Sat, 19 Oct 2019 20:00:24 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SamarjiCCPKD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/BkakriaCCG15, author = {Anis Bkakria and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and David Gross{-}Amblard}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Evangelos Kranakis and Guillaume Bonfante}, title = {Security Mechanisms Planning to Enforce Security Policies}, booktitle = {Foundations and Practice of Security - 8th International Symposium, {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9482}, pages = {85--101}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30303-1\_6}, doi = {10.1007/978-3-319-30303-1\_6}, timestamp = {Fri, 27 Dec 2019 21:23:06 +0100}, biburl = {https://dblp.org/rec/conf/fps/BkakriaCCG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/LiCCCFJ15, author = {Yanhuang Li and Nora Cuppens{-}Boulahia and Jean{-}Michel Crom and Fr{\'{e}}d{\'{e}}ric Cuppens and Vincent Frey and Xiaoshu Ji}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Similarity Measure for Security Policies in Service Provider Selection}, booktitle = {Information Systems Security - 11th International Conference, {ICISS} 2015, Kolkata, India, December 16-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {227--242}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26961-0\_14}, doi = {10.1007/978-3-319-26961-0\_14}, timestamp = {Wed, 25 Sep 2019 18:06:16 +0200}, biburl = {https://dblp.org/rec/conf/iciss/LiCCCFJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mie/Franco-Contreras15, author = {Javier Franco{-}Contreras and Gouenou Coatrieux and Philippe Massari and St{\'{e}}fan Jacques Darmoni and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Christian Roux}, editor = {Ronald Cornet and Lacramioara Stoicu{-}Tivadar and Alexander H{\"{o}}rbst and Carlos Luis Parra Calder{\'{o}}n and Stig Kj{\ae}r Andersen and Mira Hercigonja{-}Szekeres}, title = {Data Quality Evaluation in Medical Database Watermarking}, booktitle = {Digital Healthcare Empowering Europeans - Proceedings of MIE2015, Madrid Spain, 27-29 May, 2015}, series = {Studies in Health Technology and Informatics}, volume = {210}, pages = {276--280}, publisher = {{IOS} Press}, year = {2015}, url = {https://doi.org/10.3233/978-1-61499-512-8-276}, doi = {10.3233/978-1-61499-512-8-276}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mie/Franco-Contreras15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/notere/AyedICC15, author = {Samiha Ayed and Muhammad Sabir Idrees and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Dynamic deployment of access and usage control policies using aspects}, booktitle = {International Conference on Protocol Engineering, {ICPE} 2015, and International Conference on New Technologies of Distributed Systems, {NTDS} 2015 {[CFIP} (Colloque francophone sur l'ing{\'{e}}nierie des protocoles) / {NOTERE} (Nouvelles Technologies de la R{\'{e}}partition)], Paris, France, July 22-24, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/NOTERE.2015.7293500}, doi = {10.1109/NOTERE.2015.7293500}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/notere/AyedICC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/PerezGCCC15, author = {Salvador Mart{\'{\i}}nez Perez and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Jordi Cabot}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {218--233}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_15}, doi = {10.1007/978-3-319-18467-8\_15}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/PerezGCCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/IdreesACC15, author = {Muhammad Sabir Idrees and Samiha Ayed and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Dynamic Security Policies Enforcement and Adaptation Using Aspects}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {1374--1379}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.533}, doi = {10.1109/TRUSTCOM.2015.533}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/IdreesACC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fps/2014, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood and Philip W. L. Fong}, title = {Foundations and Practice of Security - 7th International Symposium, {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8930}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17040-4}, doi = {10.1007/978-3-319-17040-4}, isbn = {978-3-319-17039-8}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fps/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/OulmakhzouneCCMBB14, author = {Said Oulmakhzoune and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Stephane Morucci and Mahmoud Barhamgi and Djamal Benslimane}, title = {Privacy query rewriting algorithm instrumented by a privacy-aware access control model}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {69}, number = {1-2}, pages = {3--19}, year = {2014}, url = {https://doi.org/10.1007/s12243-013-0365-8}, doi = {10.1007/S12243-013-0365-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/OulmakhzouneCCMBB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/EssaouiniCCK14, author = {Nada Essaouini and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Anas Abou El Kalam}, title = {Conflict detection in obligation with deadline policies}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2014}, pages = {13}, year = {2014}, url = {https://doi.org/10.1186/s13635-014-0013-5}, doi = {10.1186/S13635-014-0013-5}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/EssaouiniCCK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijkl/AzkiaCCC14, author = {Hanieh Azkia and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Gouenou Coatrieux}, title = {Log content extraction engine based on ontology for the purpose of a posteriori access control}, journal = {Int. J. Knowl. Learn.}, volume = {9}, number = {1/2}, pages = {23--42}, year = {2014}, url = {https://doi.org/10.1504/IJKL.2014.067149}, doi = {10.1504/IJKL.2014.067149}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijkl/AzkiaCCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TounsiCGCC14, author = {Wiem Tounsi and Nora Cuppens{-}Boulahia and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Yannick Chevalier and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {{KEDGEN2:} {A} key establishment and derivation protocol for {EPC} Gen2 {RFID} systems}, journal = {J. Netw. Comput. Appl.}, volume = {39}, pages = {152--166}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.06.002}, doi = {10.1016/J.JNCA.2013.06.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/TounsiCGCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/Franco-ContrerasCCCR14, author = {Javier Franco{-}Contreras and Gouenou Coatrieux and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Christian Roux}, title = {Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {3}, pages = {397--410}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2013.2294240}, doi = {10.1109/TIFS.2013.2294240}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/Franco-ContrerasCCCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BkakriaCCG14, author = {Anis Bkakria and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and David Gross{-}Amblard}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Specification and Deployment of Integrated Security Policies for Outsourced Data}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {17--32}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_2}, doi = {10.1007/978-3-662-43936-4\_2}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BkakriaCCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MoatazJRCCR14, author = {Tarik Moataz and Benjamin Justus and Indrakshi Ray and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Indrajit Ray}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {66--81}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_5}, doi = {10.1007/978-3-662-43936-4\_5}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MoatazJRCCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MoatazCCRR14, author = {Tarik Moataz and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Indrajit Ray and Indrakshi Ray}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {{ELITE:} zEro Links Identity managemenT systEm}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {195--210}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_13}, doi = {10.1007/978-3-662-43936-4\_13}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MoatazCCRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/embc/Franco-Contreras14, author = {Javier Franco{-}Contreras and Gouenou Coatrieux and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Christian Roux}, title = {Ontology-guided distortion control for robust-lossless database watermarking: Application to inpatient hospital stay records}, booktitle = {36th Annual International Conference of the {IEEE} Engineering in Medicine and Biology Society, {EMBC} 2014, Chicago, IL, USA, August 26-30, 2014}, pages = {4491--4494}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/EMBC.2014.6944621}, doi = {10.1109/EMBC.2014.6944621}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/embc/Franco-Contreras14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BouyahiaICCA14, author = {Tarek Bouyahia and Muhammad Sabir Idrees and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Fabien Autrel}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Emil Lupu and Joachim Posegga and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Metric for Security Activities Assisted by Argumentative Logic}, booktitle = {Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, {DPM} 2014, 7th International Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8872}, pages = {183--197}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17016-9\_12}, doi = {10.1007/978-3-319-17016-9\_12}, timestamp = {Sun, 25 Oct 2020 22:34:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BouyahiaICCA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/GraaCCC14, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Ana R. Cavalli}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood and Philip W. L. Fong}, title = {Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps}, booktitle = {Foundations and Practice of Security - 7th International Symposium, {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8930}, pages = {337--346}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-17040-4\_22}, doi = {10.1007/978-3-319-17040-4\_22}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/GraaCCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/inforsid/GraaCCC14, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Ana R. Cavalli}, title = {D{\'{e}}tection de flux de contr{\^{o}}le ill{\'{e}}gaux dans les Smartphones}, booktitle = {Actes du XXXII{\`{e}}me Congr{\`{e}}s INFORSID, Lyon, France, 20-23 Mai 2014}, pages = {27--43}, year = {2014}, url = {http://inforsid.fr/actes/2014/2\_paper\_56.pdf}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/inforsid/GraaCCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/Franco-Contreras14, author = {Javier Franco{-}Contreras and Gouenou Coatrieux and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Christian Roux}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Ching{-}Nung Yang}, title = {Adapted Quantization Index Modulation for Database Watermarking}, booktitle = {Digital-Forensics and Watermarking - 13th International Workshop, {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9023}, pages = {120--134}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-19321-2\_9}, doi = {10.1007/978-3-319-19321-2\_9}, timestamp = {Thu, 28 May 2020 12:51:40 +0200}, biburl = {https://dblp.org/rec/conf/iwdw/Franco-Contreras14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/EssaouiniCCK14, author = {Nada Essaouini and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Anas Abou El Kalam}, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Specifying and enforcing constraints in dynamic access control policies}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {290--297}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PST.2014.6890951}, doi = {10.1109/PST.2014.6890951}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/EssaouiniCCK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SchaadBKCCG14, author = {Andreas Schaad and Anis Bkakria and Florian Kerschbaum and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and David Gross{-}Amblard}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Optimized and controlled provisioning of encrypted outsourced data}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {141--152}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613100}, doi = {10.1145/2613087.2613100}, timestamp = {Wed, 02 Jun 2021 09:13:31 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/SchaadBKCCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/SamarjiCCPKD14, author = {L{\'{e}}a El Samarji and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Serge Papillon and Wael Kanoun and Samuel Dubus}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {152}, pages = {524--529}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23829-6\_37}, doi = {10.1007/978-3-319-23829-6\_37}, timestamp = {Tue, 23 May 2017 01:12:12 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/SamarjiCCPKD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/TounsiJCCA14, author = {Wiem Tounsi and Benjamin Justus and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {113--120}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.29}, doi = {10.1109/SERE-C.2014.29}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/TounsiJCCA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/GraaCCC14, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Ana R. Cavalli}, title = {Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems}, booktitle = {{IEEE} Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion Volume}, pages = {149--157}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE-C.2014.33}, doi = {10.1109/SERE-C.2014.33}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/GraaCCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiCCCF14, author = {Yanhuang Li and Nora Cuppens{-}Boulahia and Jean{-}Michel Crom and Fr{\'{e}}d{\'{e}}ric Cuppens and Vincent Frey}, title = {Reaching Agreement in Security Policy Negotiation}, booktitle = {13th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014}, pages = {98--105}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/TrustCom.2014.17}, doi = {10.1109/TRUSTCOM.2014.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiCCCF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/IdreesACC14, author = {Muhammad Sabir Idrees and Samiha Ayed and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Car2X Communication - Putting Security Negotiation into Practice}, booktitle = {{IEEE} 80th Vehicular Technology Conference, {VTC} Fall 2014, Vancouver, BC, Canada, September 14-17, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/VTCFall.2014.6965896}, doi = {10.1109/VTCFALL.2014.6965896}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/vtc/IdreesACC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sec/2014, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Anas Abou El Kalam and Thierry Sans}, title = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11 International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {428}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55415-5}, doi = {10.1007/978-3-642-55415-5}, isbn = {978-3-642-55414-8}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CuppensG14, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Alban Gabillon}, title = {Cover Story Management}, journal = {CoRR}, volume = {abs/1405.5628}, year = {2014}, url = {http://arxiv.org/abs/1405.5628}, eprinttype = {arXiv}, eprint = {1405.5628}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CuppensG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/PapagiannakopoulouKLGKVCC13, author = {Eugenia I. Papagiannakopoulou and Maria N. Koukovini and Georgios V. Lioudakis and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Dimitra I. Kaklamani and Iakovos S. Venieris and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {A privacy-aware access control model for distributed network monitoring}, journal = {Comput. Electr. Eng.}, volume = {39}, number = {7}, pages = {2263--2281}, year = {2013}, url = {https://doi.org/10.1016/j.compeleceng.2012.08.003}, doi = {10.1016/J.COMPELECENG.2012.08.003}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/PapagiannakopoulouKLGKVCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Garcia-AlfaroCCPC13, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Salvador Mart{\'{\i}}nez Perez and Jordi Cabot}, title = {Management of stateful firewall misconfiguration}, journal = {Comput. Secur.}, volume = {39}, pages = {64--85}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.01.004}, doi = {10.1016/J.COSE.2013.01.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Garcia-AlfaroCCPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HachanaCCG13, author = {Safa{\`{a}} Hachana and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Semantic analysis of role mining results and shadowed roles detection}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {4}, pages = {131--147}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2013.03.001}, doi = {10.1016/J.ISTR.2013.03.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HachanaCCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CuppensCDSGT13, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Ernesto Damiani and Radu State and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nadia Tawbi}, title = {Editorial}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {1}, pages = {1}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.08.004}, doi = {10.1016/J.JISA.2013.08.004}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CuppensCDSGT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CuppensCBME13, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Meriam Ben{-}Ghorbel{-}Talbi and Stephane Morucci and Nada Essaouini}, title = {Smatch: Formal dynamic session management model for {RBAC}}, journal = {J. Inf. Secur. Appl.}, volume = {18}, number = {1}, pages = {30--44}, year = {2013}, url = {https://doi.org/10.1016/j.jisa.2013.07.001}, doi = {10.1016/J.JISA.2013.07.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/CuppensCBME13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CuppensCE13, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Yehia Elrakaiby}, title = {Formal specification and management of security policies with collective group obligations}, journal = {J. Comput. Secur.}, volume = {21}, number = {1}, pages = {149--190}, year = {2013}, url = {https://doi.org/10.3233/JCS-2012-0459}, doi = {10.3233/JCS-2012-0459}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CuppensCE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BkakriaCCFG13, author = {Anis Bkakria and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Jos{\'{e}} M. Fernandez and David Gross{-}Amblard}, title = {Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {39--62}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.039}, doi = {10.22667/JOWUA.2013.06.31.039}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BkakriaCCFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmod/BenslimaneBCMDN13, author = {Djamal Benslimane and Mahmoud Barhamgi and Fr{\'{e}}d{\'{e}}ric Cuppens and Franck Morvan and Bruno Defude and Ebrahim Nageba and Fran{\c{c}}ois Paulus and Stephane Morucci and Michael Mrissa and Nora Cuppens{-}Boulahia and Chirine Ghedira and Riad Mokadem and Said Oulmakhzoune and Jocelyne Fayn}, title = {{PAIRSE:} a privacy-preserving service-oriented data integration system}, journal = {{SIGMOD} Rec.}, volume = {42}, number = {3}, pages = {42--47}, year = {2013}, url = {https://doi.org/10.1145/2536669.2536677}, doi = {10.1145/2536669.2536677}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigmod/BenslimaneBCMDN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CoatrieuxPCCR13, author = {Gouenou Coatrieux and Wei Pan and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Christian Roux}, title = {Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {1}, pages = {111--120}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2012.2224108}, doi = {10.1109/TIFS.2012.2224108}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CoatrieuxPCCR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/EssaouiniCCK13, author = {Nada Essaouini and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Anas Abou El Kalam}, title = {Conflict Management in Obligation with Deadline Policies}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {52--61}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.12}, doi = {10.1109/ARES.2013.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/EssaouiniCCK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/BarhamgiBOCCMT13, author = {Mahmoud Barhamgi and Djamal Benslimane and Said Oulmakhzoune and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Michael Mrissa and Hajer Taktak}, editor = {Camille Salinesi and Moira C. Norrie and Oscar Pastor}, title = {Secure and Privacy-Preserving Execution Model for Data Services}, booktitle = {Advanced Information Systems Engineering - 25th International Conference, CAiSE 2013, Valencia, Spain, June 17-21, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7908}, pages = {35--50}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38709-8\_3}, doi = {10.1007/978-3-642-38709-8\_3}, timestamp = {Mon, 18 Jan 2021 08:56:37 +0100}, biburl = {https://dblp.org/rec/conf/caise/BarhamgiBOCCMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/TounsiCCG13, author = {Wiem Tounsi and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Bruno Crispo and Ravi S. Sandhu and Nora Cuppens{-}Boulahia and Mauro Conti and Jean{-}Louis Lanet}, title = {Privacy-enhanced filtering and collection middleware in EPCglobal networks}, booktitle = {2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23-25, 2013}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CRiSIS.2013.6766358}, doi = {10.1109/CRISIS.2013.6766358}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/TounsiCCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/SamarjiCCKD13, author = {Layal Samarji and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Wael Kanoun and Samuel Dubus}, editor = {Guojun Wang and Indrakshi Ray and Dengguo Feng and Muttukrishnan Rajarajan}, title = {Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks}, booktitle = {Cyberspace Safety and Security - 5th International Symposium, {CSS} 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8300}, pages = {132--150}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03584-0\_11}, doi = {10.1007/978-3-319-03584-0\_11}, timestamp = {Fri, 05 Aug 2022 08:50:55 +0200}, biburl = {https://dblp.org/rec/conf/css/SamarjiCCKD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/JustusCCBCC13, author = {Benjamin Justus and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Julien Bringer and Herv{\'{e}} Chabanne and Olivier Cipiere}, editor = {Lingyu Wang and Basit Shafiq}, title = {Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {274--281}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_19}, doi = {10.1007/978-3-642-39256-6\_19}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/JustusCCBCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/PerezCCC13, author = {Salvador Mart{\'{\i}}nez Perez and Valerio Cosentino and Jordi Cabot and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Hendrik Decker and Lenka Lhotsk{\'{a}} and Sebastian Link and Josef Basl and A Min Tjoa}, title = {Reverse Engineering of Database Security Policies}, booktitle = {Database and Expert Systems Applications - 24th International Conference, {DEXA} 2013, Prague, Czech Republic, August 26-29, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8056}, pages = {442--449}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40173-2\_37}, doi = {10.1007/978-3-642-40173-2\_37}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexa/PerezCCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/BarhamgiBACC13, author = {Mahmoud Barhamgi and Djamal Benslimane and Youssef Amghar and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Giovanna Guerrini and Norman W. Paton}, title = {PrivComp: a privacy-aware data service composition system}, booktitle = {Joint 2013 {EDBT/ICDT} Conferences, {EDBT} '13 Proceedings, Genoa, Italy, March 18-22, 2013}, pages = {757--760}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2452376.2452473}, doi = {10.1145/2452376.2452473}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edbt/BarhamgiBACC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/PapagiannakopoulouKLDGKVCC13, author = {Eugenia I. Papagiannakopoulou and Maria N. Koukovini and Georgios V. Lioudakis and Nikolaos L. Dellas and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Dimitra I. Kaklamani and Iakovos S. Venieris and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Jean{-}Luc Danger and Mourad Debbabi and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood}, title = {Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model}, booktitle = {Foundations and Practice of Security - 6th International Symposium, {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8352}, pages = {209--226}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05302-8\_13}, doi = {10.1007/978-3-319-05302-8\_13}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/PapagiannakopoulouKLDGKVCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/HachanaCCAM13, author = {Safa{\`{a}} Hachana and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Vijay Atluri and Stephane Morucci}, editor = {Aditya Bagchi and Indrakshi Ray}, title = {Policy Mining: {A} Bottom-Up Approach toward a Model Based Firewall Management}, booktitle = {Information Systems Security - 9th International Conference, {ICISS} 2013, Kolkata, India, December 16-20, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {133--147}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45204-8\_10}, doi = {10.1007/978-3-642-45204-8\_10}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/HachanaCCAM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict/MoatazSCC13, author = {Tarik Moataz and Abdullatif Shikfa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Semantic search over encrypted data}, booktitle = {20st International Conference on Telecommunications, {ICT} 2013, Casablanca, Morocco, May 6-8, 2013}, pages = {1--5}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICTEL.2013.6632121}, doi = {10.1109/ICTEL.2013.6632121}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ict/MoatazSCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/BkakriaCCF13, author = {Anis Bkakria and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Jos{\'{e}} M. Fernandez}, editor = {Khabib Mustofa and Erich J. Neuhold and A Min Tjoa and Edgar R. Weippl and Ilsun You}, title = {Confidentiality-Preserving Query Execution of Fragmented Outsourced Data}, booktitle = {Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7804}, pages = {426--440}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36818-9\_47}, doi = {10.1007/978-3-642-36818-9\_47}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/BkakriaCCF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwe/PerezGCCC13, author = {Salvador Mart{\'{\i}}nez Perez and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Jordi Cabot}, editor = {Quan Z. Sheng and Jesper Kjeldskov}, title = {Towards an Access-Control Metamodel for Web Content Management Systems}, booktitle = {Current Trends in Web Engineering - {ICWE} 2013 International Workshops ComposableWeb, QWE, MDWE, DMSSW, EMotions, CSE, SSN, and PhD Symposium, Aalborg, Denmark, July 8-12, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8295}, pages = {148--155}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04244-2\_14}, doi = {10.1007/978-3-319-04244-2\_14}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icwe/PerezGCCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip6-6/FourcotTKCC13, author = {Florent Fourcot and Laurent Toutain and Stefan K{\"{o}}psell and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Thomas Bauschert}, title = {IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices}, booktitle = {Advances in Communication Networking - 19th {EUNICE/IFIP} {WG} 6.6 International Workshop, Chemnitz, Germany, August 28-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8115}, pages = {148--160}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40552-5\_14}, doi = {10.1007/978-3-642-40552-5\_14}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/ifip6-6/FourcotTKCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medes/TounsiCCG13, author = {Wiem Tounsi and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Latif Ladid and Antonio Montes and Peter A. Bruck and Fernando Ferri and Richard Chbeir}, title = {Fine-grained privacy control for the {RFID} middleware of EPCglobal networks}, booktitle = {Fifth International Conference on Management of Emergent Digital EcoSystems, {MEDES} '13, Luxembourg, Luxembourg, October 29-31, 2013}, pages = {60--67}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2536146.2536154}, doi = {10.1145/2536146.2536154}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/medes/TounsiCCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/PerezGCCC13, author = {Salvador Mart{\'{\i}}nez Perez and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Jordi Cabot}, editor = {Ana Moreira and Bernhard Sch{\"{a}}tz and Jeff Gray and Antonio Vallecillo and Peter J. Clarke}, title = {Model-Driven Extraction and Analysis of Network Security Policies}, booktitle = {Model-Driven Engineering Languages and Systems - 16th International Conference, {MODELS} 2013, Miami, FL, USA, September 29 - October 4, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8107}, pages = {52--68}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41533-3\_4}, doi = {10.1007/978-3-642-41533-3\_4}, timestamp = {Mon, 21 Jun 2021 12:26:18 +0200}, biburl = {https://dblp.org/rec/conf/models/PerezGCCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/JustusCCBCC13, author = {Benjamin Justus and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Julien Bringer and Herv{\'{e}} Chabanne and Olivier Cipiere}, editor = {Jordi Castell{\`{a}}{-}Roca and Josep Domingo{-}Ferrer and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Ali A. Ghorbani and Christian Damsgaard Jensen and Jes{\'{u}}s A. Manj{\'{o}}n and Iosif{-}Viorel Onut and Natalia Stakhanova and Vicen{\c{c}} Torra and Jie Zhang}, title = {Define privacy-preserving setbase drawer size standard: {A} {\unicode{8714}}-closeness perspective}, booktitle = {Eleventh Annual International Conference on Privacy, Security and Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013}, pages = {362--365}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PST.2013.6596090}, doi = {10.1109/PST.2013.6596090}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/JustusCCBCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/GraaCCC13, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Ana R. Cavalli}, editor = {Kokou Y{\'{e}}tongnon and Albert Dipanda and Richard Chbeir}, title = {Formal Characterization of Illegal Control Flow in Android System}, booktitle = {Ninth International Conference on Signal-Image Technology {\&} Internet-Based Systems, {SITIS} 2013, Kyoto, Japan, December 2-5, 2013}, pages = {293--300}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SITIS.2013.56}, doi = {10.1109/SITIS.2013.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/GraaCCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/AyedICCPF13, author = {Samiha Ayed and Muhammad Sabir Idrees and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and M{\'{o}}nica Pinto and Lidia Fuentes}, editor = {Kokou Y{\'{e}}tongnon and Albert Dipanda and Richard Chbeir}, title = {Security Aspects: {A} Framework for Enforcement of Security Policies Using {AOP}}, booktitle = {Ninth International Conference on Signal-Image Technology {\&} Internet-Based Systems, {SITIS} 2013, Kyoto, Japan, December 2-5, 2013}, pages = {301--308}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SITIS.2013.57}, doi = {10.1109/SITIS.2013.57}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/AyedICCPF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Franco-ContrerasCCCR13, author = {Javier Franco{-}Contreras and Gouenou Coatrieux and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Christian Roux}, editor = {Rafael Accorsi and Silvio Ranise}, title = {Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {207--222}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_14}, doi = {10.1007/978-3-642-41098-7\_14}, timestamp = {Wed, 25 Sep 2019 18:14:27 +0200}, biburl = {https://dblp.org/rec/conf/stm/Franco-ContrerasCCCR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fps/2012, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Ali Miri and Nadia Tawbi}, title = {Foundations and Practice of Security - 5th International Symposium, {FPS} 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7743}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-37119-6}, doi = {10.1007/978-3-642-37119-6}, isbn = {978-3-642-37118-9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fps/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/KanounDPCC12, author = {Wael Kanoun and Samuel Dubus and Serge Papillon and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Towards Dynamic Risk Management: Success Likelihood of Ongoing Attacks}, journal = {Bell Labs Tech. J.}, volume = {17}, number = {3}, pages = {61--78}, year = {2012}, url = {https://doi.org/10.1002/bltj.21558}, doi = {10.1002/BLTJ.21558}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/KanounDPCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/ElrakaibyCC12, author = {Yehia Elrakaiby and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {Formal enforcement and management of obligation policies}, journal = {Data Knowl. Eng.}, volume = {71}, number = {1}, pages = {127--147}, year = {2012}, url = {https://doi.org/10.1016/j.datak.2011.09.001}, doi = {10.1016/J.DATAK.2011.09.001}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/ElrakaibyCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/HachanaCC12, author = {Safa{\`{a}} Hachana and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Role Mining to Assist Authorization Governance: How Far Have We Gone?}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {4}, pages = {45--64}, year = {2012}, url = {https://doi.org/10.4018/jsse.2012100103}, doi = {10.4018/JSSE.2012100103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/HachanaCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HachanaCCG12, author = {Safa{\`{a}} Hachana and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {123--132}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.61}, doi = {10.1109/ARES.2012.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HachanaCCG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/OulmakhzouneCCM12, author = {Said Oulmakhzoune and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Stephane Morucci}, title = {Privacy Policy Preferences Enforced by {SPARQL} Query Rewriting}, booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012}, pages = {335--342}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ARES.2012.86}, doi = {10.1109/ARES.2012.86}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/OulmakhzouneCCM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/GraaCCC12, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Ana R. Cavalli}, editor = {Yang Xiang and Javier L{\'{o}}pez and C.{-}C. Jay Kuo and Wanlei Zhou}, title = {Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses}, booktitle = {Cyberspace Safety and Security - 4th International Symposium, {CSS} 2012, Melbourne, Australia, December 12-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7672}, pages = {33--47}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35362-8\_4}, doi = {10.1007/978-3-642-35362-8\_4}, timestamp = {Fri, 22 Apr 2022 17:07:03 +0200}, biburl = {https://dblp.org/rec/conf/css/GraaCCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasfaa/CuppensCV12, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Eduardo Pena Vi{\~{n}}a}, editor = {Hwanjo Yu and Ge Yu and Wynne Hsu and Yang{-}Sae Moon and Rainer Unland and Jaesoo Yoo}, title = {Adaptive Access Control Enforcement in Social Network Using Aspect Weaving}, booktitle = {Database Systems for Advanced Applications - 17th International Conference, {DASFAA} 2012, International Workshops: FlashDB, ITEMS, SNSM, SIM3, DQDI, Busan, South Korea, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7240}, pages = {154--167}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29023-7\_17}, doi = {10.1007/978-3-642-29023-7\_17}, timestamp = {Fri, 16 Dec 2022 07:42:33 +0100}, biburl = {https://dblp.org/rec/conf/dasfaa/CuppensCV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/embc/Franco-Contreras12, author = {Javier Franco{-}Contreras and Gouenou Coatrieux and Emmanuel Chazard and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Christian Roux}, title = {Robust lossless watermarking based on circular interpretation of bijective transformations for the protection of medical databases}, booktitle = {Annual International Conference of the {IEEE} Engineering in Medicine and Biology Society, {EMBC} 2012, San Diego, CA, USA, August 28 - September 1, 2012}, pages = {5875--5878}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/EMBC.2012.6347330}, doi = {10.1109/EMBC.2012.6347330}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/embc/Franco-Contreras12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Ben-Ghorbel-TalbiCCM12, author = {Meriam Ben{-}Ghorbel{-}Talbi and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Stephane Morucci}, editor = {Roberto Di Pietro and Javier Herranz and Ernesto Damiani and Radu State}, title = {Towards Session-Aware {RBAC} Delegation: Function Switch}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security, 7th International Workshop, {DPM} 2012, and 5th International Workshop, {SETOP} 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7731}, pages = {287--302}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35890-6\_21}, doi = {10.1007/978-3-642-35890-6\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Ben-Ghorbel-TalbiCCM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KanounSCDC12, author = {Wael Kanoun and Layal Samarji and Nora Cuppens{-}Boulahia and Samuel Dubus and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Roberto Di Pietro and Javier Herranz and Ernesto Damiani and Radu State}, title = {Towards a Temporal Response Taxonomy}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security, 7th International Workshop, {DPM} 2012, and 5th International Workshop, {SETOP} 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7731}, pages = {318--331}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35890-6\_23}, doi = {10.1007/978-3-642-35890-6\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KanounSCDC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/AutrelCC12, author = {Fabien Autrel and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Ali Miri and Nadia Tawbi}, title = {Enabling Dynamic Security Policy in the Java Security Manager}, booktitle = {Foundations and Practice of Security - 5th International Symposium, {FPS} 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7743}, pages = {180--193}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37119-6\_12}, doi = {10.1007/978-3-642-37119-6\_12}, timestamp = {Sun, 02 Oct 2022 16:01:32 +0200}, biburl = {https://dblp.org/rec/conf/fps/AutrelCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/models/PerezCGCC12, author = {Salvador Mart{\'{\i}}nez Perez and Jordi Cabot and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {A model-driven approach for the extraction of network access-control policies}, booktitle = {Model-Driven Security Workshop, MDsec 2012, In conjunction with MoDELS 2012, Innsbruck, Austria, October 1, 2012}, pages = {5}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2422498.2422503}, doi = {10.1145/2422498.2422503}, timestamp = {Wed, 23 Feb 2022 12:16:49 +0100}, biburl = {https://dblp.org/rec/conf/models/PerezCGCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/CuppensCGMR12, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Tarik Moataz and Xavier Rimasson}, editor = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou}, title = {Handling Stateful Firewall Anomalies}, booktitle = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {376}, pages = {174--186}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30436-1\_15}, doi = {10.1007/978-3-642-30436-1\_15}, timestamp = {Sun, 02 Jun 2019 21:15:16 +0200}, biburl = {https://dblp.org/rec/conf/sec/CuppensCGMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2012, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP} {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7371}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31540-4}, doi = {10.1007/978-3-642-31540-4}, isbn = {978-3-642-31539-8}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/ElrakaibyCC11, author = {Yehia Elrakaiby and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {3}, number = {2}, pages = {33--51}, year = {2011}, url = {https://doi.org/10.4018/jmcmc.2011040103}, doi = {10.4018/JMCMC.2011040103}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/ElrakaibyCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/PredaCCGT11, author = {Stere Preda and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Laurent Toutain}, title = {Dynamic deployment of context-aware access control policies for constrained security devices}, journal = {J. Syst. Softw.}, volume = {84}, number = {7}, pages = {1144--1159}, year = {2011}, url = {https://doi.org/10.1016/j.jss.2011.02.005}, doi = {10.1016/J.JSS.2011.02.005}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/PredaCCGT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Cuppens-BoulahiaCN11, author = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Marie Nuadi}, title = {Smatch Model: Extending {RBAC} Sessions in Virtualization Environment}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {17--26}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.13}, doi = {10.1109/ARES.2011.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Cuppens-BoulahiaCN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ThomasCC11, author = {Julien A. Thomas and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Declassification Policy Management in Dynamic Information Systems}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {143--152}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.30}, doi = {10.1109/ARES.2011.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ThomasCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/embc/PanCCCR11, author = {Wei Pan and Gouenou Coatrieux and Nora Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Christian Roux}, title = {Reversible watermarking based on invariant image classification and dynamical error histogram shifting}, booktitle = {33rd Annual International Conference of the {IEEE} Engineering in Medicine and Biology Society, {EMBC} 2011, Boston, MA, USA, August 30 - Sept. 3, 2011}, pages = {4477--4480}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/IEMBS.2011.6091110}, doi = {10.1109/IEMBS.2011.6091110}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/embc/PanCCCR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GraaCAACCCM11, author = {Mariem Graa and Nora Cuppens{-}Boulahia and Fabien Autrel and Hanieh Azkia and Fr{\'{e}}d{\'{e}}ric Cuppens and Gouenou Coatrieux and Ana R. Cavalli and Amel Mammar}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nora Cuppens{-}Boulahia and Sabrina De Capitani di Vimercati}, title = {Using Requirements Engineering in an Automatic Security Policy Derivation Process}, booktitle = {Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, {DPM} 2011, and 4th International Workshop, {SETOP} 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7122}, pages = {155--172}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28879-1\_11}, doi = {10.1007/978-3-642-28879-1\_11}, timestamp = {Fri, 27 Dec 2019 21:19:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/GraaCAACCCM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/TounsiCCG11, author = {Wiem Tounsi and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Pascal Lafourcade}, title = {Formal Verification of a Key Establishment Protocol for {EPC} Gen2 {RFID} Systems: Work in Progress}, booktitle = {Foundations and Practice of Security - 4th Canada-France {MITACS} Workshop, {FPS} 2011, Paris, France, May 12-13, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6888}, pages = {242--251}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27901-0\_20}, doi = {10.1007/978-3-642-27901-0\_20}, timestamp = {Fri, 27 Dec 2019 21:23:06 +0100}, biburl = {https://dblp.org/rec/conf/fps/TounsiCCG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/ThomasCC11, author = {Julien A. Thomas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Consistency Policies for Dynamic Information Systems with Declassification Flows}, booktitle = {Information Systems Security - 7th International Conference, {ICISS} 2011, Kolkata, India, December 15-19, 2011, Procedings}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {87--101}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25560-1\_6}, doi = {10.1007/978-3-642-25560-1\_6}, timestamp = {Wed, 25 Sep 2019 18:06:16 +0200}, biburl = {https://dblp.org/rec/conf/iciss/ThomasCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/notere/AjamCC11, author = {Nabil Ajam and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Isabelle M. Demeure and Thomas Robert and Ahmed Serhrouchni}, title = {Privacy Enforcement of Composed Services in Cellular Networks}, booktitle = {11th Annual International Conference on New Technologies of Distributed Systems, {NOTERE} 2011, Paris, France, 9-13 May 2011}, pages = {1--8}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/NOTERE.2011.5957982}, doi = {10.1109/NOTERE.2011.5957982}, timestamp = {Wed, 11 Dec 2019 16:29:18 +0100}, biburl = {https://dblp.org/rec/conf/notere/AjamCC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/TalbiCCMP11, author = {Meriam Ben{-}Ghorbel{-}Talbi and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Daniel Le M{\'{e}}tayer and Guillaume Piolle}, editor = {Jan Camenisch and Simone Fischer{-}H{\"{u}}bner and Yuko Murayama and Armand Portmann and Carlos Rieder}, title = {Delegation of Obligations and Responsibility}, booktitle = {Future Challenges in Security and Privacy for Academia and Industry - 26th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {354}, pages = {197--209}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21424-0\_16}, doi = {10.1007/978-3-642-21424-0\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/TalbiCCMP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crisis/2011, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Simon N. Foley and Bogdan Groza and Marius Minea}, title = {CRiSIS 2011, Proceedings of the Sixth International Conference on Risks and Security of Internet and Systems, Timi{\c{s}}oara, Romania, September 26-28, 2011}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/6051620/proceeding}, isbn = {978-1-4577-1889-2}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/CuppensC11, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Cover Story}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {264--265}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_674}, doi = {10.1007/978-1-4419-5906-5\_674}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/CuppensC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/CuppensC11a, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Multilevel Security Policies}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {811--812}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_824}, doi = {10.1007/978-1-4419-5906-5\_824}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/CuppensC11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Ben-Ghorbel-TalbiCCB10, author = {Meriam Ben{-}Ghorbel{-}Talbi and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Adel Bouhoula}, title = {A delegation model for extended {RBAC}}, journal = {Int. J. Inf. Sec.}, volume = {9}, number = {3}, pages = {209--236}, year = {2010}, url = {https://doi.org/10.1007/s10207-010-0104-3}, doi = {10.1007/S10207-010-0104-3}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/Ben-Ghorbel-TalbiCCB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ElrakaibyCC10, author = {Yehia Elrakaiby and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {From Contextual Permission to Dynamic Pre-obligation: An Integrated Approach}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {70--78}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.71}, doi = {10.1109/ARES.2010.71}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ElrakaibyCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PredaCCT10, author = {Stere Preda and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Laurent Toutain}, title = {Architecture-Aware Adaptive Deployment of Contextual Security Policies}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {87--95}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.45}, doi = {10.1109/ARES.2010.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/PredaCCT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/KanounCCDM10, author = {Wael Kanoun and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Samuel Dubus and Antony Martin}, title = {Intelligent response system to mitigate the success likelihood of ongoing attacks}, booktitle = {Sixth International Conference on Information Assurance and Security, {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010}, pages = {99--105}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISIAS.2010.5604054}, doi = {10.1109/ISIAS.2010.5604054}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/KanounCCDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AzkiaCCC10, author = {Hanieh Azkia and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Gouenou Coatrieux}, title = {Reconciling {IHE-ATNA} profile with a posteriori contextual access and usage control policy in healthcare environment}, booktitle = {Sixth International Conference on Information Assurance and Security, {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010}, pages = {197--203}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISIAS.2010.5604060}, doi = {10.1109/ISIAS.2010.5604060}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/AzkiaCCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsr/TounsiGCC10, author = {Wiem Tounsi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Securing the Communications of Home Health Care Systems Based on {RFID} Sensor Networks}, booktitle = {8th Annual Conference on Communication Networks and Services Research, {CNSR} 2010, 11-14 May 2010, Montreal, Canada}, pages = {284--291}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CNSR.2010.38}, doi = {10.1109/CNSR.2010.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsr/TounsiGCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/OulmakhzouneCCM10, author = {Said Oulmakhzoune and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Stephane Morucci}, editor = {Sara Foresti and Sushil Jajodia}, title = {\emph{f}Query: {SPARQL} Query Rewriting to Enforce Data Confidentiality}, booktitle = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP} {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6166}, pages = {146--161}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13739-6\_10}, doi = {10.1007/978-3-642-13739-6\_10}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/OulmakhzouneCCM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Garcia-AlfaroCCP10, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Stere Preda}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Ana R. Cavalli and Jean Leneutre}, title = {{MIRAGE:} {A} Management Tool for the Analysis and Deployment of Network Security Policies}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, {DPM} 2010 and 3rd International Workshop, {SETOP} 2010, Athens, Greece, September 23, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6514}, pages = {203--215}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19348-4\_15}, doi = {10.1007/978-3-642-19348-4\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Garcia-AlfaroCCP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KheirCCD10, author = {Nizar Kheir and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {A Service Dependency Model for Cost-Sensitive Intrusion Response}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {626--642}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_38}, doi = {10.1007/978-3-642-15497-3\_38}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KheirCCD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/PredaCCGT10, author = {Stere Preda and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Laurent Toutain}, editor = {Fabio Massacci and Dan S. Wallach and Nicola Zannone}, title = {Model-Driven Security Policy Deployment: Property Oriented Approach}, booktitle = {Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5965}, pages = {123--139}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11747-3\_10}, doi = {10.1007/978-3-642-11747-3\_10}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/PredaCCGT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/OulmakhzouneCCM10, author = {Said Oulmakhzoune and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Stephane Morucci}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {Rewriting of SPARQL/Update Queries for Securing Data Access}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {4--15}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_2}, doi = {10.1007/978-3-642-17650-0\_2}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/OulmakhzouneCCM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medes/Ben-Ghorbel-TalbiCC10, author = {Meriam Ben{-}Ghorbel{-}Talbi and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Richard Chbeir}, title = {Negotiating and delegating obligations}, booktitle = {{MEDES} '10: International {ACM} Conference on Management of Emergent Digital EcoSystems, Bangkok, Thailand, October 26-29, 2010}, pages = {281--288}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1936254.1936310}, doi = {10.1145/1936254.1936310}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/medes/Ben-Ghorbel-TalbiCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medes/ThomasCC10, author = {Julien A. Thomas and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Richard Chbeir}, title = {Expression and enforcement of confidentiality policy in active databases}, booktitle = {{MEDES} '10: International {ACM} Conference on Management of Emergent Digital EcoSystems, Bangkok, Thailand, October 26-29, 2010}, pages = {289--296}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1936254.1936311}, doi = {10.1145/1936254.1936311}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/medes/ThomasCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DebarKCC10, author = {Herv{\'{e}} Debar and Nizar Kheir and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Service Dependencies in Information Systems Security}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {1--20}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_1}, doi = {10.1007/978-3-642-14706-7\_1}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DebarKCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/KanounCCD10, author = {Wael Kanoun and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Samuel Dubus}, editor = {Yang Xiang and Pierangela Samarati and Jiankun Hu and Wanlei Zhou and Ahmad{-}Reza Sadeghi}, title = {Risk-Aware Framework for Activating and Deactivating Policy-Based Response}, booktitle = {Fourth International Conference on Network and System Security, {NSS} 2010, Melbourne, Victoria, Australia, September 1-3, 2010}, pages = {207--215}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NSS.2010.80}, doi = {10.1109/NSS.2010.80}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/KanounCCD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KheirCCD10, author = {Nizar Kheir and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar}, editor = {Kai Rannenberg and Vijay Varadharajan and Christian Weber}, title = {Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment}, booktitle = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11} International Information Security Conference, {SEC} 2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {330}, pages = {148--160}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15257-3\_14}, doi = {10.1007/978-3-642-15257-3\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/KheirCCD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AjamCC10, author = {Nabil Ajam and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Sushil Jajodia and Jianying Zhou}, title = {Privacy Administration in Distributed Service Infrastructure}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {53--70}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_4}, doi = {10.1007/978-3-642-16161-2\_4}, timestamp = {Sun, 07 Jan 2018 16:52:46 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/AjamCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/PanCCCR10, author = {Wei Pan and Gouenou Coatrieux and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Christian Roux}, editor = {Kokou Y{\'{e}}tongnon and Albert Dipanda and Richard Chbeir}, title = {Watermarking to Enforce Medical Image Access and Usage Control Policy}, booktitle = {Sixth International Conference on Signal-Image Technology and Internet-Based Systems, {SITIS} 2010, Kuala Lumpur, Malaysia, December 15-18, 2010}, pages = {251--260}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SITIS.2010.50}, doi = {10.1109/SITIS.2010.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/PanCCCR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1012-2720, author = {Meriam Ben{-}Ghorbel{-}Talbi and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Adel Bouhoula}, title = {Managing Delegation in Access Control Models}, journal = {CoRR}, volume = {abs/1012.2720}, year = {2010}, url = {http://arxiv.org/abs/1012.2720}, eprinttype = {arXiv}, eprint = {1012.2720}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1012-2720.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/HaidarCCD09, author = {Diala Abi Haidar and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar}, title = {XeNA: an access negotiation framework using {XACML}}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {64}, number = {1-2}, pages = {155--169}, year = {2009}, url = {https://doi.org/10.1007/s12243-008-0050-5}, doi = {10.1007/S12243-008-0050-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/HaidarCCD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/Cuppens-Boulahia09, author = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Fabien Autrel and Herv{\'{e}} Debar}, title = {An ontology-based approach to react to network attacks}, journal = {Int. J. Inf. Comput. Secur.}, volume = {3}, number = {3/4}, pages = {280--305}, year = {2009}, url = {https://doi.org/10.1504/IJICS.2009.031041}, doi = {10.1504/IJICS.2009.031041}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/Cuppens-Boulahia09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AyedCC09, author = {Samiha Ayed and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Deploying Security Policy in Intra and Inter Workflow Management Systems}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {58--65}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.152}, doi = {10.1109/ARES.2009.152}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/AyedCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PredaCCGTE09, author = {Stere Preda and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Laurent Toutain and Yehia Elrakaiby}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {Semantic context aware security policy deployment}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {251--261}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533092}, doi = {10.1145/1533057.1533092}, timestamp = {Fri, 18 Mar 2022 11:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PredaCCGTE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/PredaTCCG09, author = {Stere Preda and Laurent Toutain and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Anas Abou El Kalam and Yves Deswarte and Mahmoud Mostafa}, title = {A secured delegation of remote services on IPv6 home networks}, booktitle = {CRiSIS 2009, Post-Proceedings of the Fourth International Conference on Risks and Security of Internet and Systems, Toulouse, France, October 19-22, 2009}, pages = {12--18}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/CRISIS.2009.5411984}, doi = {10.1109/CRISIS.2009.5411984}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/crisis/PredaTCCG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/KanounCCDM09, author = {Wael Kanoun and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Samuel Dubus and Antony Martin}, title = {Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems}, booktitle = {Proceedings of the 12th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August 29-31, 2009}, pages = {83--91}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSE.2009.233}, doi = {10.1109/CSE.2009.233}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/KanounCCDM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AutrelCC09, author = {Fabien Autrel and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Reaction Policy Model Based on Dynamic Organizations and Threat Context}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {49--64}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_4}, doi = {10.1007/978-3-642-03007-9\_4}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/AutrelCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/KheirDCCV09, author = {Nizar Kheir and Herv{\'{e}} Debar and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Jouni Viinikka}, editor = {Ulrich Flegel and Danilo Bruschi}, title = {A Service Dependency Modeling Framework for Policy-Based Response Enforcement}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5587}, pages = {176--195}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02918-9\_11}, doi = {10.1007/978-3-642-02918-9\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/KheirDCCV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AjamCC09, author = {Nabil Ajam and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nora Cuppens{-}Boulahia and Yves Roudier}, title = {Contextual Privacy Management in Extended Role Based Access Control Model}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security, 4th International Workshop, {DPM} 2009 and Second International Workshop, {SETOP} 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5939}, pages = {121--135}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11207-2\_10}, doi = {10.1007/978-3-642-11207-2\_10}, timestamp = {Fri, 27 Dec 2019 21:19:57 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AjamCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PanCCCR09, author = {Wei Pan and Gouenou Coatrieux and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Christian Roux}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nora Cuppens{-}Boulahia and Yves Roudier}, title = {Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security, 4th International Workshop, {DPM} 2009 and Second International Workshop, {SETOP} 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5939}, pages = {153--162}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11207-2\_12}, doi = {10.1007/978-3-642-11207-2\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/PanCCCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdim/ElrakaibyCC09, author = {Yehia El Rakaiby and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Bill Grosky and Fr{\'{e}}d{\'{e}}ric Andr{\`{e}}s and Pit Pichappan}, title = {From state-based to event-based contextual security policies}, booktitle = {Fourth {IEEE} International Conference on Digital Information Management, {ICDIM} 2009, November 1-4, 2009, University of Michigan, Ann Arbor, Michigan, {USA}}, pages = {241--247}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICDIM.2009.5356768}, doi = {10.1109/ICDIM.2009.5356768}, timestamp = {Sat, 15 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdim/ElrakaibyCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/ElrakaibyCC09, author = {Yehia El Rakaiby and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {Formalization and Management of Group Obligations}, booktitle = {{POLICY} 2009, {IEEE} International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009}, pages = {158--165}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/POLICY.2009.10}, doi = {10.1109/POLICY.2009.10}, timestamp = {Sat, 15 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/policy/ElrakaibyCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/ThomasCC09, author = {Julien A. Thomas and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Kokou Y{\'{e}}tongnon and Richard Chbeir and Albert Dipanda}, title = {Modeling and Controlling Downgrading Operations in Information Systems}, booktitle = {Fifth International Conference on Signal-Image Technology {\&} Internet-Based Systems, {SITIS} 2009, Marrakesh, Morocco, November 29 - December 4, 2009}, pages = {377--384}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SITIS.2009.66}, doi = {10.1109/SITIS.2009.66}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/ThomasCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/Ben-Ghorbel-TalbiCCB09, author = {Meriam Ben{-}Ghorbel{-}Talbi and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Adel Bouhoula}, editor = {Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis and G{\"{u}}nther Pernul}, title = {An Extended Role-Based Access Control Model for Delegating Obligations}, booktitle = {Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5695}, pages = {127--137}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03748-1\_13}, doi = {10.1007/978-3-642-03748-1\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/Ben-Ghorbel-TalbiCCB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0905-1362, author = {Stere Preda and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Laurent Toutain}, title = {Reliable Process for Security Policy Deployment}, journal = {CoRR}, volume = {abs/0905.1362}, year = {2009}, url = {http://arxiv.org/abs/0905.1362}, eprinttype = {arXiv}, eprint = {0905.1362}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0905-1362.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/AyedCC08, author = {Samiha Ayed and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Deploying Access and Flow Control in Distributed Workflows}, journal = {J. Res. Pract. Inf. Technol.}, volume = {40}, number = {4}, pages = {231--254}, year = {2008}, url = {http://ws.acs.org.au/jrpit/JRPITVolumes/JRPIT40/JRPIT40.4.231.pdf}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/AyedCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Garcia-AlfaroBC08, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Complete analysis of configuration rules to guarantee reliable network security policies}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {2}, pages = {103--122}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0045-7}, doi = {10.1007/S10207-007-0045-7}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/Garcia-AlfaroBC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/CuppensC08, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {Modeling contextual security policies}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {4}, pages = {285--305}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0051-9}, doi = {10.1007/S10207-007-0051-9}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/CuppensC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ComaCCC08, author = {C{\'{e}}line Coma and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Ana R. Cavalli}, title = {Context Ontology for Secure Interoperability}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {821--827}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.133}, doi = {10.1109/ARES.2008.133}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ComaCCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/AyedCC08, author = {Samiha Ayed and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Managing access and flow control requirements in distributed workflows}, booktitle = {The 6th {ACS/IEEE} International Conference on Computer Systems and Applications, {AICCSA} 2008, Doha, Qatar, March 31 - April 4, 2008}, pages = {702--710}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/AICCSA.2008.4493605}, doi = {10.1109/AICCSA.2008.4493605}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/AyedCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/auisc/AyedCC08, author = {Samiha Ayed and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Ljiljana Brankovic and Mirka Miller}, title = {Deploying Access Control in Distributed Workflow}, booktitle = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong, NSW, Australia, January 2008}, series = {{CRPIT}}, volume = {81}, pages = {9--17}, publisher = {Australian Computer Society}, year = {2008}, url = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Ayed.html}, timestamp = {Thu, 25 Jul 2019 14:09:43 +0200}, biburl = {https://dblp.org/rec/conf/auisc/AyedCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/LeCCM08, author = {Cam Tu Phan Le and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Patrick Maill{\'{e}}}, editor = {Elisa Bertino and James B. D. Joshi}, title = {Evaluating the Trustworthiness of Contributors in a Collaborative Environment}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {10}, pages = {451--460}, publisher = {Springer / {ICST}}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03354-4\_34}, doi = {10.1007/978-3-642-03354-4\_34}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/LeCCM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/Cuppens-BoulahiaCVVGD08, author = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Jorge E. L{\'{o}}pez de Vergara and Enrique V{\'{a}}zquez and Javier Guerra and Herv{\'{e}} Debar}, editor = {Mohamed Jmaiel and Mohamed Mosbah}, title = {An ontology-based approach to react to network attacks}, booktitle = {CRiSIS '08, Third International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia, October 28-30, 2008}, pages = {27--35}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/CRISIS.2008.4757461}, doi = {10.1109/CRISIS.2008.4757461}, timestamp = {Tue, 11 Oct 2022 14:59:07 +0200}, biburl = {https://dblp.org/rec/conf/crisis/Cuppens-BoulahiaCVVGD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/KanounCCA08, author = {Wael Kanoun and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Jos{\'{e}} Araujo}, editor = {Mohamed Jmaiel and Mohamed Mosbah}, title = {Automated reaction based on risk analysis and attackers skills in intrusion detection systems}, booktitle = {CRiSIS '08, Third International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia, October 28-30, 2008}, pages = {117--124}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/CRISIS.2008.4757471}, doi = {10.1109/CRISIS.2008.4757471}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/KanounCCA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/deon/Cuppens-BoulahiaC08, author = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Ron van der Meyden and Leendert W. N. van der Torre}, title = {Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic}, booktitle = {Deontic Logic in Computer Science, 9th International Conference, {DEON} 2008, Luxembourg, Luxembourg, July 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5076}, pages = {65--80}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70525-3\_7}, doi = {10.1007/978-3-540-70525-3\_7}, timestamp = {Thu, 14 Oct 2021 10:16:00 +0200}, biburl = {https://dblp.org/rec/conf/deon/Cuppens-BoulahiaC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Ben-Ghorbel-TalbiCCB08, author = {Meriam Ben{-}Ghorbel{-}Talbi and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Adel Bouhoula}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {Revocation Schemes for Delegation Licences}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {190--205}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_13}, doi = {10.1007/978-3-540-88625-9\_13}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/icics/Ben-Ghorbel-TalbiCCB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/CuppensCT08, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Julien A. Thomas}, editor = {R. Sekar and Arun K. Pujari}, title = {A Robust Reputation Scheme for Decentralized Group Management Systems}, booktitle = {Information Systems Security, 4th International Conference, {ICISS} 2008, Hyderabad, India, December 16-20, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {71--85}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89862-7\_5}, doi = {10.1007/978-3-540-89862-7\_5}, timestamp = {Thu, 18 Nov 2021 17:21:37 +0100}, biburl = {https://dblp.org/rec/conf/iciss/CuppensCT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Cuppens-BoulahiaCHD08, author = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Diala Abi Haidar and Herv{\'{e}} Debar}, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Negotiation of Prohibition: An Approach Based on Policy Rewriting}, booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, pages = {173--187}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-09699-5\_12}, doi = {10.1007/978-0-387-09699-5\_12}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/Cuppens-BoulahiaCHD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ElrakaibyCC08, author = {Yehia ElRakaiby and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Interactivity for Reactive Access Control}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {57--64}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Sat, 15 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ElrakaibyCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/CuppensCBKC08, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Yacine Bouzida and Wael Kanoun and Aur{\'{e}}lien Croissant}, editor = {Richard Chbeir and Albert Dipanda and Kokou Y{\'{e}}tongnon}, title = {Expression and Deployment of Reaction Policies}, booktitle = {4th {IEEE} International Conference on Signal Image Technology and Internet Based Systems, {SITIS} 2008, Bali, Indonesia, November 30 - December 3, 2008}, pages = {118--127}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SITIS.2008.96}, doi = {10.1109/SITIS.2008.96}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/CuppensCBKC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sitis/ComaCCC08, author = {C{\'{e}}line Coma and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Ana R. Cavalli}, editor = {Richard Chbeir and Albert Dipanda and Kokou Y{\'{e}}tongnon}, title = {Interoperability of Context Based System Policies Using {O2O} Contract}, booktitle = {4th {IEEE} International Conference on Signal Image Technology and Internet Based Systems, {SITIS} 2008, Bali, Indonesia, November 30 - December 3, 2008}, pages = {137--144}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SITIS.2008.68}, doi = {10.1109/SITIS.2008.68}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sitis/ComaCCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0803-0653, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {Aggregating and Deploying Network Access Control Policies}, journal = {CoRR}, volume = {abs/0803.0653}, year = {2008}, url = {http://arxiv.org/abs/0803.0653}, eprinttype = {arXiv}, eprint = {0803.0653}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0803-0653.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/CuppensDBG07, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar and Danielle Boulanger and Alban Gabillon}, title = {Introduction Selection of articles from the {SAR-SSI} 2006}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {62}, number = {11-12}, pages = {1327}, year = {2007}, url = {https://doi.org/10.1007/BF03253321}, doi = {10.1007/BF03253321}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/CuppensDBG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/SansCC07, author = {Thierry Sans and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {A Framework to Enforce Access Control, Usage Control and Obligations}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {62}, number = {11-12}, pages = {1329--1352}, year = {2007}, url = {https://doi.org/10.1007/BF03253322}, doi = {10.1007/BF03253322}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/SansCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/DebarTCC07, author = {Herv{\'{e}} Debar and Yohann Thomas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {Enabling automated threat response through the use of a dynamic security policy}, journal = {J. Comput. Virol.}, volume = {3}, number = {3}, pages = {195--210}, year = {2007}, url = {https://doi.org/10.1007/s11416-007-0039-z}, doi = {10.1007/S11416-007-0039-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/DebarTCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Garcia-AlfaroCC07, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, title = {Aggregating and Deploying Network Access Control Policies}, booktitle = {Proceedings of the The Second International Conference on Availability, Reliability and Security, {ARES} 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria}, pages = {532--542}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ARES.2007.34}, doi = {10.1109/ARES.2007.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Garcia-AlfaroCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/HaidarCCD07, author = {Diala Abi Haidar and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar}, editor = {Ning Zhang and Ajith Abraham}, title = {Resource Classification Based Negotiation in Web Services}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {313--318}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.54}, doi = {10.1109/IAS.2007.54}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/HaidarCCD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/AyedCC07, author = {Samiha Ayed and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Iliano Cervesato}, title = {An Integrated Model for Access Control and Information Flow Requirements}, booktitle = {Advances in Computer Science - {ASIAN} 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4846}, pages = {111--125}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76929-3\_12}, doi = {10.1007/978-3-540-76929-3\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/asian/AyedCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BrunelCCSB07, author = {Julien Brunel and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Thierry Sans and Jean{-}Paul Bodeveix}, editor = {Peng Ning and Vijay Atluri and Virgil D. Gligor and Heiko Mantel}, title = {Security policy compliance with violation management}, booktitle = {Proceedings of the 2007 {ACM} workshop on Formal methods in security engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {31--40}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314436.1314441}, doi = {10.1145/1314436.1314441}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BrunelCCSB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/critis/KanounCCA07, author = {Wael Kanoun and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Fabien Autrel}, editor = {Javier L{\'{o}}pez and Bernhard M. H{\"{a}}mmerli}, title = {Advanced Reaction Using Risk Assessment in Intrusion Detection Systems}, booktitle = {Critical Information Infrastructures Security, Second International Workshop, {CRITIS} 2007, M{\'{a}}laga, Spain, October 3-5, 2007. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {5141}, pages = {58--70}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-89173-4\_6}, doi = {10.1007/978-3-540-89173-4\_6}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/critis/KanounCCA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/CuppensCS07, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Thierry Sans}, editor = {Bruno Apolloni and Robert J. Howlett and Lakhmi C. Jain}, title = {{XML-BB:} {A} Model to Handle Relationships Protection in {XML} Documents}, booktitle = {Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, {KES} 2007, {XVII} Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {4694}, pages = {1107--1114}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74829-8\_135}, doi = {10.1007/978-3-540-74829-8\_135}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/kes/CuppensCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/CuppensCRT07, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Tony Ramard and Julien A. Thomas}, editor = {Hongke Zhang and Stephan Olariu and Jiannong Cao and David B. Johnson}, title = {Misbehaviors Detection to Ensure Availability in {OLSR}}, booktitle = {Mobile Ad-Hoc and Sensor Networks, Third International Conference, {MSN} 2007, Beijing, China, December 12-14, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4864}, pages = {799--813}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77024-4\_72}, doi = {10.1007/978-3-540-77024-4\_72}, timestamp = {Tue, 14 Apr 2020 13:23:09 +0200}, biburl = {https://dblp.org/rec/conf/msn/CuppensCRT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/MallouliOCCC07, author = {Wissam Mallouli and Jean{-}Marie Orset and Ana R. Cavalli and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Volkmar Lotz and Bhavani Thuraisingham}, title = {A formal approach for testing security rules}, booktitle = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings}, pages = {127--132}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1266840.1266860}, doi = {10.1145/1266840.1266860}, timestamp = {Wed, 29 Jun 2022 15:37:42 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/MallouliOCCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/Garcia-AlfaroCC07, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Hein S. Venter and Mariki M. Eloff and Les Labuschagne and Jan H. P. Eloff and Rossouw von Solms}, title = {Management of Exceptions on Access Control Policies}, booktitle = {New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the {IFIP} {TC-11} 22nd International Information Security Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa}, series = {{IFIP}}, volume = {232}, pages = {97--108}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-72367-9\_9}, doi = {10.1007/978-0-387-72367-9\_9}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/Garcia-AlfaroCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SansCC07, author = {Thierry Sans and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Hein S. Venter and Mariki M. Eloff and Les Labuschagne and Jan H. P. Eloff and Rossouw von Solms}, title = {{OPA:} Onion Policy Administration Model - Another approach to manage rights in {DRM}}, booktitle = {New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the {IFIP} {TC-11} 22nd International Information Security Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa}, series = {{IFIP}}, volume = {232}, pages = {349--360}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-72367-9\_30}, doi = {10.1007/978-0-387-72367-9\_30}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/SansCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PredaCCGT07, author = {Stere Preda and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Laurent Toutain}, editor = {Javier Hernando and Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek}, title = {Reliable Process for Security Policy Deployment}, booktitle = {{SECRYPT} 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {5--15}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Fri, 04 Sep 2009 13:27:09 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PredaCCGT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/CuppensABGGS06, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Fabien Autrel and Yacine Bouzida and Joaqu{\'{\i}}n Garc{\'{\i}}a and Sylvain Gombault and Thierry Sans}, title = {Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {61}, number = {1-2}, pages = {197--217}, year = {2006}, url = {https://doi.org/10.1007/BF03219974}, doi = {10.1007/BF03219974}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/CuppensABGGS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/CuppensDB06, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar and Elisa Bertino}, title = {Foreword}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {61}, number = {3-4}, pages = {242--244}, year = {2006}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/CuppensDB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/AutrelC06, author = {Fabien Autrel and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {{CRIM:} un module de corr{\'{e}}lation d'alertes et de r{\'{e}}action aux attaques}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {61}, number = {9-10}, pages = {1172--1192}, year = {2006}, url = {https://doi.org/10.1007/BF03219887}, doi = {10.1007/BF03219887}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/AutrelC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CuppensCR06, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Tony Ramard}, title = {Availability Enforcement by Obligations and Aspects Identification}, booktitle = {Proceedings of the The First International Conference on Availability, Reliability and Security, {ARES} 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria}, pages = {229--239}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ARES.2006.36}, doi = {10.1109/ARES.2006.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/CuppensCR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/SansCC06, author = {Thierry Sans and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Mitsu Okada and Ichiro Satoh}, title = {{FORM} : {A} Federated Rights Expression Model for Open {DRM} Frameworks}, booktitle = {Advances in Computer Science - {ASIAN} 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4435}, pages = {45--59}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-77505-8\_5}, doi = {10.1007/978-3-540-77505-8\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/asian/SansCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/DebarTBC06, author = {Herv{\'{e}} Debar and Yohann Thomas and Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Roland B{\"{u}}schkes and Pavel Laskov}, title = {Using Contextual Security Policies for Threat Response}, booktitle = {Detection of Intrusions and Malware {\&} Vulnerability Assessment, Third International Conference, {DIMVA} 2006, Berlin, Germany, July 13-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4064}, pages = {109--128}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11790754\_7}, doi = {10.1007/11790754\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/DebarTBC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Garcia-AlfaroCC06, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {Analysis of Policy Anomalies on Distributed Network Security Setups}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, pages = {496--511}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908\_30}, doi = {10.1007/11863908\_30}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/Garcia-AlfaroCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/BouzidaCG06, author = {Yacine Bouzida and Fr{\'{e}}d{\'{e}}ric Cuppens and Sylvain Gombault}, title = {Detecting and Reacting against Distributed Denial of Service Attacks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2006, Istanbul, Turkey, 11-15 June 2006}, pages = {2394--2400}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICC.2006.255128}, doi = {10.1109/ICC.2006.255128}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/BouzidaCG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/CuppensCC06, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and C{\'{e}}line Coma}, editor = {Aditya Bagchi and Vijayalakshmi Atluri}, title = {{O2O:} Virtual Private Organizations to Manage Security Policy Interoperability}, booktitle = {Information Systems Security, Second International Conference, {ICISS} 2006, Kolkata, India, December 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4332}, pages = {101--115}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11961635\_7}, doi = {10.1007/11961635\_7}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/CuppensCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safecomp/Garcia-AlfaroCC06, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Janusz G{\'{o}}rski}, title = {Towards Filtering and Alerting Rule Rewriting on Single-Component Policies}, booktitle = {Computer Safety, Reliability, and Security, 25th International Conference, {SAFECOMP} 2006, Gdansk, Poland, September 27-29, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4166}, pages = {182--194}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11875567\_14}, doi = {10.1007/11875567\_14}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safecomp/Garcia-AlfaroCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SansCC06, author = {Thierry Sans and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Simone Fischer{-}H{\"{u}}bner and Kai Rannenberg and Louise Yngstr{\"{o}}m and Stefan Lindskog}, title = {A Flexible and Distributed Architecture to Enforce Dynamic Access Control}, booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP} {TC-11} 21st International Information Security Conference {(SEC} 2006), 22-24 May 2006, Karlstad, Sweden}, series = {{IFIP}}, volume = {201}, pages = {183--195}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-33406-8\_16}, doi = {10.1007/0-387-33406-8\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/SansCC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BouzidaC06, author = {Yacine Bouzida and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Simone Fischer{-}H{\"{u}}bner and Kai Rannenberg and Louise Yngstr{\"{o}}m and Stefan Lindskog}, title = {Detecting Known and Novel Network Intrusions}, booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP} {TC-11} 21st International Information Security Conference {(SEC} 2006), 22-24 May 2006, Karlstad, Sweden}, series = {{IFIP}}, volume = {201}, pages = {258--270}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-33406-8\_22}, doi = {10.1007/0-387-33406-8\_22}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BouzidaC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sws/HaidarCCD06, author = {Diala Abi Haidar and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Herv{\'{e}} Debar}, editor = {Ari Juels and Ernesto Damiani and Alban Gabillon}, title = {An extended {RBAC} profile of {XACML}}, booktitle = {Proceedings of the 3rd {ACM} Workshop On Secure Web Services, {SWS} 2006, Alexandria, VA, USA, November 3, 2006}, pages = {13--22}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180367.1180372}, doi = {10.1145/1180367.1180372}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sws/HaidarCCD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CuppensCG07, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Meriam Ben Ghorbel}, editor = {Catalin Dima and Marius Minea and Ferucio Laurentiu Tiplea}, title = {High Level Conflict Management Strategies in Advanced Access Control Models}, booktitle = {Proceedings of the First Workshop in Information and Computer Security, ICS@SYNASC 2006, Timisoara, Romania, September 30, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {186}, pages = {3--26}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2007.01.064}, doi = {10.1016/J.ENTCS.2007.01.064}, timestamp = {Tue, 31 Jan 2023 14:10:47 +0100}, biburl = {https://dblp.org/rec/journals/entcs/CuppensCG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CuppensCS05, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Thierry Sans}, title = {Nomad: {A} Security Model with Non Atomic Actions and Deadlines}, booktitle = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005), 20-22 June 2005, Aix-en-Provence, France}, pages = {186--196}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSFW.2005.20}, doi = {10.1109/CSFW.2005.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/CuppensCS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/CuppensCS05, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Thierry Sans}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Protection of Relationships in {XML} Documents with the {XML-BB} Model}, booktitle = {Information Systems Security, First International Conference, {ICISS} 2005, Kolkata, India, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {148--163}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593980\_11}, doi = {10.1007/11593980\_11}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/CuppensCS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/GarciaCACBNO05, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a and Fr{\'{e}}d{\'{e}}ric Cuppens and Fabien Autrel and Jordi Castell{\`{a}}{-}Roca and Joan Borrell and Guillermo Navarro and Jose A. Ortega{-}Ruiz}, title = {Protecting On-Line Casinos against Fraudulent Player Drop-Out}, booktitle = {International Symposium on Information Technology: Coding and Computing {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}}, pages = {500--505}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ITCC.2005.232}, doi = {10.1109/ITCC.2005.232}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/GarciaCACBNO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/AutrelBC04, author = {Fabien Autrel and Salem Benferhat and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Utilisation de la corr{\'{e}}lation pond{\'{e}}r{\'{e}}e dans un processus de d{\'{e}}tection d'intrusions}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {59}, number = {9-10}, pages = {1072--1091}, year = {2004}, url = {https://doi.org/10.1007/BF03179711}, doi = {10.1007/BF03179711}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/AutrelBC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/CuppensM04, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Alexandre Mi{\`{e}}ge}, title = {AdOrBAC: an administration model for Or-BAC}, journal = {Comput. Syst. Sci. Eng.}, volume = {19}, number = {3}, year = {2004}, timestamp = {Tue, 20 Feb 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csse/CuppensM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsi/DebarMCAMVBDO04, author = {Herv{\'{e}} Debar and Benjamin Morin and Fr{\'{e}}d{\'{e}}ric Cuppens and Fabien Autrel and Ludovic M{\'{e}} and Bernard Vivinis and Salem Benferhat and Mireille Ducass{\'{e}} and Rodolphe Ortalo}, title = {D{\'{e}}tection d'intrusions : corr{\'{e}}lation d'alertes}, journal = {Tech. Sci. Informatiques}, volume = {23}, number = {3}, pages = {359--390}, year = {2004}, url = {https://doi.org/10.3166/tsi.23.359-390}, doi = {10.3166/TSI.23.359-390}, timestamp = {Wed, 24 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsi/DebarMCAMVBDO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CuppensGS04, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Sylvain Gombault and Thierry Sans}, title = {Selecting Appropriate Counter-Measures in an Intrusion Detection Framework}, booktitle = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004), 28-30 June 2004, Pacific Grove, CA, {USA}}, pages = {78--87}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.18}, doi = {10.1109/CSFW.2004.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/CuppensGS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/GarciaABCCN04, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a and Fabien Autrel and Joan Borrell and Sergio Castillo and Fr{\'{e}}d{\'{e}}ric Cuppens and Guillermo Navarro}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {223--235}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_18}, doi = {10.1007/978-3-540-30191-2\_18}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/GarciaABCCN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/CuppensCSM04, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Thierry Sans and Alexandre Mi{\`{e}}ge}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {A Formal Approach to Specify and Deploy a Network Security Policy}, booktitle = {Formal Aspects in Security and Trust: Second {IFIP} {TC1} {WG1.7} Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th {IFIP} World Computer Congress, August 22-27, 2004, Toulouse, France}, series = {{IFIP}}, volume = {173}, pages = {203--218}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-24098-5\_15}, doi = {10.1007/0-387-24098-5\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/CuppensCSM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sis/KaciAC04, author = {Souhila Kaci and Abdeslam Ali{-}Laouar and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and L. Javier Garc{\'{\i}}a{-}Villalba}, title = {Health care and social inference systems: An unauthorized inference control based on fuzzy logic}, booktitle = {Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, {WOSIS} 2004, In conjunction with {ICEIS} 2004, Porto, Portugal, April 2004}, pages = {217--226}, publisher = {{INSTICC} Press}, year = {2004}, timestamp = {Mon, 23 Aug 2004 13:05:50 +0200}, biburl = {https://dblp.org/rec/conf/sis/KaciAC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip11/2004, editor = {Yves Deswarte and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Lingyu Wang}, title = {Information Security Management, Education and Privacy, {IFIP} 18th World Computer Congress, {TC11} 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {148}, publisher = {Kluwer}, year = {2004}, isbn = {1-4020-8144-8}, timestamp = {Mon, 02 Jan 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sec/2004, editor = {Yves Deswarte and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Lingyu Wang}, title = {Security and Protection in Information Processing Systems, {IFIP} 18th WorldComputer Congress, {TC11} 19th International Information Security Conference, 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {147}, publisher = {Kluwer / Springer}, year = {2004}, isbn = {1-4020-8142-1}, timestamp = {Mon, 02 Jan 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CuppensM03, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Alexandre Mi{\`{e}}ge}, title = {Modelling Contexts in the Or-BAC Model}, booktitle = {19th Annual Computer Security Applications Conference {(ACSAC} 2003), 8-12 December 2003, Las Vegas, NV, {USA}}, pages = {416--425}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CSAC.2003.1254346}, doi = {10.1109/CSAC.2003.1254346}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CuppensM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/flairs/BenferhatBC03, author = {Salem Benferhat and Rania El Baida and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Ingrid Russell and Susan M. Haller}, title = {A Possibilistic Logic Encoding of Access Control}, booktitle = {Proceedings of the Sixteenth International Florida Artificial Intelligence Research Society Conference, May 12-14, 2003, St. Augustine, Florida, {USA}}, pages = {481--485}, publisher = {{AAAI} Press}, year = {2003}, url = {http://www.aaai.org/Library/FLAIRS/2003/flairs03-094.php}, timestamp = {Wed, 26 Oct 2022 08:35:31 +0200}, biburl = {https://dblp.org/rec/conf/flairs/BenferhatBC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/BenferhatAC03, author = {Salem Benferhat and Fabien Autrel and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Enhanced Correlation in an Intrusion Detection Process}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {157--170}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_13}, doi = {10.1007/978-3-540-45215-7\_13}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/BenferhatAC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/CuppensM03, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Alexandre Mi{\`{e}}ge}, editor = {Robert Meersman and Zahir Tari}, title = {Administration Model for Or-BAC}, booktitle = {On The Move to Meaningful Internet Systems 2003: {OTM} 2003 Workshops, {OTM} Confederated International Workshops, HCI-SWWA, IPW, JTRES, WORM, WMS, and {WRSM} 2003, Catania, Sicily, Italy, November 3-7, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2889}, pages = {754--768}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39962-9\_76}, doi = {10.1007/978-3-540-39962-9\_76}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/otm/CuppensM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/KalamBMBCSBDT03, author = {Anas Abou El Kalam and Salem Benferhat and Alexandre Mi{\`{e}}ge and Rania El Baida and Fr{\'{e}}d{\'{e}}ric Cuppens and Claire Saurel and Philippe Balbiani and Yves Deswarte and Gilles Trouessin}, title = {Organization based access contro}, booktitle = {4th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2003), 4-6 June 2003, Lake Como, Italy}, pages = {120}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/POLICY.2003.1206966}, doi = {10.1109/POLICY.2003.1206966}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/KalamBMBCSBDT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BenferhatBC03, author = {Salem Benferhat and Rania El Baida and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {A stratification-based approach for handling conflicts in access control}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {189--195}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775437}, doi = {10.1145/775412.775437}, timestamp = {Tue, 06 Nov 2018 16:57:58 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BenferhatBC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/his/CuppensAMB02, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Fabien Autrel and Alexandre Mi{\`{e}}ge and Salem Benferhat}, editor = {Ajith Abraham and Javier Ruiz{-}del{-}Solar and Mario K{\"{o}}ppen}, title = {Recognizing Malicious Intention in an Intrusion Detection Process}, booktitle = {Soft Computing Systems - Design, Management and Applications, {HIS} 2002, December 1-4, 2002, Santiago, Chile}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {87}, pages = {806--817}, publisher = {{IOS} Press}, year = {2002}, timestamp = {Thu, 29 Jan 2004 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/his/CuppensAMB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CuppensM02, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Alexandre Mi{\`{e}}ge}, title = {Alert Correlation in a Cooperative Intrusion Detection Framework}, booktitle = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002}, pages = {202--215}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SECPRI.2002.1004372}, doi = {10.1109/SECPRI.2002.1004372}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/CuppensM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/CuppensG01, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Alban Gabillon}, title = {Cover story management}, journal = {Data Knowl. Eng.}, volume = {37}, number = {2}, pages = {177--201}, year = {2001}, url = {https://doi.org/10.1016/S0169-023X(01)00006-4}, doi = {10.1016/S0169-023X(01)00006-4}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/CuppensG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/BlochHAABBCCCDFGKLMPSSS01, author = {Isabelle Bloch and Anthony Hunter and Alain Appriou and Andr{\'{e}} Ayoun and Salem Benferhat and Philippe Besnard and Laurence Cholvy and Roger M. Cooke and Fr{\'{e}}d{\'{e}}ric Cuppens and Didier Dubois and H{\'{e}}l{\`{e}}ne Fargier and Michel Grabisch and Rudolf Kruse and J{\'{e}}r{\^{o}}me Lang and Seraf{\'{\i}}n Moral and Henri Prade and Alessandro Saffiotti and Philippe Smets and Claudio Sossai}, title = {Fusion: General concepts and characteristics}, journal = {Int. J. Intell. Syst.}, volume = {16}, number = {10}, pages = {1107--1134}, year = {2001}, url = {https://doi.org/10.1002/int.1052}, doi = {10.1002/INT.1052}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/BlochHAABBCCCDFGKLMPSSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/CuppensCSC01, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Laurence Cholvy and Claire Saurel and J{\'{e}}r{\^{o}}me Carr{\`{e}}re}, title = {Merging regulations: Analysis of a practical example}, journal = {Int. J. Intell. Syst.}, volume = {16}, number = {11}, pages = {1223--1243}, year = {2001}, url = {https://doi.org/10.1002/int.1057}, doi = {10.1002/INT.1057}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/CuppensCSC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Cuppens01, author = {Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Managing Alerts in a Multi-Intrusion Detection Environmen}, booktitle = {17th Annual Computer Security Applications Conference {(ACSAC} 2001), 11-14 December 2001, New Orleans, Louisiana, {USA}}, pages = {22--31}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ACSAC.2001.991518}, doi = {10.1109/ACSAC.2001.991518}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Cuppens01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nldb/CarrereCS00, author = {J{\'{e}}r{\^{o}}me Carr{\`{e}}re and Fr{\'{e}}d{\'{e}}ric Cuppens and Claire Saurel}, editor = {Mokrane Bouzeghoub and Zoubida Kedad and Elisabeth M{\'{e}}tais}, title = {LExIS: {A} Query Language to Scan Information Flow}, booktitle = {Natural Language Processing and Information Systems, 5th International Conference on Applications of Natural Language to Information Systems, {NLDB} 2000, Versailles, France, June 28-30, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {1959}, pages = {369}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45399-7\_35}, doi = {10.1007/3-540-45399-7\_35}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/nldb/CarrereCS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/CuppensO00, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Rodolphe Ortalo}, editor = {Herv{\'{e}} Debar and Ludovic M{\'{e}} and Shyhtsun Felix Wu}, title = {{LAMBDA:} {A} Language to Model a Database for Detection of Attacks}, booktitle = {Recent Advances in Intrusion Detection, Third International Workshop, {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1907}, pages = {197--216}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-39945-3\_13}, doi = {10.1007/3-540-39945-3\_13}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/CuppensO00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2000, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Yves Deswarte and Dieter Gollmann and Michael Waidner}, title = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1895}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10722599}, doi = {10.1007/10722599}, isbn = {3-540-41031-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/CuppensG99, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Alban Gabillon}, title = {Logical Foundations of Multilevel Databases}, journal = {Data Knowl. Eng.}, volume = {29}, number = {3}, pages = {259--291}, year = {1999}, url = {https://doi.org/10.1016/S0169-023X(98)00044-5}, doi = {10.1016/S0169-023X(98)00044-5}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/CuppensG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CuppensCSC98, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Laurence Cholvy and Claire Saurel and J{\'{e}}r{\^{o}}me Carr{\`{e}}re}, title = {Merging Security Policies: Analysis of a Practical Example}, booktitle = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998}, pages = {123--136}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/CSFW.1998.683163}, doi = {10.1109/CSFW.1998.683163}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/CuppensCSC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CarrereCS98, author = {J{\'{e}}r{\^{o}}me Carr{\`{e}}re and Fr{\'{e}}d{\'{e}}ric Cuppens and Claire Saurel}, editor = {Sushil Jajodia}, title = {{SACADDOS:} {A} Support Tool to Manage Multilevel Documents}, booktitle = {Database Security {XII:} Status and Prospects, {IFIP} {TC11} {WG} 11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece}, series = {{IFIP} Conference Proceedings}, volume = {142}, pages = {173--188}, publisher = {Kluwer}, year = {1998}, timestamp = {Mon, 21 Oct 2002 13:30:47 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/CarrereCS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CuppensG98, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Alban Gabillon}, editor = {Jean{-}Jacques Quisquater and Yves Deswarte and Catherine Meadows and Dieter Gollmann}, title = {Rules for Designing Multilevel Object-Oriented Databases}, booktitle = {Computer Security - {ESORICS} 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1485}, pages = {159--174}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055862}, doi = {10.1007/BFB0055862}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CuppensG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/CuppensS98, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Claire Saurel}, editor = {Sushil Jajodia and William List and Graeme W. McGregor and Leon Strous}, title = {A Logical Formalization of Integrity Policies for Database Management Systems}, booktitle = {Integrity and Internal Control in Information Systems, {IFIP} {TC11} Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998}, series = {{IFIP} Conference Proceedings}, volume = {136}, pages = {231--254}, publisher = {Kluwer}, year = {1998}, timestamp = {Thu, 22 Aug 2002 09:35:37 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/CuppensS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icail/CholvyCS97, author = {Laurence Cholvy and Fr{\'{e}}d{\'{e}}ric Cuppens and Claire Saurel}, editor = {John Zeleznikow and Daniel Hunter and Luther Karl Branting}, title = {Towards a Logical Formalization of Responsibility}, booktitle = {Proceedings of the Sixth International Conference on Artificial Intelligence and Law, {ICAIL} '97, Melbourne, Vicoria, Australia, June 30 - July 3, 1997}, pages = {233--242}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/261618.261658}, doi = {10.1145/261618.261658}, timestamp = {Tue, 06 Nov 2018 16:58:12 +0100}, biburl = {https://dblp.org/rec/conf/icail/CholvyCS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ismis/CuppensD97, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Robert Demolombe}, editor = {Zbigniew W. Ras and Andrzej Skowron}, title = {A Modal Logical Framework for Security Policies}, booktitle = {Foundations of Intelligent Systems, 10th International Symposium, {ISMIS} '97, Charlotte, North Carolina, USA, October 15-18, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1325}, pages = {579--589}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63614-5\_56}, doi = {10.1007/3-540-63614-5\_56}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/ismis/CuppensD97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CholvyC97, author = {Laurence Cholvy and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Analyzing Consistency of Security Policies}, booktitle = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, {USA}}, pages = {103--112}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/SECPRI.1997.601324}, doi = {10.1109/SECPRI.1997.601324}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/CholvyC97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bda/CuppensG96, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Alban Gabillon}, editor = {Patrick Bosc}, title = {Formalisation de la Confidentialit{\'{e}} dans une Base de Donn{\'{e}}es {\`{a}} Objets}, booktitle = {12{\`{e}}mes Journ{\'{e}}es Bases de Donn{\'{e}}es Avanc{\'{e}}es, 27-30 Ao{\^{u}}t 1996, Cassis, France (Informal Proceedings)}, pages = {417}, publisher = {{INRIA}}, year = {1996}, timestamp = {Fri, 22 Jun 2018 07:11:37 +0200}, biburl = {https://dblp.org/rec/conf/bda/CuppensG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CuppensS96, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Claire Saurel}, title = {Specifying a security policy: a case study}, booktitle = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland}, pages = {123}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/CSFW.1996.503697}, doi = {10.1109/CSFW.1996.503697}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/CuppensS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CuppensG96, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Alban Gabillon}, editor = {Pierangela Samarati and Ravi S. Sandhu}, title = {A Logical Approach to Model a Multilevel Object-Oriented Database}, booktitle = {Database Security Volume X, Status and Prospects, {IFIP} {TC11} / {WG11.3} Tenth International Conference on Database Security, 22-24 July 1996, Como, Italy}, series = {{IFIP} Conference Proceedings}, volume = {79}, pages = {145--166}, publisher = {Chapman {\&} Hall}, year = {1996}, timestamp = {Thu, 24 Oct 2002 16:14:24 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/CuppensG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/deon/CuppensD96, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Robert Demolombe}, editor = {Mark A. Brown and Jos{\'{e}} Carmo}, title = {A Deontic Logic for Reasoning about Confidentiality}, booktitle = {Deontic Logic, Agency and Normative Systems, {DEON} '96: Third International Workshop on Deontic Logic in Computer Science, Sesimbra, Portugal, 11-13 January 1996}, series = {Workshops in Computing}, pages = {66--79}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/978-1-4471-1488-8\_4}, doi = {10.1007/978-1-4471-1488-8\_4}, timestamp = {Mon, 24 Jun 2019 15:47:45 +0200}, biburl = {https://dblp.org/rec/conf/deon/CuppensD96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vldb/Cuppens96, author = {Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {T. M. Vijayaraman and Alejandro P. Buchmann and C. Mohan and Nandlal L. Sarda}, title = {Querying a Multilevel Database: {A} Logical Analysis}, booktitle = {VLDB'96, Proceedings of 22th International Conference on Very Large Data Bases, September 3-6, 1996, Mumbai (Bombay), India}, pages = {484--494}, publisher = {Morgan Kaufmann}, year = {1996}, url = {http://www.vldb.org/conf/1996/P484.PDF}, timestamp = {Wed, 29 Mar 2017 16:45:22 +0200}, biburl = {https://dblp.org/rec/conf/vldb/Cuppens96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CuppensG95, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Alban Gabillon}, editor = {David L. Spooner and Steven A. Demurjian and John E. Dobson}, title = {Modelling a Multilevel Database with Temporal Downgrading Functionalities}, booktitle = {Database Security {IX:} Status and Prospects, Proceedings of the Ninth Annual {IFIP} {WG11} Working Conference on Database Security, Rensselaerville, New York, USA, 13-16 August 1995}, series = {{IFIP} Conference Proceedings}, volume = {51}, pages = {145--164}, publisher = {Chapman {\&} Hall}, year = {1995}, timestamp = {Thu, 24 Oct 2002 16:18:58 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/CuppensG95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icail/CholvyC95, author = {Laurence Cholvy and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {L. Thorne McCarty}, title = {Solving Normative Conflicts by Merging Roles}, booktitle = {Proceedings of the Fifth International Conference on Artificial Intelligence and Law, {ICAIL} '95, College Park, Maryland, USA, May 21-24, 1995}, pages = {201--209}, publisher = {{ACM}}, year = {1995}, url = {https://doi.org/10.1145/222092.222241}, doi = {10.1145/222092.222241}, timestamp = {Tue, 06 Nov 2018 16:58:12 +0100}, biburl = {https://dblp.org/rec/conf/icail/CholvyC95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CholvyC94, author = {Laurence Cholvy and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Joachim Biskup and Matthew Morgenstern and Carl E. Landwehr}, title = {Providing Consistent Views in a Polyinstantiated Database}, booktitle = {Database Security, {VIII:} Status and Prospects, Proceedings of the {IFIP} {WG11.3} Working Conference on Database Security, Bad Salzdetfurth, Germany, 23-26 August, 1994}, series = {{IFIP} Transactions}, volume = {{A-60}}, pages = {277--296}, publisher = {North-Holland}, year = {1994}, timestamp = {Thu, 03 Jan 2002 11:56:17 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/CholvyC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Boulahia-CuppensCGY94, author = {Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Alban Gabillon and Kioumars Yazdanian}, editor = {Dieter Gollmann}, title = {Decomposition of Multilevel Objects in an Object-Oriented Database}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {875}, pages = {375--402}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58618-0\_75}, doi = {10.1007/3-540-58618-0\_75}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Boulahia-CuppensCGY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CuppensT94, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Gilles Trouessin}, editor = {Dieter Gollmann}, title = {Information Flow Controls vs Interference Controls: An Integrated Approach}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {875}, pages = {447--468}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58618-0\_78}, doi = {10.1007/3-540-58618-0\_78}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CuppensT94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Boulahia-CuppensC94, author = {Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Asynchronous composition and required security conditions}, booktitle = {1994 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 16-18, 1994}, pages = {68--78}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/RISP.1994.296591}, doi = {10.1109/RISP.1994.296591}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/Boulahia-CuppensC94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Boulahia-Cuppens93, author = {Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Alban Gabillon and Kioumars Yazdanian}, title = {MultiView model for object-oriented database}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {222--231}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315437}, doi = {10.1109/CSAC.1993.315437}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Boulahia-Cuppens93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Cuppens93, author = {Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {A Logical Formalization of Secrecy}, booktitle = {6th {IEEE} Computer Security Foundations Workshop - CSFW'93, Franconia, New Hampshire, USA, June 15-17, 1993, Proceedings}, pages = {53--62}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/CSFW.1993.246639}, doi = {10.1109/CSFW.1993.246639}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Cuppens93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/YazdanianC93, author = {Kioumars Yazdanian and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Neighborhood data and database security}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {150--154}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283829}, doi = {10.1145/283751.283829}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/nspw/YazdanianC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/oopsla/Boulahia-CuppensCGY93, author = {Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Alban Gabillon and Kioumars Yazdanian}, editor = {Bhavani Thuraisingham and Ravi S. Sandhu and T. C. Ting}, title = {Multilevel Security in Object-Oriented Databases}, booktitle = {Security for Object-Oriented Systems, Proceedings of the {OOPSLA-93} Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993}, series = {Workshops in Computing}, pages = {79--89}, publisher = {Springer}, year = {1993}, timestamp = {Wed, 29 Jun 2022 15:37:45 +0200}, biburl = {https://dblp.org/rec/conf/oopsla/Boulahia-CuppensCGY93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Cuppens93, author = {Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {A logical analysis of authorized and prohibited information flows}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {100--109}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287639}, doi = {10.1109/RISP.1993.287639}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/Cuppens93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BieberC92, author = {Pierre Bieber and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {A Logical View of Secure Dependencies}, journal = {J. Comput. Secur.}, volume = {1}, number = {1}, pages = {99--130}, year = {1992}, url = {https://doi.org/10.3233/JCS-1992-1105}, doi = {10.3233/JCS-1992-1105}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BieberC92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BieberC92, author = {Pierre Bieber and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Secure Dependencies with Dynamic Level Assignments}, booktitle = {5th {IEEE} Computer Security Foundations Workshop - CSFW'92, Franconia, New Hampshire, USA, June 16-18, 1992, Proceedings}, pages = {63--75}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/CSFW.1992.236787}, doi = {10.1109/CSFW.1992.236787}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BieberC92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CuppensY92, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Kioumars Yazdanian}, title = {A 'natural' decomposition of multi-level relations}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {273--284}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213254}, doi = {10.1109/RISP.1992.213254}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/CuppensY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/CuppensD91, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Robert Demolombe}, title = {Extending answers to neighbour entities in a cooperative answering context}, journal = {Decis. Support Syst.}, volume = {7}, number = {1}, pages = {1--11}, year = {1991}, url = {https://doi.org/10.1016/0167-9236(91)90073-K}, doi = {10.1016/0167-9236(91)90073-K}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/CuppensD91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BieberC91, author = {Pierre Bieber and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {A Definition of Secure Dependencies Using the Logic of Security}, booktitle = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings}, pages = {2--11}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/CSFW.1991.151563}, doi = {10.1109/CSFW.1991.151563}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/BieberC91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CuppensY91, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Kioumars Yazdanian}, editor = {Carl E. Landwehr and Sushil Jajodia}, title = {Logic Hints and Security in Relational Databases}, booktitle = {Database Security, {V:} Status and Prospects, Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991}, series = {{IFIP} Transactions}, volume = {{A-6}}, pages = {227--238}, publisher = {North-Holland}, year = {1991}, timestamp = {Fri, 15 Feb 2002 12:14:34 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/CuppensY91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Cuppens91, author = {Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Carl E. Landwehr and Sushil Jajodia}, title = {A Modal Logic Framework to Solve Aggregation Problems}, booktitle = {Database Security, {V:} Status and Prospects, Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991}, series = {{IFIP} Transactions}, volume = {{A-6}}, pages = {315--332}, publisher = {North-Holland}, year = {1991}, timestamp = {Fri, 15 Feb 2002 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/Cuppens91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Cuppens90, author = {Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {An Epistemic and Deontic Logic for Reasoning about Computer Security}, booktitle = {{ESORICS} 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France}, pages = {135--145}, publisher = {{AFCET}}, year = {1990}, timestamp = {Mon, 26 May 2008 15:32:38 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Cuppens90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/is/CuppensD89, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Robert Demolombe}, title = {How to recognize interesting topics to provide cooperative answering}, journal = {Inf. Syst.}, volume = {14}, number = {2}, pages = {163--173}, year = {1989}, url = {https://doi.org/10.1016/0306-4379(89)90044-6}, doi = {10.1016/0306-4379(89)90044-6}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/is/CuppensD89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bda/Cuppens89, author = {Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Un langage de requ{\^{e}}tes pour obtenir des r{\'{e}}sponses intelligentes}, booktitle = {Cinqui{\`{e}}mes Journ{\'{e}}es Bases de Donn{\'{e}}es Avanc{\'{e}}es, 26-28 Septembre 1989, Gen{\`{e}}ve, Suisse (Informal Proceedings)}, pages = {249}, publisher = {{INRIA}}, year = {1989}, timestamp = {Tue, 31 Oct 2006 14:02:09 +0100}, biburl = {https://dblp.org/rec/conf/bda/Cuppens89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bda/CuppensD88, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Robert Demolombe}, title = {Comment reconna{\^{\i}}tre les centres d'int{\'{e}}r{\^{e}}t pour fournir des r{\'{e}}ponses coop{\'{e}}ratives}, booktitle = {Quatri{\`{e}}mes Journ{\'{e}}es Bases de Donn{\'{e}}es Avanc{\'{e}}es, 17-20 Mai 1988, B{\'{e}}nodet, France {(2} Volumes) (Informal Proceedings)}, pages = {257--268}, publisher = {{INRIA}}, year = {1988}, timestamp = {Thu, 27 Sep 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bda/CuppensD88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eds/CuppensD88, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Robert Demolombe}, editor = {Larry Kerschberg}, title = {Cooperative Answering: {A} Methodology to Provide Intelligent Access to databases}, booktitle = {Expert Database Systems, Proceedings from the Second International Conference, Vienna, Virginia, USA, April 25-27, 1988}, pages = {621--643}, publisher = {Benjamin/Cummings}, year = {1988}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eds/CuppensD88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jcdkb/CuppensD88, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Robert Demolombe}, editor = {Catriel Beeri and Joachim W. Schmidt and Umeshwar Dayal}, title = {A Prolog-Relational {DBMS} Interface Using Delayed Evaluation}, booktitle = {Proceedings of the Third International Conference on Data and Knowledge Bases: Improving Usability and Responsiveness, June 28-30, 1988, Jerusalem, Israel}, pages = {135--148}, publisher = {Morgan Kaufmann}, year = {1988}, url = {https://doi.org/10.1016/b978-1-4832-1313-2.50018-4}, doi = {10.1016/B978-1-4832-1313-2.50018-4}, timestamp = {Mon, 05 Aug 2019 12:00:23 +0200}, biburl = {https://dblp.org/rec/conf/jcdkb/CuppensD88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.