BibTeX records: Frédéric Cuppens

download as .bib file

@proceedings{DBLP:conf/esorics/2023w1,
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Costas Lambrinoudakis and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Pantaleone Nespoli and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {Computer Security. {ESORICS} 2023 International Workshops - CyberICS,
                  DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29,
                  2023, Revised Selected Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14398},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54204-6},
  doi          = {10.1007/978-3-031-54204-6},
  isbn         = {978-3-031-54203-9},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2023w1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/WazanC23,
  author       = {Ahmad Samer Wazan and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Cybersecurity in networking: adaptations, investigation, attacks,
                  and countermeasures},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {78},
  number       = {3-4},
  pages        = {133--134},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12243-023-00956-9},
  doi          = {10.1007/S12243-023-00956-9},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/WazanC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/AimeurLYDC23,
  author       = {Esma A{\"{\i}}meur and
                  Maryline Laurent and
                  Reda Yaich and
                  Beno{\^{\i}}t Dupont and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Foreword of the special issue on {\guillemotleft} {FPS} 2021{\guillemotright}
                  symposium},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {78},
  number       = {7-8},
  pages        = {383},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12243-023-00988-1},
  doi          = {10.1007/S12243-023-00988-1},
  timestamp    = {Sun, 10 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/AimeurLYDC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CharpentierNBCY23,
  author       = {Axel Charpentier and
                  Christopher Neal and
                  Nora Boulahia{-}Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Reda Yaich},
  title        = {Real-Time Defensive Strategy Selection via Deep Reinforcement Learning},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {15:1--15:11},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3600176},
  doi          = {10.1145/3600160.3600176},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CharpentierNBCY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MerzoukCBY23,
  author       = {Mohamed Amine Merzouk and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Boulahia{-}Cuppens and
                  Reda Yaich},
  title        = {Parameterizing poisoning attacks in federated learning-based intrusion
                  detection},
  booktitle    = {Proceedings of the 18th International Conference on Availability,
                  Reliability and Security, {ARES} 2023, Benevento, Italy, 29 August
                  2023- 1 September 2023},
  pages        = {104:1--104:8},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3600160.3605090},
  doi          = {10.1145/3600160.3605090},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MerzoukCBY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/MiloudiSBCP23,
  author       = {Aicha Miloudi and
                  Luis Carlos Su{\'{a}}rez and
                  Nora Boulahia{-}Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Stere Preda},
  editor       = {Jianying Zhou and
                  Lejla Batina and
                  Zengpeng Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Daisuke Mashima and
                  Weizhi Meng and
                  Stjepan Picek and
                  Mohammad Ashiqur Rahman and
                  Jun Shao and
                  Masaki Shimaoka and
                  Ezekiel O. Soremekun and
                  Chunhua Su and
                  Je Sen Teh and
                  Aleksei Udovenko and
                  Cong Wang and
                  Leo Yu Zhang and
                  Yury Zhauniarovich},
  title        = {Trust Management Framework for Containerized Workloads Applications
                  to 5G Networks},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2023
                  Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13907},
  pages        = {378--393},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41181-6\_21},
  doi          = {10.1007/978-3-031-41181-6\_21},
  timestamp    = {Mon, 16 Oct 2023 19:47:08 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/MiloudiSBCP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crisis/2022,
  editor       = {Slim Kallel and
                  Mohamed Jmaiel and
                  Mohammad Zulkernine and
                  Ahmed Hadj Kacem and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens},
  title        = {Risks and Security of Internet and Systems - 17th International Conference,
                  CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13857},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31108-6},
  doi          = {10.1007/978-3-031-31108-6},
  isbn         = {978-3-031-31107-9},
  timestamp    = {Tue, 23 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2022w,
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Jorge Maestre Vidal and
                  Marco Antonio Sotelo Monge and
                  Massimiliano Albanese and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla},
  title        = {Computer Security. {ESORICS} 2022 International Workshops - CyberICPS
                  2022, {SECPRE} 2022, {SPOSE} 2022, {CPS4CIP} 2022, CDT{\&}SECOMANE
                  2022, {EIS} 2022, and SecAssure 2022, Copenhagen, Denmark, September
                  26-30, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13785},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-25460-4},
  doi          = {10.1007/978-3-031-25460-4},
  isbn         = {978-3-031-25459-8},
  timestamp    = {Tue, 21 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2022w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/MerzoukCBY22,
  author       = {Mohamed Amine Merzouk and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Boulahia{-}Cuppens and
                  Reda Yaich},
  title        = {Investigating the practicality of adversarial evasion attacks on network
                  intrusion detection},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {77},
  number       = {11-12},
  pages        = {763--775},
  year         = {2022},
  url          = {https://doi.org/10.1007/s12243-022-00910-1},
  doi          = {10.1007/S12243-022-00910-1},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adt/MerzoukCBY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MerzoukDNCBY22,
  author       = {Mohamed Amine Merzouk and
                  Jos{\'{e}}phine Delas and
                  Christopher Neal and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Boulahia{-}Cuppens and
                  Reda Yaich},
  title        = {Evading Deep Reinforcement Learning-based Network Intrusion Detection
                  with Adversarial Attacks},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {31:1--31:6},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3539006},
  doi          = {10.1145/3538969.3539006},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MerzoukDNCBY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CharpentierCCY22,
  author       = {Axel Charpentier and
                  Nora Boulahia{-}Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Reda Yaich},
  title        = {Deep Reinforcement Learning-Based Defense Strategy Selection},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {110:1--110:11},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3543789},
  doi          = {10.1145/3538969.3543789},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CharpentierCCY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/CrocheletNBC22,
  author       = {Pierre Crochelet and
                  Christopher Neal and
                  Nora Boulahia{-}Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Xingliang Yuan and
                  Guangdong Bai and
                  Cristina Alcaraz and
                  Suryadipta Majumdar},
  title        = {Attacker Attribution via Characteristics Inference Using Honeypot
                  Data},
  booktitle    = {Network and System Security - 16th International Conference, {NSS}
                  2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13787},
  pages        = {155--169},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23020-2\_9},
  doi          = {10.1007/978-3-031-23020-2\_9},
  timestamp    = {Thu, 08 Dec 2022 15:13:16 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/CrocheletNBC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crisis/2021,
  editor       = {Bo Luo and
                  Mohamed Mosbah and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Lotfi Ben Othmane and
                  Nora Cuppens and
                  Slim Kallel},
  title        = {Risks and Security of Internet and Systems - 16th International Conference,
                  CRiSIS 2021, Virtual Event, Ames, USA, November 12-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13204},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-02067-4},
  doi          = {10.1007/978-3-031-02067-4},
  isbn         = {978-3-031-02066-7},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-04016,
  author       = {K{\'{e}}ren Saint{-}Hilaire and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Ontology-based Attack Graph Enrichment},
  journal      = {CoRR},
  volume       = {abs/2202.04016},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.04016},
  eprinttype    = {arXiv},
  eprint       = {2202.04016},
  timestamp    = {Thu, 10 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-04016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BarbeauCCDG21,
  author       = {Michel Barbeau and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Romain Dagnas and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {46462--46475},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3066108},
  doi          = {10.1109/ACCESS.2021.3066108},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BarbeauCCDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/NavasCBTP21,
  author       = {Renzo E. Navas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Boulahia{-}Cuppens and
                  Laurent Toutain and
                  Georgios Z. Papadopoulos},
  title        = {Physical resilience to insider attacks in IoT networks: Independent
                  cryptographically secure sequences for {DSSS} anti-jamming},
  journal      = {Comput. Networks},
  volume       = {187},
  pages        = {107751},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2020.107751},
  doi          = {10.1016/J.COMNET.2020.107751},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/NavasCBTP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/NavasCBTP21,
  author       = {Renzo E. Navas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Boulahia{-}Cuppens and
                  Laurent Toutain and
                  Georgios Z. Papadopoulos},
  title        = {MTD, Where Art Thou? {A} Systematic Review of Moving Target Defense
                  Techniques for IoT},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {10},
  pages        = {7818--7832},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3040358},
  doi          = {10.1109/JIOT.2020.3040358},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/NavasCBTP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KallelCCKO21,
  author       = {Slim Kallel and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Boulahia{-}Cuppens and
                  Ahmed Hadj Kacem and
                  Lotfi Ben Othmane},
  title        = {Special issue on risk and security of smart systems},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {61},
  pages        = {102925},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102925},
  doi          = {10.1016/J.JISA.2021.102925},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KallelCCKO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isivc/AnselPCB21,
  author       = {Guillaume Ansel and
                  Dominique Pastor and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Boulahia{-}Cuppens},
  title        = {Asymptotic Random Distortion Testing and Application to Change-in-Mean
                  Detection},
  booktitle    = {10th International Symposium on Signal, Image, Video and Communications,
                  {ISIVC} 2021, Saint-Etienne, France, April 7-9, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISIVC49222.2021.9487550},
  doi          = {10.1109/ISIVC49222.2021.9487550},
  timestamp    = {Tue, 03 Aug 2021 16:22:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isivc/AnselPCB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BkakriaCC20,
  author       = {Anis Bkakria and
                  Nora Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Privacy-Preserving Pattern Matching on Encrypted Data},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  pages        = {191--220},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64834-3\_7},
  doi          = {10.1007/978-3-030-64834-3\_7},
  timestamp    = {Thu, 10 Dec 2020 10:09:50 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BkakriaCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BourgetCC20,
  author       = {Edwin Bourget and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Sokratis K. Katsikas and
                  Cristina Alcaraz},
  title        = {PROS2E, a Probabilistic Representation of Safety and Security Events
                  for Diagnosis},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Cyber-Physical System Security,
                  CPSS@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020},
  pages        = {30--41},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384941.3409590},
  doi          = {10.1145/3384941.3409590},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BourgetCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/MerzoukCBY20,
  author       = {Mohamed Amine Merzouk and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Boulahia{-}Cuppens and
                  Reda Yaich},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jean Leneutre and
                  Nora Cuppens and
                  Reda Yaich},
  title        = {A Deeper Analysis of Adversarial Examples in Intrusion Detection},
  booktitle    = {Risks and Security of Internet and Systems - 15th International Conference,
                  CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12528},
  pages        = {67--84},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68887-5\_4},
  doi          = {10.1007/978-3-030-68887-5\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/MerzoukCBY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/DernaikaCCR20,
  author       = {Farah Dernaika and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Olivier Raynaud},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jean Leneutre and
                  Nora Cuppens and
                  Reda Yaich},
  title        = {A Posteriori Analysis of Policy Temporal Compliance},
  booktitle    = {Risks and Security of Internet and Systems - 15th International Conference,
                  CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12528},
  pages        = {133--148},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68887-5\_8},
  doi          = {10.1007/978-3-030-68887-5\_8},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/DernaikaCCR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/SuarezECPBP20,
  author       = {Luis Carlos Su{\'{a}}rez and
                  David Espes and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Cao{-}Thanh Phan and
                  Philippe Bertin and
                  Philippe Le Parc},
  editor       = {Anoop Singhal and
                  Jaideep Vaidya},
  title        = {Managing Secure Inter-slice Communication in 5G Network Slice Chains},
  booktitle    = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12122},
  pages        = {24--41},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-49669-2\_2},
  doi          = {10.1007/978-3-030-49669-2\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/SuarezECPBP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/SmineECC20,
  author       = {Manel Smine and
                  David Espes and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Anoop Singhal and
                  Jaideep Vaidya},
  title        = {Network Functions Virtualization Access Control as a Service},
  booktitle    = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12122},
  pages        = {100--117},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-49669-2\_6},
  doi          = {10.1007/978-3-030-49669-2\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/SmineECC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/SmineECCP20,
  author       = {Manel Smine and
                  David Espes and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Marc{-}Oliver Pahl},
  editor       = {Gabriela Nicolescu and
                  Assia Tria and
                  Jos{\'{e}} M. Fernandez and
                  Jean{-}Yves Marion and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {A Priority-Based Domain Type Enforcement for Exception Management},
  booktitle    = {Foundations and Practice of Security - 13th International Symposium,
                  {FPS} 2020, Montreal, QC, Canada, December 1-3, 2020, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12637},
  pages        = {65--81},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70881-8\_5},
  doi          = {10.1007/978-3-030-70881-8\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/SmineECCP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/NavasSCCTP20,
  author       = {Renzo E. Navas and
                  H{\aa}kon Sandaker and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Laurent Toutain and
                  Georgios Z. Papadopoulos},
  title        = {{IANVS:} {A} Moving Target Defense Framework for a Resilient Internet
                  of Things},
  booktitle    = {{IEEE} Symposium on Computers and Communications, {ISCC} 2020, Rennes,
                  France, July 7-10, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISCC50000.2020.9219728},
  doi          = {10.1109/ISCC50000.2020.9219728},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/NavasSCCTP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nof/SuarezECBPP20,
  author       = {Luis Carlos Su{\'{a}}rez and
                  David Espes and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Philippe Bertin and
                  Cao{-}Thanh Phan and
                  Philippe Le Parc},
  editor       = {Prosper Chemouil and
                  Francine Krief and
                  Toufik Ahmed and
                  Tobias Ho{\ss}feld and
                  Stefano Secci and
                  Razvan Stanica},
  title        = {Formalization of a security access control model for the 5G system},
  booktitle    = {11th International Conference on Network of the Future, NoF 2020,
                  Bordeaux, France, October 12-14, 2020},
  pages        = {150--158},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/NoF50125.2020.9249137},
  doi          = {10.1109/NOF50125.2020.9249137},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nof/SuarezECBPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/quatic/DernaikaCCR20,
  author       = {Farah Dernaika and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Olivier Raynaud},
  editor       = {Martin J. Shepperd and
                  Fernando Brito e Abreu and
                  Alberto Rodrigues da Silva and
                  Ricardo P{\'{e}}rez{-}Castillo},
  title        = {Accountability in the {A} Posteriori Access Control: {A} Requirement
                  and a Mechanism},
  booktitle    = {Quality of Information and Communications Technology - 13th International
                  Conference, {QUATIC} 2020, Faro, Portugal, September 9-11, 2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1266},
  pages        = {332--342},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58793-2\_27},
  doi          = {10.1007/978-3-030-58793-2\_27},
  timestamp    = {Tue, 15 Sep 2020 17:11:57 +0200},
  biburl       = {https://dblp.org/rec/conf/quatic/DernaikaCCR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BarbeauCCDG20,
  author       = {Michel Barbeau and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Romain Dagnas and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {Metrics to Enhance the Resilience of Cyber-Physical Systems},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {1167--1172},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00156},
  doi          = {10.1109/TRUSTCOM50675.2020.00156},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BarbeauCCDG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crisis/2019,
  editor       = {Slim Kallel and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Ahmed Hadj Kacem},
  title        = {Risks and Security of Internet and Systems, 14th International Conference,
                  CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12026},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-41568-6},
  doi          = {10.1007/978-3-030-41568-6},
  isbn         = {978-3-030-41567-9},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2019cicps,
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Weizhi Meng and
                  Steven Furnell and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS,
                  SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27,
                  2019 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11980},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-42048-2},
  doi          = {10.1007/978-3-030-42048-2},
  isbn         = {978-3-030-42047-5},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2019cicps.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2020cicps,
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  Weizhi Meng and
                  Steven Furnell},
  title        = {Computer Security - {ESORICS} 2020 International Workshops, CyberICPS,
                  SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12501},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64330-0},
  doi          = {10.1007/978-3-030-64330-0},
  isbn         = {978-3-030-64329-4},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2020cicps.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BkakriaCC20,
  author       = {Anis Bkakria and
                  Nora Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Privacy-Preserving Pattern Matching on Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BkakriaCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CledelCC19,
  author       = {Thomas Cl{\'{e}}del and
                  Nora Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Managing the Overestimation of Resilience},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {35:1--35:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340333},
  doi          = {10.1145/3339252.3340333},
  timestamp    = {Sun, 11 Aug 2019 18:58:56 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CledelCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DernaikaCCR19,
  author       = {Farah Dernaika and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Olivier Raynaud},
  title        = {Semantic Mediation for {A} Posteriori Log Analysis},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {88:1--88:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340104},
  doi          = {10.1145/3339252.3340104},
  timestamp    = {Sun, 11 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DernaikaCCR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucnc/SuarezEPC19,
  author       = {Luis Carlos Su{\'{a}}rez and
                  David Espes and
                  Philippe Le Parc and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Defining a communication service management function for 5G network
                  slices},
  booktitle    = {European Conference on Networks and Communications, EuCNC 2019, Valencia,
                  Spain, June 18-21, 2019},
  pages        = {144--148},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuCNC.2019.8802010},
  doi          = {10.1109/EUCNC.2019.8802010},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eucnc/SuarezEPC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crisis/2018,
  editor       = {Akka Zemmari and
                  Mohamed Mosbah and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Risks and Security of Internet and Systems - 13th International Conference,
                  CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11391},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12143-3},
  doi          = {10.1007/978-3-030-12143-3},
  isbn         = {978-3-030-12142-6},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2018cicps,
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  John Mylopoulos and
                  Christos Kalloniatis},
  title        = {Computer Security - {ESORICS} 2018 International Workshops, CyberICPS
                  2018 and {SECPRE} 2018, Barcelona, Spain, September 6-7, 2018, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11387},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12786-2},
  doi          = {10.1007/978-3-030-12786-2},
  isbn         = {978-3-030-12785-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2018cicps.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-07283,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Misconfiguration Management of Network Security Components},
  journal      = {CoRR},
  volume       = {abs/1912.07283},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.07283},
  eprinttype    = {arXiv},
  eprint       = {1912.07283},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-07283.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AyedICC18,
  author       = {Samiha Ayed and
                  Muhammad Sabir Idrees and
                  Nora Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Achieving dynamicity in security policies enforcement using aspects},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {1},
  pages        = {83--103},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-016-0357-6},
  doi          = {10.1007/S10207-016-0357-6},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/AyedICC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MoatazRRSCC18,
  author       = {Tarik Moataz and
                  Indrajit Ray and
                  Indrakshi Ray and
                  Abdullatif Shikfa and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens},
  title        = {Substring search over encrypted data},
  journal      = {J. Comput. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {1--30},
  year         = {2018},
  url          = {https://doi.org/10.3233/JCS-14652},
  doi          = {10.3233/JCS-14652},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MoatazRRSCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhoc-now/NavasBCCP18,
  author       = {Renzo E. Navas and
                  H{\'{e}}l{\`{e}}ne Le Bouder and
                  Nora Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Georgios Z. Papadopoulos},
  editor       = {Nicolas Montavont and
                  Georgios Z. Papadopoulos},
  title        = {Demo: Do Not Trust Your Neighbors! {A} Small IoT Platform Illustrating
                  a Man-in-the-Middle Attack},
  booktitle    = {Ad-hoc, Mobile, and Wireless Networks - 17th International Conference
                  on Ad Hoc Networks and Wireless, {ADHOC-NOW} 2018, Saint-Malo, France,
                  September 5-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11104},
  pages        = {120--125},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00247-3\_11},
  doi          = {10.1007/978-3-030-00247-3\_11},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/adhoc-now/NavasBCCP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/CuppensC18,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Pierangela Samarati and
                  Indrajit Ray and
                  Indrakshi Ray},
  title        = {Stratification Based Model for Security Policy with Exceptions and
                  Contraries to Duty},
  booktitle    = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia
                  on the Occasion of His 70th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {11170},
  pages        = {78--103},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04834-1\_4},
  doi          = {10.1007/978-3-030-04834-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/CuppensC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/BayouECC18,
  author       = {Lyes Bayou and
                  David Espes and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Akka Zemmari and
                  Mohamed Mosbah and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {A Prediction-Based Method for False Data Injection Attacks Detection
                  in Industrial Control Systems},
  booktitle    = {Risks and Security of Internet and Systems - 13th International Conference,
                  CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11391},
  pages        = {35--40},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_3},
  doi          = {10.1007/978-3-030-12143-3\_3},
  timestamp    = {Tue, 11 Oct 2022 14:59:07 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/BayouECC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/KomeCCF18,
  author       = {Ivan Marco Lobe Kome and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Vincent Frey},
  editor       = {Akka Zemmari and
                  Mohamed Mosbah and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {A Certificate-Less Key Exchange Protocol for IoT},
  booktitle    = {Risks and Security of Internet and Systems - 13th International Conference,
                  CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11391},
  pages        = {65--79},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_6},
  doi          = {10.1007/978-3-030-12143-3\_6},
  timestamp    = {Fri, 25 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/KomeCCF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/SmineCC18,
  author       = {Manel Smine and
                  Nora Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Akka Zemmari and
                  Mohamed Mosbah and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Effectiveness and Impact Measurements of a Diversification Based Moving
                  Target Defense},
  booktitle    = {Risks and Security of Internet and Systems - 13th International Conference,
                  CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11391},
  pages        = {158--171},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_14},
  doi          = {10.1007/978-3-030-12143-3\_14},
  timestamp    = {Fri, 25 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/SmineCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/BkakriaTCCBF18,
  author       = {Anis Bkakria and
                  Aimilia Tasidou and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Fatma Bouattour and
                  Feten Ben Fredj},
  editor       = {Akka Zemmari and
                  Mohamed Mosbah and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Optimal Distribution of Privacy Budget in Differential Privacy},
  booktitle    = {Risks and Security of Internet and Systems - 13th International Conference,
                  CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11391},
  pages        = {222--236},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_18},
  doi          = {10.1007/978-3-030-12143-3\_18},
  timestamp    = {Fri, 25 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/BkakriaTCCBF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/CledelFCCKDLC18,
  author       = {Thomas Cl{\'{e}}del and
                  Simon N. Foley and
                  Nora Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yvon Kermarrec and
                  Fr{\'{e}}d{\'{e}}ric Dubois and
                  Youssef Laarouchi and
                  G{\'{e}}rard Le Comte},
  editor       = {Arcangelo Castiglione and
                  Florin Pop and
                  Massimo Ficco and
                  Francesco Palmieri},
  title        = {Towards the Evaluation of End-to-End Resilience Through External Consistency},
  booktitle    = {Cyberspace Safety and Security - 10th International Symposium, {CSS}
                  2018, Amalfi, Italy, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11161},
  pages        = {99--114},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01689-0\_8},
  doi          = {10.1007/978-3-030-01689-0\_8},
  timestamp    = {Wed, 06 Jan 2021 11:52:38 +0100},
  biburl       = {https://dblp.org/rec/conf/css/CledelFCCKDLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BourgetCCDFL18,
  author       = {Edwin Bourget and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Samuel Dubus and
                  Simon N. Foley and
                  Youssef Laarouchi},
  editor       = {Florian Kerschbaum and
                  Stefano Paraboschi},
  title        = {Probabilistic Event Graph to Model Safety and Security for Diagnosis
                  Purposes},
  booktitle    = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10980},
  pages        = {38--47},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-95729-6\_3},
  doi          = {10.1007/978-3-319-95729-6\_3},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BourgetCCDFL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/BkakriaCC18,
  author       = {Anis Bkakria and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {David Naccache and
                  Shouhuai Xu and
                  Sihan Qing and
                  Pierangela Samarati and
                  Gregory Blanc and
                  Rongxing Lu and
                  Zonghua Zhang and
                  Ahmed Meddahi},
  title        = {Linking Differential Identifiability with Differential Privacy},
  booktitle    = {Information and Communications Security - 20th International Conference,
                  {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11149},
  pages        = {232--247},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01950-1\_14},
  doi          = {10.1007/978-3-030-01950-1\_14},
  timestamp    = {Sat, 05 Sep 2020 18:01:07 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/BkakriaCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/JiGCC18,
  author       = {Xiaoshu Ji and
                  Gurvan Le Guernic and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {David Naccache and
                  Shouhuai Xu and
                  Sihan Qing and
                  Pierangela Samarati and
                  Gregory Blanc and
                  Rongxing Lu and
                  Zonghua Zhang and
                  Ahmed Meddahi},
  title        = {{USB} Packets Filtering Policies and an Associated Low-Cost Simulation
                  Framework},
  booktitle    = {Information and Communications Security - 20th International Conference,
                  {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11149},
  pages        = {732--742},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01950-1\_44},
  doi          = {10.1007/978-3-030-01950-1\_44},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/JiGCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotsms/KomeCCF18,
  author       = {Marco Lobe Kome and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Vincent Frey},
  title        = {CoAP Enhancement for a Better IoT Centric Protocol: CoAP 2.0},
  booktitle    = {2018 Fifth International Conference on Internet of Things: Systems,
                  Management and Security, IoTSMS 2018, Valencia, Spain, October 15-18,
                  2018},
  pages        = {139--146},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IoTSMS.2018.8554494},
  doi          = {10.1109/IOTSMS.2018.8554494},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iotsms/KomeCCF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/GraaKCCF18,
  author       = {Mariem Graa and
                  Ivan Marco Lobe Kome and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Vincent Frey},
  editor       = {Lech Jan Janczewski and
                  Miroslaw Kutylowski},
  title        = {Detection and Response to Data Exfiltration from Internet of Things
                  Android Devices},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 33rd {IFIP} {TC} 11
                  International Conference, {SEC} 2018, Held at the 24th {IFIP} World
                  Computer Congress, {WCC} 2018, Poznan, Poland, September 18-20, 2018,
                  Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {529},
  pages        = {339--354},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99828-2\_24},
  doi          = {10.1007/978-3-319-99828-2\_24},
  timestamp    = {Tue, 11 Sep 2018 09:39:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/GraaKCCF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crisis/2017,
  editor       = {Nora Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Jean{-}Louis Lanet and
                  Axel Legay and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Risks and Security of Internet and Systems - 12th International Conference,
                  CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10694},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76687-4},
  doi          = {10.1007/978-3-319-76687-4},
  isbn         = {978-3-319-76686-7},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2017cicps,
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS
                  2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10683},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-72817-9},
  doi          = {10.1007/978-3-319-72817-9},
  isbn         = {978-3-319-72816-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2017cicps.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/interiot/2017,
  editor       = {Giancarlo Fortino and
                  Carlos Enrique Palau and
                  Antonio Guerrieri and
                  Nora Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Hakima Chaouchi and
                  Alban Gabillon},
  title        = {Interoperability, Safety and Security in IoT - Third International
                  Conference, InterIoT 2017, and Fourth International Conference, SaSeIot
                  2017, Valencia, Spain, November 6-7, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {242},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93797-7},
  doi          = {10.1007/978-3-319-93797-7},
  isbn         = {978-3-319-93796-0},
  timestamp    = {Fri, 17 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/interiot/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/YaichCC17,
  author       = {Reda Yaich and
                  Nora Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Enabling Trust Assessment In Clouds-of-Clouds: {A} Similarity-Based
                  Approach},
  booktitle    = {Proceedings of the 12th International Conference on Availability,
                  Reliability and Security, Reggio Calabria, Italy, August 29 - September
                  01, 2017},
  pages        = {8:1--8:9},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098954.3098970},
  doi          = {10.1145/3098954.3098970},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/YaichCC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CuppensZLEPC17,
  author       = {Nora Cuppens and
                  Salaheddine Zerkane and
                  Yanhuang Li and
                  David Espes and
                  Philippe Le Parc and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Giovanni Livraga and
                  Sencun Zhu},
  title        = {Firewall Policies Provisioning Through {SDN} in the Cloud},
  booktitle    = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10359},
  pages        = {293--310},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61176-1\_16},
  doi          = {10.1007/978-3-319-61176-1\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/CuppensZLEPC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/BayouECC17,
  author       = {Lyes Bayou and
                  David Espes and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {wirelessOrBAC: Towards an access-control-based {IDS} for Wireless
                  Sensor Networks},
  booktitle    = {Proceedings of the 7th International Conference on Communication and
                  Network Security, {ICCNS} 2017, Tokyo, Japan, November 24-26, 2017},
  pages        = {96--103},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3163058.3163077},
  doi          = {10.1145/3163058.3163077},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccns/BayouECC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BkakriaGCCL17,
  author       = {Anis Bkakria and
                  Mariem Graa and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Jean{-}Louis Lanet},
  editor       = {Rudrapatna K. Shyamasundar and
                  Virendra Singh and
                  Jaideep Vaidya},
  title        = {Experimenting Similarity-Based Hijacking Attacks Detection and Response
                  in Android Systems},
  booktitle    = {Information Systems Security - 13th International Conference, {ICISS}
                  2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {127--145},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72598-7\_8},
  doi          = {10.1007/978-3-319-72598-7\_8},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/BkakriaGCCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KomeGCCF17,
  author       = {Marco Lobe Kome and
                  Mariem Graa and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Vincent Frey},
  editor       = {Rudrapatna K. Shyamasundar and
                  Virendra Singh and
                  Jaideep Vaidya},
  title        = {DIscovery and REgistration Protocol - For Device and Person Identity
                  Management in IoT},
  booktitle    = {Information Systems Security - 13th International Conference, {ICISS}
                  2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {243--262},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72598-7\_15},
  doi          = {10.1007/978-3-319-72598-7\_15},
  timestamp    = {Sat, 09 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/KomeGCCF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BayouECC17,
  author       = {Lyes Bayou and
                  David Espes and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Rudrapatna K. Shyamasundar and
                  Virendra Singh and
                  Jaideep Vaidya},
  title        = {wIDS: {A} Multilayer {IDS} for Wireless-Based {SCADA} Systems},
  booktitle    = {Information Systems Security - 13th International Conference, {ICISS}
                  2017, Mumbai, India, December 16-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10717},
  pages        = {387--404},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72598-7\_24},
  doi          = {10.1007/978-3-319-72598-7\_24},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/BayouECC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/BkakriaGCCL17,
  author       = {Anis Bkakria and
                  Mariem Graa and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Jean{-}Louis Lanet},
  title        = {Real-Time Detection and Reaction to Activity Hijacking Attacks in
                  Android Smartphones (Short Paper)},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {253--258},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00037},
  doi          = {10.1109/PST.2017.00037},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/BkakriaGCCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/GraaCCLM17,
  author       = {Mariem Graa and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Jean{-}Louis Lanet and
                  Routa Moussaileb},
  editor       = {Sabrina De Capitani di Vimercati and
                  Fabio Martinelli},
  title        = {Detection of Side Channel Attacks Based on Data Tainting in Android
                  Systems},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11
                  International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017,
                  Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {502},
  pages        = {205--218},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-58469-0\_14},
  doi          = {10.1007/978-3-319-58469-0\_14},
  timestamp    = {Wed, 17 May 2017 12:30:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/GraaCCLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crisis/2016,
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Jean{-}Louis Lanet and
                  Axel Legay},
  title        = {Risks and Security of Internet and Systems - 11th International Conference,
                  CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10158},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-54876-0},
  doi          = {10.1007/978-3-319-54876-0},
  isbn         = {978-3-319-54875-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2016cybericps,
  editor       = {Nora Cuppens{-}Boulahia and
                  Costas Lambrinoudakis and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sokratis K. Katsikas},
  title        = {Security of Industrial Control Systems and Cyber-Physical Systems
                  - Second International Workshop, CyberICPS 2016, Heraklion, Crete,
                  Greece, September 26-30, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10166},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61437-3},
  doi          = {10.1007/978-3-319-61437-3},
  isbn         = {978-3-319-61436-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2016cybericps.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fps/2016,
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Lingyu Wang and
                  Nora Cuppens{-}Boulahia and
                  Nadia Tawbi and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Foundations and Practice of Security - 9th International Symposium,
                  {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10128},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-51966-1},
  doi          = {10.1007/978-3-319-51966-1},
  isbn         = {978-3-319-51965-4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/www/TounsiCCP16,
  author       = {Wiem Tounsi and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Guy Pujolle},
  title        = {Access and privacy control enforcement in {RFID} middleware systems:
                  Proposal and implementation on the fosstrak platform},
  journal      = {World Wide Web},
  volume       = {19},
  number       = {1},
  pages        = {41--68},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11280-015-0325-5},
  doi          = {10.1007/S11280-015-0325-5},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/www/TounsiCCP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BayouCEC16,
  author       = {Lyes Bayou and
                  Nora Cuppens{-}Boulahia and
                  David Espes and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Towards a CDS-based Intrusion Detection Deployment Scheme for Securing
                  Industrial Wireless Sensor Networks},
  booktitle    = {11th International Conference on Availability, Reliability and Security,
                  {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016},
  pages        = {157--166},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ARES.2016.48},
  doi          = {10.1109/ARES.2016.48},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BayouCEC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/ZerkaneEPC16,
  author       = {Salaheddine Zerkane and
                  David Espes and
                  Philippe Le Parc and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Jean{-}Louis Lanet and
                  Axel Legay},
  title        = {A Proactive Stateful Firewall for Software Defined Networking},
  booktitle    = {Risks and Security of Internet and Systems - 11th International Conference,
                  CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10158},
  pages        = {123--138},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54876-0\_10},
  doi          = {10.1007/978-3-319-54876-0\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/ZerkaneEPC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/BouyahiaCCA16,
  author       = {Tarek Bouyahia and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Fabien Autrel},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Lingyu Wang and
                  Nora Cuppens{-}Boulahia and
                  Nadia Tawbi and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Multi-Criteria Recommender Approach for Supporting Intrusion Response
                  System},
  booktitle    = {Foundations and Practice of Security - 9th International Symposium,
                  {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10128},
  pages        = {51--67},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-51966-1\_4},
  doi          = {10.1007/978-3-319-51966-1\_4},
  timestamp    = {Sun, 02 Oct 2022 16:01:32 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/BouyahiaCCA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/ZerkaneEPC16,
  author       = {Salaheddine Zerkane and
                  David Espes and
                  Philippe Le Parc and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Lingyu Wang and
                  Nora Cuppens{-}Boulahia and
                  Nadia Tawbi and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Vulnerability Analysis of Software Defined Networking},
  booktitle    = {Foundations and Practice of Security - 9th International Symposium,
                  {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10128},
  pages        = {97--116},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-51966-1\_7},
  doi          = {10.1007/978-3-319-51966-1\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/ZerkaneEPC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/BayouECC16,
  author       = {Lyes Bayou and
                  David Espes and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Lingyu Wang and
                  Nora Cuppens{-}Boulahia and
                  Nadia Tawbi and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Security Analysis of WirelessHART Communication Scheme},
  booktitle    = {Foundations and Practice of Security - 9th International Symposium,
                  {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10128},
  pages        = {223--238},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-51966-1\_15},
  doi          = {10.1007/978-3-319-51966-1\_15},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/BayouECC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/EssaouiniCC16,
  author       = {Nada Essaouini and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Indrajit Ray and
                  Manoj Singh Gaur and
                  Mauro Conti and
                  Dheeraj Sanghi and
                  V. Kamakoti},
  title        = {Building a Fair System Using Access Rights},
  booktitle    = {Information Systems Security - 12th International Conference, {ICISS}
                  2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {89--108},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49806-5\_5},
  doi          = {10.1007/978-3-319-49806-5\_5},
  timestamp    = {Thu, 10 Sep 2020 09:33:08 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/EssaouiniCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/GraaCCL16,
  author       = {Mariem Graa and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Jean{-}Louis Lanet},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Tracking Explicit and Control Flows in Java and Native Android Apps
                  Code},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {307--316},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005686603070316},
  doi          = {10.5220/0005686603070316},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/GraaCCL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/EssaouiniOCC16,
  author       = {Nada Essaouini and
                  Said Oulmakhzoune and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Toward an off-line analysis of obligation with deadline policies},
  booktitle    = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016,
                  Auckland, New Zealand, December 12-14, 2016},
  pages        = {178--186},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/PST.2016.7906924},
  doi          = {10.1109/PST.2016.7906924},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/EssaouiniOCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/HachanaCC16,
  author       = {Safa{\`{a}} Hachana and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  title        = {Towards a new generation of industrial firewalls: Operational-process
                  aware filtering},
  booktitle    = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016,
                  Auckland, New Zealand, December 12-14, 2016},
  pages        = {615--622},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/PST.2016.7906996},
  doi          = {10.1109/PST.2016.7906996},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/HachanaCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LiCCCF16,
  author       = {Yanhuang Li and
                  Nora Cuppens{-}Boulahia and
                  Jean{-}Michel Crom and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Vincent Frey},
  editor       = {Jaap{-}Henk Hoepman and
                  Stefan Katzenbeisser},
  title        = {Expression and Enforcement of Security Policy for Virtual Resource
                  Allocation in IaaS Cloud},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11
                  International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June
                  1, 2016, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {471},
  pages        = {105--118},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-33630-5\_8},
  doi          = {10.1007/978-3-319-33630-5\_8},
  timestamp    = {Fri, 19 May 2017 01:25:11 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LiCCCF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ZerkaneEPC16,
  author       = {Salaheddine Zerkane and
                  David Espes and
                  Philippe Le Parc and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Jaap{-}Henk Hoepman and
                  Stefan Katzenbeisser},
  title        = {Software Defined Networking Reactive Stateful Firewall},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 31st {IFIP} {TC} 11
                  International Conference, {SEC} 2016, Ghent, Belgium, May 30 - June
                  1, 2016, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {471},
  pages        = {119--132},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-33630-5\_9},
  doi          = {10.1007/978-3-319-33630-5\_9},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ZerkaneEPC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2015cyberics,
  editor       = {Adrien B{\'{e}}cue and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sokratis K. Katsikas and
                  Costas Lambrinoudakis},
  title        = {Security of Industrial Control Systems and Cyber Physical Systems
                  - First Workshop, CyberICS 2015 and First Workshop, {WOS-CPS} 2015,
                  Vienna, Austria, September 21-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9588},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40385-4},
  doi          = {10.1007/978-3-319-40385-4},
  isbn         = {978-3-319-40384-7},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2015cyberics.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/AzkiaCCCO15,
  author       = {Hanieh Azkia and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Gouenou Coatrieux and
                  Said Oulmakhzoune},
  title        = {Deployment of a posteriori access control using {IHE} {ATNA}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {5},
  pages        = {471--483},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0265-6},
  doi          = {10.1007/S10207-014-0265-6},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/AzkiaCCCO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HachanaCC15,
  author       = {Safa{\`{a}} Hachana and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Mining a high level access control policy in a network with multiple
                  firewalls},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {20},
  pages        = {61--73},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jisa.2014.10.010},
  doi          = {10.1016/J.JISA.2014.10.010},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HachanaCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/BouyahiaACC15,
  author       = {Tarek Bouyahia and
                  Fabien Autrel and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Costas Lambrinoudakis and
                  Alban Gabillon},
  title        = {Context Aware Intrusion Response Based on Argumentation Logic},
  booktitle    = {Risks and Security of Internet and Systems - 10th International Conference,
                  CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9572},
  pages        = {91--106},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31811-0\_6},
  doi          = {10.1007/978-3-319-31811-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/BouyahiaACC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/BayouECC15,
  author       = {Lyes Bayou and
                  David Espes and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Costas Lambrinoudakis and
                  Alban Gabillon},
  title        = {Security Issue of WirelessHART Based {SCADA} Systems},
  booktitle    = {Risks and Security of Internet and Systems - 10th International Conference,
                  CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9572},
  pages        = {225--241},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31811-0\_14},
  doi          = {10.1007/978-3-319-31811-0\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/BayouECC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LazrigMRROKCC15,
  author       = {Ibrahim Lazrig and
                  Tarik Moataz and
                  Indrajit Ray and
                  Indrakshi Ray and
                  Toan Ong and
                  Michael G. Kahn and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Pierangela Samarati},
  title        = {Privacy Preserving Record Matching Using Automated Semi-trusted Broker},
  booktitle    = {Data and Applications Security and Privacy {XXIX} - 29th Annual {IFIP}
                  {WG} 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15,
                  2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9149},
  pages        = {103--118},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20810-7\_7},
  doi          = {10.1007/978-3-319-20810-7\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/LazrigMRROKCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BayouECC15,
  author       = {Lyes Bayou and
                  David Espes and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Adrien B{\'{e}}cue and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sokratis K. Katsikas and
                  Costas Lambrinoudakis},
  title        = {WirelessHART NetSIM: {A} WirelessHART SCADA-Based Wireless Sensor
                  Networks Simulator},
  booktitle    = {Security of Industrial Control Systems and Cyber Physical Systems
                  - First Workshop, CyberICS 2015 and First Workshop, {WOS-CPS} 2015,
                  Vienna, Austria, September 21-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9588},
  pages        = {63--78},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-40385-4\_5},
  doi          = {10.1007/978-3-319-40385-4\_5},
  timestamp    = {Mon, 03 Jan 2022 22:15:09 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BayouECC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SamarjiCCPKD15,
  author       = {L{\'{e}}a El Samarji and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Serge Papillon and
                  Wa{\"{e}}l Kanoun and
                  Samuel Dubus},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {On the Fly Design and Co-simulation of Responses Against Simultaneous
                  Attacks},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9327},
  pages        = {642--661},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24177-7\_32},
  doi          = {10.1007/978-3-319-24177-7\_32},
  timestamp    = {Sat, 19 Oct 2019 20:00:24 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SamarjiCCPKD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/BkakriaCCG15,
  author       = {Anis Bkakria and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  David Gross{-}Amblard},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Evangelos Kranakis and
                  Guillaume Bonfante},
  title        = {Security Mechanisms Planning to Enforce Security Policies},
  booktitle    = {Foundations and Practice of Security - 8th International Symposium,
                  {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9482},
  pages        = {85--101},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30303-1\_6},
  doi          = {10.1007/978-3-319-30303-1\_6},
  timestamp    = {Fri, 27 Dec 2019 21:23:06 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/BkakriaCCG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LiCCCFJ15,
  author       = {Yanhuang Li and
                  Nora Cuppens{-}Boulahia and
                  Jean{-}Michel Crom and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Vincent Frey and
                  Xiaoshu Ji},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Similarity Measure for Security Policies in Service Provider Selection},
  booktitle    = {Information Systems Security - 11th International Conference, {ICISS}
                  2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {227--242},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26961-0\_14},
  doi          = {10.1007/978-3-319-26961-0\_14},
  timestamp    = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/LiCCCFJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mie/Franco-Contreras15,
  author       = {Javier Franco{-}Contreras and
                  Gouenou Coatrieux and
                  Philippe Massari and
                  St{\'{e}}fan Jacques Darmoni and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Christian Roux},
  editor       = {Ronald Cornet and
                  Lacramioara Stoicu{-}Tivadar and
                  Alexander H{\"{o}}rbst and
                  Carlos Luis Parra Calder{\'{o}}n and
                  Stig Kj{\ae}r Andersen and
                  Mira Hercigonja{-}Szekeres},
  title        = {Data Quality Evaluation in Medical Database Watermarking},
  booktitle    = {Digital Healthcare Empowering Europeans - Proceedings of MIE2015,
                  Madrid Spain, 27-29 May, 2015},
  series       = {Studies in Health Technology and Informatics},
  volume       = {210},
  pages        = {276--280},
  publisher    = {{IOS} Press},
  year         = {2015},
  url          = {https://doi.org/10.3233/978-1-61499-512-8-276},
  doi          = {10.3233/978-1-61499-512-8-276},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mie/Franco-Contreras15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/notere/AyedICC15,
  author       = {Samiha Ayed and
                  Muhammad Sabir Idrees and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Dynamic deployment of access and usage control policies using aspects},
  booktitle    = {International Conference on Protocol Engineering, {ICPE} 2015, and
                  International Conference on New Technologies of Distributed Systems,
                  {NTDS} 2015 {[CFIP} (Colloque francophone sur l'ing{\'{e}}nierie
                  des protocoles) / {NOTERE} (Nouvelles Technologies de la R{\'{e}}partition)],
                  Paris, France, July 22-24, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/NOTERE.2015.7293500},
  doi          = {10.1109/NOTERE.2015.7293500},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/notere/AyedICC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PerezGCCC15,
  author       = {Salvador Mart{\'{\i}}nez Perez and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Jordi Cabot},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Model-Driven Integration and Analysis of Access-control Policies in
                  Multi-layer Information Systems},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {218--233},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_15},
  doi          = {10.1007/978-3-319-18467-8\_15},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/PerezGCCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/IdreesACC15,
  author       = {Muhammad Sabir Idrees and
                  Samiha Ayed and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Dynamic Security Policies Enforcement and Adaptation Using Aspects},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {1374--1379},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.533},
  doi          = {10.1109/TRUSTCOM.2015.533},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/IdreesACC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fps/2014,
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood and
                  Philip W. L. Fong},
  title        = {Foundations and Practice of Security - 7th International Symposium,
                  {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8930},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17040-4},
  doi          = {10.1007/978-3-319-17040-4},
  isbn         = {978-3-319-17039-8},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/OulmakhzouneCCMBB14,
  author       = {Said Oulmakhzoune and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Stephane Morucci and
                  Mahmoud Barhamgi and
                  Djamal Benslimane},
  title        = {Privacy query rewriting algorithm instrumented by a privacy-aware
                  access control model},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {69},
  number       = {1-2},
  pages        = {3--19},
  year         = {2014},
  url          = {https://doi.org/10.1007/s12243-013-0365-8},
  doi          = {10.1007/S12243-013-0365-8},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/OulmakhzouneCCMBB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/EssaouiniCCK14,
  author       = {Nada Essaouini and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Anas Abou El Kalam},
  title        = {Conflict detection in obligation with deadline policies},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2014},
  pages        = {13},
  year         = {2014},
  url          = {https://doi.org/10.1186/s13635-014-0013-5},
  doi          = {10.1186/S13635-014-0013-5},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/EssaouiniCCK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijkl/AzkiaCCC14,
  author       = {Hanieh Azkia and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Gouenou Coatrieux},
  title        = {Log content extraction engine based on ontology for the purpose of
                  a posteriori access control},
  journal      = {Int. J. Knowl. Learn.},
  volume       = {9},
  number       = {1/2},
  pages        = {23--42},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJKL.2014.067149},
  doi          = {10.1504/IJKL.2014.067149},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijkl/AzkiaCCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/TounsiCGCC14,
  author       = {Wiem Tounsi and
                  Nora Cuppens{-}Boulahia and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Yannick Chevalier and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {{KEDGEN2:} {A} key establishment and derivation protocol for {EPC}
                  Gen2 {RFID} systems},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {39},
  pages        = {152--166},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jnca.2013.06.002},
  doi          = {10.1016/J.JNCA.2013.06.002},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/TounsiCGCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/Franco-ContrerasCCCR14,
  author       = {Javier Franco{-}Contreras and
                  Gouenou Coatrieux and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Christian Roux},
  title        = {Robust Lossless Watermarking of Relational Databases Based on Circular
                  Histogram Modulation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {3},
  pages        = {397--410},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2013.2294240},
  doi          = {10.1109/TIFS.2013.2294240},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/Franco-ContrerasCCCR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BkakriaCCG14,
  author       = {Anis Bkakria and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  David Gross{-}Amblard},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Specification and Deployment of Integrated Security Policies for Outsourced
                  Data},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_2},
  doi          = {10.1007/978-3-662-43936-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BkakriaCCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MoatazJRCCR14,
  author       = {Tarik Moataz and
                  Benjamin Justus and
                  Indrakshi Ray and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Indrajit Ray},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Privacy-Preserving Multiple Keyword Search on Outsourced Data in the
                  Clouds},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {66--81},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_5},
  doi          = {10.1007/978-3-662-43936-4\_5},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MoatazJRCCR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MoatazCCRR14,
  author       = {Tarik Moataz and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Indrajit Ray and
                  Indrakshi Ray},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {{ELITE:} zEro Links Identity managemenT systEm},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {195--210},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_13},
  doi          = {10.1007/978-3-662-43936-4\_13},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MoatazCCRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/embc/Franco-Contreras14,
  author       = {Javier Franco{-}Contreras and
                  Gouenou Coatrieux and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Christian Roux},
  title        = {Ontology-guided distortion control for robust-lossless database watermarking:
                  Application to inpatient hospital stay records},
  booktitle    = {36th Annual International Conference of the {IEEE} Engineering in
                  Medicine and Biology Society, {EMBC} 2014, Chicago, IL, USA, August
                  26-30, 2014},
  pages        = {4491--4494},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/EMBC.2014.6944621},
  doi          = {10.1109/EMBC.2014.6944621},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/embc/Franco-Contreras14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BouyahiaICCA14,
  author       = {Tarek Bouyahia and
                  Muhammad Sabir Idrees and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Fabien Autrel},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Emil Lupu and
                  Joachim Posegga and
                  Alessandro Aldini and
                  Fabio Martinelli and
                  Neeraj Suri},
  title        = {Metric for Security Activities Assisted by Argumentative Logic},
  booktitle    = {Data Privacy Management, Autonomous Spontaneous Security, and Security
                  Assurance - 9th International Workshop, {DPM} 2014, 7th International
                  Workshop, {SETOP} 2014, and 3rd International Workshop, {QASA} 2014,
                  Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8872},
  pages        = {183--197},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17016-9\_12},
  doi          = {10.1007/978-3-319-17016-9\_12},
  timestamp    = {Sun, 25 Oct 2020 22:34:57 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BouyahiaICCA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/GraaCCC14,
  author       = {Mariem Graa and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Ana R. Cavalli},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood and
                  Philip W. L. Fong},
  title        = {Detection of Illegal Control Flow in Android System: Protecting Private
                  Data Used by Smartphone Apps},
  booktitle    = {Foundations and Practice of Security - 7th International Symposium,
                  {FPS} 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8930},
  pages        = {337--346},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-17040-4\_22},
  doi          = {10.1007/978-3-319-17040-4\_22},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/GraaCCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/inforsid/GraaCCC14,
  author       = {Mariem Graa and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Ana R. Cavalli},
  title        = {D{\'{e}}tection de flux de contr{\^{o}}le ill{\'{e}}gaux
                  dans les Smartphones},
  booktitle    = {Actes du XXXII{\`{e}}me Congr{\`{e}}s INFORSID, Lyon, France, 20-23
                  Mai 2014},
  pages        = {27--43},
  year         = {2014},
  url          = {http://inforsid.fr/actes/2014/2\_paper\_56.pdf},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/inforsid/GraaCCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/Franco-Contreras14,
  author       = {Javier Franco{-}Contreras and
                  Gouenou Coatrieux and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Christian Roux},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Ching{-}Nung Yang},
  title        = {Adapted Quantization Index Modulation for Database Watermarking},
  booktitle    = {Digital-Forensics and Watermarking - 13th International Workshop,
                  {IWDW} 2014, Taipei, Taiwan, October 1-4, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9023},
  pages        = {120--134},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-19321-2\_9},
  doi          = {10.1007/978-3-319-19321-2\_9},
  timestamp    = {Thu, 28 May 2020 12:51:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/Franco-Contreras14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/EssaouiniCCK14,
  author       = {Nada Essaouini and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Anas Abou El Kalam},
  editor       = {Ali Miri and
                  Urs Hengartner and
                  Nen{-}Fu Huang and
                  Audun J{\o}sang and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Specifying and enforcing constraints in dynamic access control policies},
  booktitle    = {2014 Twelfth Annual International Conference on Privacy, Security
                  and Trust, Toronto, ON, Canada, July 23-24, 2014},
  pages        = {290--297},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PST.2014.6890951},
  doi          = {10.1109/PST.2014.6890951},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/EssaouiniCCK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/SchaadBKCCG14,
  author       = {Andreas Schaad and
                  Anis Bkakria and
                  Florian Kerschbaum and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  David Gross{-}Amblard},
  editor       = {Sylvia L. Osborn and
                  Mahesh V. Tripunitara and
                  Ian M. Molloy},
  title        = {Optimized and controlled provisioning of encrypted outsourced data},
  booktitle    = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '14, London, ON, Canada - June 25 - 27, 2014},
  pages        = {141--152},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2613087.2613100},
  doi          = {10.1145/2613087.2613100},
  timestamp    = {Wed, 02 Jun 2021 09:13:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/SchaadBKCCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/SamarjiCCPKD14,
  author       = {L{\'{e}}a El Samarji and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Serge Papillon and
                  Wael Kanoun and
                  Samuel Dubus},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {Coordination and Concurrency Aware Likelihood Assessment of Simultaneous
                  Attacks},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {152},
  pages        = {524--529},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23829-6\_37},
  doi          = {10.1007/978-3-319-23829-6\_37},
  timestamp    = {Tue, 23 May 2017 01:12:12 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/SamarjiCCPKD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/TounsiJCCA14,
  author       = {Wiem Tounsi and
                  Benjamin Justus and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {113--120},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.29},
  doi          = {10.1109/SERE-C.2014.29},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/TounsiJCCA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/GraaCCC14,
  author       = {Mariem Graa and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Ana R. Cavalli},
  title        = {Protection against Code Obfuscation Attacks Based on Control Dependencies
                  in Android Systems},
  booktitle    = {{IEEE} Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, CA, USA, June 30 - July 2, 2014 - Companion
                  Volume},
  pages        = {149--157},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE-C.2014.33},
  doi          = {10.1109/SERE-C.2014.33},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/GraaCCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiCCCF14,
  author       = {Yanhuang Li and
                  Nora Cuppens{-}Boulahia and
                  Jean{-}Michel Crom and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Vincent Frey},
  title        = {Reaching Agreement in Security Policy Negotiation},
  booktitle    = {13th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2014, Beijing, China, September
                  24-26, 2014},
  pages        = {98--105},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/TrustCom.2014.17},
  doi          = {10.1109/TRUSTCOM.2014.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiCCCF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/IdreesACC14,
  author       = {Muhammad Sabir Idrees and
                  Samiha Ayed and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Car2X Communication - Putting Security Negotiation into Practice},
  booktitle    = {{IEEE} 80th Vehicular Technology Conference, {VTC} Fall 2014, Vancouver,
                  BC, Canada, September 14-17, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/VTCFall.2014.6965896},
  doi          = {10.1109/VTCFALL.2014.6965896},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/IdreesACC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2014,
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5},
  doi          = {10.1007/978-3-642-55415-5},
  isbn         = {978-3-642-55414-8},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CuppensG14,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Alban Gabillon},
  title        = {Cover Story Management},
  journal      = {CoRR},
  volume       = {abs/1405.5628},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.5628},
  eprinttype    = {arXiv},
  eprint       = {1405.5628},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CuppensG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/PapagiannakopoulouKLGKVCC13,
  author       = {Eugenia I. Papagiannakopoulou and
                  Maria N. Koukovini and
                  Georgios V. Lioudakis and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Dimitra I. Kaklamani and
                  Iakovos S. Venieris and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  title        = {A privacy-aware access control model for distributed network monitoring},
  journal      = {Comput. Electr. Eng.},
  volume       = {39},
  number       = {7},
  pages        = {2263--2281},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.compeleceng.2012.08.003},
  doi          = {10.1016/J.COMPELECENG.2012.08.003},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/PapagiannakopoulouKLGKVCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Garcia-AlfaroCCPC13,
  author       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Salvador Mart{\'{\i}}nez Perez and
                  Jordi Cabot},
  title        = {Management of stateful firewall misconfiguration},
  journal      = {Comput. Secur.},
  volume       = {39},
  pages        = {64--85},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.01.004},
  doi          = {10.1016/J.COSE.2013.01.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Garcia-AlfaroCCPC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HachanaCCG13,
  author       = {Safa{\`{a}} Hachana and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Semantic analysis of role mining results and shadowed roles detection},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {4},
  pages        = {131--147},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2013.03.001},
  doi          = {10.1016/J.ISTR.2013.03.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HachanaCCG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CuppensCDSGT13,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Ernesto Damiani and
                  Radu State and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nadia Tawbi},
  title        = {Editorial},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {1},
  pages        = {1},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.08.004},
  doi          = {10.1016/J.JISA.2013.08.004},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CuppensCDSGT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CuppensCBME13,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Meriam Ben{-}Ghorbel{-}Talbi and
                  Stephane Morucci and
                  Nada Essaouini},
  title        = {Smatch: Formal dynamic session management model for {RBAC}},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {18},
  number       = {1},
  pages        = {30--44},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jisa.2013.07.001},
  doi          = {10.1016/J.JISA.2013.07.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/CuppensCBME13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CuppensCE13,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Yehia Elrakaiby},
  title        = {Formal specification and management of security policies with collective
                  group obligations},
  journal      = {J. Comput. Secur.},
  volume       = {21},
  number       = {1},
  pages        = {149--190},
  year         = {2013},
  url          = {https://doi.org/10.3233/JCS-2012-0459},
  doi          = {10.3233/JCS-2012-0459},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/CuppensCE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BkakriaCCFG13,
  author       = {Anis Bkakria and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Jos{\'{e}} M. Fernandez and
                  David Gross{-}Amblard},
  title        = {Preserving Multi-relational Outsourced Databases Confidentiality using
                  Fragmentation and Encryption},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {39--62},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.039},
  doi          = {10.22667/JOWUA.2013.06.31.039},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BkakriaCCFG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmod/BenslimaneBCMDN13,
  author       = {Djamal Benslimane and
                  Mahmoud Barhamgi and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Franck Morvan and
                  Bruno Defude and
                  Ebrahim Nageba and
                  Fran{\c{c}}ois Paulus and
                  Stephane Morucci and
                  Michael Mrissa and
                  Nora Cuppens{-}Boulahia and
                  Chirine Ghedira and
                  Riad Mokadem and
                  Said Oulmakhzoune and
                  Jocelyne Fayn},
  title        = {{PAIRSE:} a privacy-preserving service-oriented data integration system},
  journal      = {{SIGMOD} Rec.},
  volume       = {42},
  number       = {3},
  pages        = {42--47},
  year         = {2013},
  url          = {https://doi.org/10.1145/2536669.2536677},
  doi          = {10.1145/2536669.2536677},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigmod/BenslimaneBCMDN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CoatrieuxPCCR13,
  author       = {Gouenou Coatrieux and
                  Wei Pan and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Christian Roux},
  title        = {Reversible Watermarking Based on Invariant Image Classification and
                  Dynamic Histogram Shifting},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {1},
  pages        = {111--120},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2012.2224108},
  doi          = {10.1109/TIFS.2012.2224108},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CoatrieuxPCCR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/EssaouiniCCK13,
  author       = {Nada Essaouini and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Anas Abou El Kalam},
  title        = {Conflict Management in Obligation with Deadline Policies},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {52--61},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.12},
  doi          = {10.1109/ARES.2013.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/EssaouiniCCK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/BarhamgiBOCCMT13,
  author       = {Mahmoud Barhamgi and
                  Djamal Benslimane and
                  Said Oulmakhzoune and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Michael Mrissa and
                  Hajer Taktak},
  editor       = {Camille Salinesi and
                  Moira C. Norrie and
                  Oscar Pastor},
  title        = {Secure and Privacy-Preserving Execution Model for Data Services},
  booktitle    = {Advanced Information Systems Engineering - 25th International Conference,
                  CAiSE 2013, Valencia, Spain, June 17-21, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7908},
  pages        = {35--50},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38709-8\_3},
  doi          = {10.1007/978-3-642-38709-8\_3},
  timestamp    = {Mon, 18 Jan 2021 08:56:37 +0100},
  biburl       = {https://dblp.org/rec/conf/caise/BarhamgiBOCCMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/TounsiCCG13,
  author       = {Wiem Tounsi and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  editor       = {Bruno Crispo and
                  Ravi S. Sandhu and
                  Nora Cuppens{-}Boulahia and
                  Mauro Conti and
                  Jean{-}Louis Lanet},
  title        = {Privacy-enhanced filtering and collection middleware in EPCglobal
                  networks},
  booktitle    = {2013 International Conference on Risks and Security of Internet and
                  Systems (CRiSIS), La Rochelle, France, October 23-25, 2013},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CRiSIS.2013.6766358},
  doi          = {10.1109/CRISIS.2013.6766358},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/TounsiCCG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/SamarjiCCKD13,
  author       = {Layal Samarji and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Wael Kanoun and
                  Samuel Dubus},
  editor       = {Guojun Wang and
                  Indrakshi Ray and
                  Dengguo Feng and
                  Muttukrishnan Rajarajan},
  title        = {Situation Calculus and Graph Based Defensive Modeling of Simultaneous
                  Attacks},
  booktitle    = {Cyberspace Safety and Security - 5th International Symposium, {CSS}
                  2013, Zhangjiajie, China, November 13-15, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8300},
  pages        = {132--150},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03584-0\_11},
  doi          = {10.1007/978-3-319-03584-0\_11},
  timestamp    = {Fri, 05 Aug 2022 08:50:55 +0200},
  biburl       = {https://dblp.org/rec/conf/css/SamarjiCCKD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/JustusCCBCC13,
  author       = {Benjamin Justus and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Olivier Cipiere},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer
                  Size Standard for the Setbase},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {274--281},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_19},
  doi          = {10.1007/978-3-642-39256-6\_19},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/JustusCCBCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/PerezCCC13,
  author       = {Salvador Mart{\'{\i}}nez Perez and
                  Valerio Cosentino and
                  Jordi Cabot and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Hendrik Decker and
                  Lenka Lhotsk{\'{a}} and
                  Sebastian Link and
                  Josef Basl and
                  A Min Tjoa},
  title        = {Reverse Engineering of Database Security Policies},
  booktitle    = {Database and Expert Systems Applications - 24th International Conference,
                  {DEXA} 2013, Prague, Czech Republic, August 26-29, 2013. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8056},
  pages        = {442--449},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40173-2\_37},
  doi          = {10.1007/978-3-642-40173-2\_37},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/PerezCCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/BarhamgiBACC13,
  author       = {Mahmoud Barhamgi and
                  Djamal Benslimane and
                  Youssef Amghar and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Giovanna Guerrini and
                  Norman W. Paton},
  title        = {PrivComp: a privacy-aware data service composition system},
  booktitle    = {Joint 2013 {EDBT/ICDT} Conferences, {EDBT} '13 Proceedings, Genoa,
                  Italy, March 18-22, 2013},
  pages        = {757--760},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2452376.2452473},
  doi          = {10.1145/2452376.2452473},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edbt/BarhamgiBACC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/PapagiannakopoulouKLDGKVCC13,
  author       = {Eugenia I. Papagiannakopoulou and
                  Maria N. Koukovini and
                  Georgios V. Lioudakis and
                  Nikolaos L. Dellas and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Dimitra I. Kaklamani and
                  Iakovos S. Venieris and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Jean{-}Luc Danger and
                  Mourad Debbabi and
                  Jean{-}Yves Marion and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood},
  title        = {Leveraging Ontologies upon a Holistic Privacy-Aware Access Control
                  Model},
  booktitle    = {Foundations and Practice of Security - 6th International Symposium,
                  {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8352},
  pages        = {209--226},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05302-8\_13},
  doi          = {10.1007/978-3-319-05302-8\_13},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/PapagiannakopoulouKLDGKVCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HachanaCCAM13,
  author       = {Safa{\`{a}} Hachana and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Vijay Atluri and
                  Stephane Morucci},
  editor       = {Aditya Bagchi and
                  Indrakshi Ray},
  title        = {Policy Mining: {A} Bottom-Up Approach toward a Model Based Firewall
                  Management},
  booktitle    = {Information Systems Security - 9th International Conference, {ICISS}
                  2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {133--147},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45204-8\_10},
  doi          = {10.1007/978-3-642-45204-8\_10},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/HachanaCCAM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict/MoatazSCC13,
  author       = {Tarik Moataz and
                  Abdullatif Shikfa and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Semantic search over encrypted data},
  booktitle    = {20st International Conference on Telecommunications, {ICT} 2013, Casablanca,
                  Morocco, May 6-8, 2013},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICTEL.2013.6632121},
  doi          = {10.1109/ICTEL.2013.6632121},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ict/MoatazSCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/BkakriaCCF13,
  author       = {Anis Bkakria and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Jos{\'{e}} M. Fernandez},
  editor       = {Khabib Mustofa and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Edgar R. Weippl and
                  Ilsun You},
  title        = {Confidentiality-Preserving Query Execution of Fragmented Outsourced
                  Data},
  booktitle    = {Information and Communicatiaon Technology - International Conference,
                  ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7804},
  pages        = {426--440},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36818-9\_47},
  doi          = {10.1007/978-3-642-36818-9\_47},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/BkakriaCCF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwe/PerezGCCC13,
  author       = {Salvador Mart{\'{\i}}nez Perez and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Jordi Cabot},
  editor       = {Quan Z. Sheng and
                  Jesper Kjeldskov},
  title        = {Towards an Access-Control Metamodel for Web Content Management Systems},
  booktitle    = {Current Trends in Web Engineering - {ICWE} 2013 International Workshops
                  ComposableWeb, QWE, MDWE, DMSSW, EMotions, CSE, SSN, and PhD Symposium,
                  Aalborg, Denmark, July 8-12, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8295},
  pages        = {148--155},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04244-2\_14},
  doi          = {10.1007/978-3-319-04244-2\_14},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icwe/PerezGCCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip6-6/FourcotTKCC13,
  author       = {Florent Fourcot and
                  Laurent Toutain and
                  Stefan K{\"{o}}psell and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Thomas Bauschert},
  title        = {IPv6 Address Obfuscation by Intermediate Middlebox in Coordination
                  with Connected Devices},
  booktitle    = {Advances in Communication Networking - 19th {EUNICE/IFIP} {WG} 6.6
                  International Workshop, Chemnitz, Germany, August 28-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8115},
  pages        = {148--160},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40552-5\_14},
  doi          = {10.1007/978-3-642-40552-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip6-6/FourcotTKCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medes/TounsiCCG13,
  author       = {Wiem Tounsi and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  editor       = {Latif Ladid and
                  Antonio Montes and
                  Peter A. Bruck and
                  Fernando Ferri and
                  Richard Chbeir},
  title        = {Fine-grained privacy control for the {RFID} middleware of EPCglobal
                  networks},
  booktitle    = {Fifth International Conference on Management of Emergent Digital EcoSystems,
                  {MEDES} '13, Luxembourg, Luxembourg, October 29-31, 2013},
  pages        = {60--67},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2536146.2536154},
  doi          = {10.1145/2536146.2536154},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/medes/TounsiCCG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/PerezGCCC13,
  author       = {Salvador Mart{\'{\i}}nez Perez and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Jordi Cabot},
  editor       = {Ana Moreira and
                  Bernhard Sch{\"{a}}tz and
                  Jeff Gray and
                  Antonio Vallecillo and
                  Peter J. Clarke},
  title        = {Model-Driven Extraction and Analysis of Network Security Policies},
  booktitle    = {Model-Driven Engineering Languages and Systems - 16th International
                  Conference, {MODELS} 2013, Miami, FL, USA, September 29 - October
                  4, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8107},
  pages        = {52--68},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41533-3\_4},
  doi          = {10.1007/978-3-642-41533-3\_4},
  timestamp    = {Mon, 21 Jun 2021 12:26:18 +0200},
  biburl       = {https://dblp.org/rec/conf/models/PerezGCCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/JustusCCBCC13,
  author       = {Benjamin Justus and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Olivier Cipiere},
  editor       = {Jordi Castell{\`{a}}{-}Roca and
                  Josep Domingo{-}Ferrer and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Ali A. Ghorbani and
                  Christian Damsgaard Jensen and
                  Jes{\'{u}}s A. Manj{\'{o}}n and
                  Iosif{-}Viorel Onut and
                  Natalia Stakhanova and
                  Vicen{\c{c}} Torra and
                  Jie Zhang},
  title        = {Define privacy-preserving setbase drawer size standard: {A} {\unicode{8714}}-closeness
                  perspective},
  booktitle    = {Eleventh Annual International Conference on Privacy, Security and
                  Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain,
                  July 10-12, 2013},
  pages        = {362--365},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/PST.2013.6596090},
  doi          = {10.1109/PST.2013.6596090},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/JustusCCBCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sitis/GraaCCC13,
  author       = {Mariem Graa and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Ana R. Cavalli},
  editor       = {Kokou Y{\'{e}}tongnon and
                  Albert Dipanda and
                  Richard Chbeir},
  title        = {Formal Characterization of Illegal Control Flow in Android System},
  booktitle    = {Ninth International Conference on Signal-Image Technology {\&}
                  Internet-Based Systems, {SITIS} 2013, Kyoto, Japan, December 2-5,
                  2013},
  pages        = {293--300},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SITIS.2013.56},
  doi          = {10.1109/SITIS.2013.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sitis/GraaCCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sitis/AyedICCPF13,
  author       = {Samiha Ayed and
                  Muhammad Sabir Idrees and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  M{\'{o}}nica Pinto and
                  Lidia Fuentes},
  editor       = {Kokou Y{\'{e}}tongnon and
                  Albert Dipanda and
                  Richard Chbeir},
  title        = {Security Aspects: {A} Framework for Enforcement of Security Policies
                  Using {AOP}},
  booktitle    = {Ninth International Conference on Signal-Image Technology {\&}
                  Internet-Based Systems, {SITIS} 2013, Kyoto, Japan, December 2-5,
                  2013},
  pages        = {301--308},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SITIS.2013.57},
  doi          = {10.1109/SITIS.2013.57},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sitis/AyedICCPF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Franco-ContrerasCCCR13,
  author       = {Javier Franco{-}Contreras and
                  Gouenou Coatrieux and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Christian Roux},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {Authenticity Control of Relational Databases by Means of Lossless
                  Watermarking Based on Circular Histogram Modulation},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {207--222},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_14},
  doi          = {10.1007/978-3-642-41098-7\_14},
  timestamp    = {Wed, 25 Sep 2019 18:14:27 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/Franco-ContrerasCCCR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fps/2012,
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Ali Miri and
                  Nadia Tawbi},
  title        = {Foundations and Practice of Security - 5th International Symposium,
                  {FPS} 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7743},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-37119-6},
  doi          = {10.1007/978-3-642-37119-6},
  isbn         = {978-3-642-37118-9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bell/KanounDPCC12,
  author       = {Wael Kanoun and
                  Samuel Dubus and
                  Serge Papillon and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Towards Dynamic Risk Management: Success Likelihood of Ongoing Attacks},
  journal      = {Bell Labs Tech. J.},
  volume       = {17},
  number       = {3},
  pages        = {61--78},
  year         = {2012},
  url          = {https://doi.org/10.1002/bltj.21558},
  doi          = {10.1002/BLTJ.21558},
  timestamp    = {Thu, 27 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bell/KanounDPCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/ElrakaibyCC12,
  author       = {Yehia Elrakaiby and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  title        = {Formal enforcement and management of obligation policies},
  journal      = {Data Knowl. Eng.},
  volume       = {71},
  number       = {1},
  pages        = {127--147},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.datak.2011.09.001},
  doi          = {10.1016/J.DATAK.2011.09.001},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/ElrakaibyCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/HachanaCC12,
  author       = {Safa{\`{a}} Hachana and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Role Mining to Assist Authorization Governance: How Far Have We Gone?},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {3},
  number       = {4},
  pages        = {45--64},
  year         = {2012},
  url          = {https://doi.org/10.4018/jsse.2012100103},
  doi          = {10.4018/JSSE.2012100103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/HachanaCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HachanaCCG12,
  author       = {Safa{\`{a}} Hachana and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Towards Automated Assistance for Mined Roles Analysis in Role Mining
                  Applications},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {123--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.61},
  doi          = {10.1109/ARES.2012.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HachanaCCG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/OulmakhzouneCCM12,
  author       = {Said Oulmakhzoune and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Stephane Morucci},
  title        = {Privacy Policy Preferences Enforced by {SPARQL} Query Rewriting},
  booktitle    = {Seventh International Conference on Availability, Reliability and
                  Security, Prague, {ARES} 2012, Czech Republic, August 20-24, 2012},
  pages        = {335--342},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ARES.2012.86},
  doi          = {10.1109/ARES.2012.86},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/OulmakhzouneCCM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/GraaCCC12,
  author       = {Mariem Graa and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Ana R. Cavalli},
  editor       = {Yang Xiang and
                  Javier L{\'{o}}pez and
                  C.{-}C. Jay Kuo and
                  Wanlei Zhou},
  title        = {Detecting Control Flow in Smarphones: Combining Static and Dynamic
                  Analyses},
  booktitle    = {Cyberspace Safety and Security - 4th International Symposium, {CSS}
                  2012, Melbourne, Australia, December 12-13, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7672},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35362-8\_4},
  doi          = {10.1007/978-3-642-35362-8\_4},
  timestamp    = {Fri, 22 Apr 2022 17:07:03 +0200},
  biburl       = {https://dblp.org/rec/conf/css/GraaCCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasfaa/CuppensCV12,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Eduardo Pena Vi{\~{n}}a},
  editor       = {Hwanjo Yu and
                  Ge Yu and
                  Wynne Hsu and
                  Yang{-}Sae Moon and
                  Rainer Unland and
                  Jaesoo Yoo},
  title        = {Adaptive Access Control Enforcement in Social Network Using Aspect
                  Weaving},
  booktitle    = {Database Systems for Advanced Applications - 17th International Conference,
                  {DASFAA} 2012, International Workshops: FlashDB, ITEMS, SNSM, SIM3,
                  DQDI, Busan, South Korea, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7240},
  pages        = {154--167},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29023-7\_17},
  doi          = {10.1007/978-3-642-29023-7\_17},
  timestamp    = {Fri, 16 Dec 2022 07:42:33 +0100},
  biburl       = {https://dblp.org/rec/conf/dasfaa/CuppensCV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/embc/Franco-Contreras12,
  author       = {Javier Franco{-}Contreras and
                  Gouenou Coatrieux and
                  Emmanuel Chazard and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Christian Roux},
  title        = {Robust lossless watermarking based on circular interpretation of bijective
                  transformations for the protection of medical databases},
  booktitle    = {Annual International Conference of the {IEEE} Engineering in Medicine
                  and Biology Society, {EMBC} 2012, San Diego, CA, USA, August 28 -
                  September 1, 2012},
  pages        = {5875--5878},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/EMBC.2012.6347330},
  doi          = {10.1109/EMBC.2012.6347330},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/embc/Franco-Contreras12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Ben-Ghorbel-TalbiCCM12,
  author       = {Meriam Ben{-}Ghorbel{-}Talbi and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Stephane Morucci},
  editor       = {Roberto Di Pietro and
                  Javier Herranz and
                  Ernesto Damiani and
                  Radu State},
  title        = {Towards Session-Aware {RBAC} Delegation: Function Switch},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security, 7th International
                  Workshop, {DPM} 2012, and 5th International Workshop, {SETOP} 2012,
                  Pisa, Italy, September 13-14, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7731},
  pages        = {287--302},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35890-6\_21},
  doi          = {10.1007/978-3-642-35890-6\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Ben-Ghorbel-TalbiCCM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KanounSCDC12,
  author       = {Wael Kanoun and
                  Layal Samarji and
                  Nora Cuppens{-}Boulahia and
                  Samuel Dubus and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Roberto Di Pietro and
                  Javier Herranz and
                  Ernesto Damiani and
                  Radu State},
  title        = {Towards a Temporal Response Taxonomy},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security, 7th International
                  Workshop, {DPM} 2012, and 5th International Workshop, {SETOP} 2012,
                  Pisa, Italy, September 13-14, 2012. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7731},
  pages        = {318--331},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35890-6\_23},
  doi          = {10.1007/978-3-642-35890-6\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KanounSCDC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/AutrelCC12,
  author       = {Fabien Autrel and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Ali Miri and
                  Nadia Tawbi},
  title        = {Enabling Dynamic Security Policy in the Java Security Manager},
  booktitle    = {Foundations and Practice of Security - 5th International Symposium,
                  {FPS} 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7743},
  pages        = {180--193},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37119-6\_12},
  doi          = {10.1007/978-3-642-37119-6\_12},
  timestamp    = {Sun, 02 Oct 2022 16:01:32 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/AutrelCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/models/PerezCGCC12,
  author       = {Salvador Mart{\'{\i}}nez Perez and
                  Jordi Cabot and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  title        = {A model-driven approach for the extraction of network access-control
                  policies},
  booktitle    = {Model-Driven Security Workshop, MDsec 2012, In conjunction with MoDELS
                  2012, Innsbruck, Austria, October 1, 2012},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2422498.2422503},
  doi          = {10.1145/2422498.2422503},
  timestamp    = {Wed, 23 Feb 2022 12:16:49 +0100},
  biburl       = {https://dblp.org/rec/conf/models/PerezCGCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/CuppensCGMR12,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Tarik Moataz and
                  Xavier Rimasson},
  editor       = {Dimitris Gritzalis and
                  Steven Furnell and
                  Marianthi Theoharidou},
  title        = {Handling Stateful Firewall Anomalies},
  booktitle    = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information
                  Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece,
                  June 4-6, 2012. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {376},
  pages        = {174--186},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30436-1\_15},
  doi          = {10.1007/978-3-642-30436-1\_15},
  timestamp    = {Sun, 02 Jun 2019 21:15:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/CuppensCGMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2012,
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7371},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31540-4},
  doi          = {10.1007/978-3-642-31540-4},
  isbn         = {978-3-642-31539-8},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/ElrakaibyCC11,
  author       = {Yehia Elrakaiby and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  title        = {An Integrated Approach for the Enforcement of Contextual Permissions
                  and Pre-Obligations},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {3},
  number       = {2},
  pages        = {33--51},
  year         = {2011},
  url          = {https://doi.org/10.4018/jmcmc.2011040103},
  doi          = {10.4018/JMCMC.2011040103},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/ElrakaibyCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/PredaCCGT11,
  author       = {Stere Preda and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Laurent Toutain},
  title        = {Dynamic deployment of context-aware access control policies for constrained
                  security devices},
  journal      = {J. Syst. Softw.},
  volume       = {84},
  number       = {7},
  pages        = {1144--1159},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jss.2011.02.005},
  doi          = {10.1016/J.JSS.2011.02.005},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/PredaCCGT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Cuppens-BoulahiaCN11,
  author       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Marie Nuadi},
  title        = {Smatch Model: Extending {RBAC} Sessions in Virtualization Environment},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {17--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.13},
  doi          = {10.1109/ARES.2011.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Cuppens-BoulahiaCN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ThomasCC11,
  author       = {Julien A. Thomas and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Declassification Policy Management in Dynamic Information Systems},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {143--152},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.30},
  doi          = {10.1109/ARES.2011.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ThomasCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/embc/PanCCCR11,
  author       = {Wei Pan and
                  Gouenou Coatrieux and
                  Nora Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Christian Roux},
  title        = {Reversible watermarking based on invariant image classification and
                  dynamical error histogram shifting},
  booktitle    = {33rd Annual International Conference of the {IEEE} Engineering in
                  Medicine and Biology Society, {EMBC} 2011, Boston, MA, USA, August
                  30 - Sept. 3, 2011},
  pages        = {4477--4480},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/IEMBS.2011.6091110},
  doi          = {10.1109/IEMBS.2011.6091110},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/embc/PanCCCR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GraaCAACCCM11,
  author       = {Mariem Graa and
                  Nora Cuppens{-}Boulahia and
                  Fabien Autrel and
                  Hanieh Azkia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Gouenou Coatrieux and
                  Ana R. Cavalli and
                  Amel Mammar},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Nora Cuppens{-}Boulahia and
                  Sabrina De Capitani di Vimercati},
  title        = {Using Requirements Engineering in an Automatic Security Policy Derivation
                  Process},
  booktitle    = {Data Privacy Management and Autonomous Spontaneus Security - 6th International
                  Workshop, {DPM} 2011, and 4th International Workshop, {SETOP} 2011,
                  Leuven, Belgium, September 15-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7122},
  pages        = {155--172},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28879-1\_11},
  doi          = {10.1007/978-3-642-28879-1\_11},
  timestamp    = {Fri, 27 Dec 2019 21:19:57 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/GraaCAACCCM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/TounsiCCG11,
  author       = {Wiem Tounsi and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Pascal Lafourcade},
  title        = {Formal Verification of a Key Establishment Protocol for {EPC} Gen2
                  {RFID} Systems: Work in Progress},
  booktitle    = {Foundations and Practice of Security - 4th Canada-France {MITACS}
                  Workshop, {FPS} 2011, Paris, France, May 12-13, 2011, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6888},
  pages        = {242--251},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27901-0\_20},
  doi          = {10.1007/978-3-642-27901-0\_20},
  timestamp    = {Fri, 27 Dec 2019 21:23:06 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/TounsiCCG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ThomasCC11,
  author       = {Julien A. Thomas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Consistency Policies for Dynamic Information Systems with Declassification
                  Flows},
  booktitle    = {Information Systems Security - 7th International Conference, {ICISS}
                  2011, Kolkata, India, December 15-19, 2011, Procedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {87--101},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25560-1\_6},
  doi          = {10.1007/978-3-642-25560-1\_6},
  timestamp    = {Wed, 25 Sep 2019 18:06:16 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/ThomasCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/notere/AjamCC11,
  author       = {Nabil Ajam and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Isabelle M. Demeure and
                  Thomas Robert and
                  Ahmed Serhrouchni},
  title        = {Privacy Enforcement of Composed Services in Cellular Networks},
  booktitle    = {11th Annual International Conference on New Technologies of Distributed
                  Systems, {NOTERE} 2011, Paris, France, 9-13 May 2011},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/NOTERE.2011.5957982},
  doi          = {10.1109/NOTERE.2011.5957982},
  timestamp    = {Wed, 11 Dec 2019 16:29:18 +0100},
  biburl       = {https://dblp.org/rec/conf/notere/AjamCC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/TalbiCCMP11,
  author       = {Meriam Ben{-}Ghorbel{-}Talbi and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Daniel Le M{\'{e}}tayer and
                  Guillaume Piolle},
  editor       = {Jan Camenisch and
                  Simone Fischer{-}H{\"{u}}bner and
                  Yuko Murayama and
                  Armand Portmann and
                  Carlos Rieder},
  title        = {Delegation of Obligations and Responsibility},
  booktitle    = {Future Challenges in Security and Privacy for Academia and Industry
                  - 26th {IFIP} {TC} 11 International Information Security Conference,
                  {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {354},
  pages        = {197--209},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21424-0\_16},
  doi          = {10.1007/978-3-642-21424-0\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/TalbiCCMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crisis/2011,
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Simon N. Foley and
                  Bogdan Groza and
                  Marius Minea},
  title        = {CRiSIS 2011, Proceedings of the Sixth International Conference on
                  Risks and Security of Internet and Systems, Timi{\c{s}}oara, Romania,
                  September 26-28, 2011},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6051620/proceeding},
  isbn         = {978-1-4577-1889-2},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/CuppensC11,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Cover Story},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {264--265},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_674},
  doi          = {10.1007/978-1-4419-5906-5\_674},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/CuppensC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/CuppensC11a,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Multilevel Security Policies},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {811--812},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_824},
  doi          = {10.1007/978-1-4419-5906-5\_824},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/CuppensC11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Ben-Ghorbel-TalbiCCB10,
  author       = {Meriam Ben{-}Ghorbel{-}Talbi and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Adel Bouhoula},
  title        = {A delegation model for extended {RBAC}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {9},
  number       = {3},
  pages        = {209--236},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10207-010-0104-3},
  doi          = {10.1007/S10207-010-0104-3},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/Ben-Ghorbel-TalbiCCB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ElrakaibyCC10,
  author       = {Yehia Elrakaiby and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  title        = {From Contextual Permission to Dynamic Pre-obligation: An Integrated
                  Approach},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {70--78},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.71},
  doi          = {10.1109/ARES.2010.71},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ElrakaibyCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/PredaCCT10,
  author       = {Stere Preda and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Laurent Toutain},
  title        = {Architecture-Aware Adaptive Deployment of Contextual Security Policies},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {87--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.45},
  doi          = {10.1109/ARES.2010.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/PredaCCT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KanounCCDM10,
  author       = {Wael Kanoun and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Samuel Dubus and
                  Antony Martin},
  title        = {Intelligent response system to mitigate the success likelihood of
                  ongoing attacks},
  booktitle    = {Sixth International Conference on Information Assurance and Security,
                  {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010},
  pages        = {99--105},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISIAS.2010.5604054},
  doi          = {10.1109/ISIAS.2010.5604054},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KanounCCDM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AzkiaCCC10,
  author       = {Hanieh Azkia and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Gouenou Coatrieux},
  title        = {Reconciling {IHE-ATNA} profile with a posteriori contextual access
                  and usage control policy in healthcare environment},
  booktitle    = {Sixth International Conference on Information Assurance and Security,
                  {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010},
  pages        = {197--203},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISIAS.2010.5604060},
  doi          = {10.1109/ISIAS.2010.5604060},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AzkiaCCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsr/TounsiGCC10,
  author       = {Wiem Tounsi and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Securing the Communications of Home Health Care Systems Based on {RFID}
                  Sensor Networks},
  booktitle    = {8th Annual Conference on Communication Networks and Services Research,
                  {CNSR} 2010, 11-14 May 2010, Montreal, Canada},
  pages        = {284--291},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CNSR.2010.38},
  doi          = {10.1109/CNSR.2010.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsr/TounsiGCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/OulmakhzouneCCM10,
  author       = {Said Oulmakhzoune and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Stephane Morucci},
  editor       = {Sara Foresti and
                  Sushil Jajodia},
  title        = {\emph{f}Query: {SPARQL} Query Rewriting to Enforce Data Confidentiality},
  booktitle    = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
                  {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6166},
  pages        = {146--161},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13739-6\_10},
  doi          = {10.1007/978-3-642-13739-6\_10},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/OulmakhzouneCCM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Garcia-AlfaroCCP10,
  author       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Stere Preda},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Ana R. Cavalli and
                  Jean Leneutre},
  title        = {{MIRAGE:} {A} Management Tool for the Analysis and Deployment of Network
                  Security Policies},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security - 5th
                  International Workshop, {DPM} 2010 and 3rd International Workshop,
                  {SETOP} 2010, Athens, Greece, September 23, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6514},
  pages        = {203--215},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19348-4\_15},
  doi          = {10.1007/978-3-642-19348-4\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Garcia-AlfaroCCP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KheirCCD10,
  author       = {Nizar Kheir and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Herv{\'{e}} Debar},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {A Service Dependency Model for Cost-Sensitive Intrusion Response},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {626--642},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_38},
  doi          = {10.1007/978-3-642-15497-3\_38},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KheirCCD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/PredaCCGT10,
  author       = {Stere Preda and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Laurent Toutain},
  editor       = {Fabio Massacci and
                  Dan S. Wallach and
                  Nicola Zannone},
  title        = {Model-Driven Security Policy Deployment: Property Oriented Approach},
  booktitle    = {Engineering Secure Software and Systems, Second International Symposium,
                  ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5965},
  pages        = {123--139},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11747-3\_10},
  doi          = {10.1007/978-3-642-11747-3\_10},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/PredaCCGT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/OulmakhzouneCCM10,
  author       = {Said Oulmakhzoune and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Stephane Morucci},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Rewriting of SPARQL/Update Queries for Securing Data Access},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {4--15},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_2},
  doi          = {10.1007/978-3-642-17650-0\_2},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/OulmakhzouneCCM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medes/Ben-Ghorbel-TalbiCC10,
  author       = {Meriam Ben{-}Ghorbel{-}Talbi and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Richard Chbeir},
  title        = {Negotiating and delegating obligations},
  booktitle    = {{MEDES} '10: International {ACM} Conference on Management of Emergent
                  Digital EcoSystems, Bangkok, Thailand, October 26-29, 2010},
  pages        = {281--288},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1936254.1936310},
  doi          = {10.1145/1936254.1936310},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/medes/Ben-Ghorbel-TalbiCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medes/ThomasCC10,
  author       = {Julien A. Thomas and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Richard Chbeir},
  title        = {Expression and enforcement of confidentiality policy in active databases},
  booktitle    = {{MEDES} '10: International {ACM} Conference on Management of Emergent
                  Digital EcoSystems, Bangkok, Thailand, October 26-29, 2010},
  pages        = {289--296},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1936254.1936311},
  doi          = {10.1145/1936254.1936311},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/medes/ThomasCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DebarKCC10,
  author       = {Herv{\'{e}} Debar and
                  Nizar Kheir and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Service Dependencies in Information Systems Security},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_1},
  doi          = {10.1007/978-3-642-14706-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DebarKCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/KanounCCD10,
  author       = {Wael Kanoun and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Samuel Dubus},
  editor       = {Yang Xiang and
                  Pierangela Samarati and
                  Jiankun Hu and
                  Wanlei Zhou and
                  Ahmad{-}Reza Sadeghi},
  title        = {Risk-Aware Framework for Activating and Deactivating Policy-Based
                  Response},
  booktitle    = {Fourth International Conference on Network and System Security, {NSS}
                  2010, Melbourne, Victoria, Australia, September 1-3, 2010},
  pages        = {207--215},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NSS.2010.80},
  doi          = {10.1109/NSS.2010.80},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/KanounCCD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KheirCCD10,
  author       = {Nizar Kheir and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Herv{\'{e}} Debar},
  editor       = {Kai Rannenberg and
                  Vijay Varadharajan and
                  Christian Weber},
  title        = {Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact
                  Assessment},
  booktitle    = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11}
                  International Information Security Conference, {SEC} 2010, Held as
                  Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {330},
  pages        = {148--160},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15257-3\_14},
  doi          = {10.1007/978-3-642-15257-3\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/KheirCCD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AjamCC10,
  author       = {Nabil Ajam and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {Privacy Administration in Distributed Service Infrastructure},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {53--70},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_4},
  doi          = {10.1007/978-3-642-16161-2\_4},
  timestamp    = {Sun, 07 Jan 2018 16:52:46 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/AjamCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sitis/PanCCCR10,
  author       = {Wei Pan and
                  Gouenou Coatrieux and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Christian Roux},
  editor       = {Kokou Y{\'{e}}tongnon and
                  Albert Dipanda and
                  Richard Chbeir},
  title        = {Watermarking to Enforce Medical Image Access and Usage Control Policy},
  booktitle    = {Sixth International Conference on Signal-Image Technology and Internet-Based
                  Systems, {SITIS} 2010, Kuala Lumpur, Malaysia, December 15-18, 2010},
  pages        = {251--260},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SITIS.2010.50},
  doi          = {10.1109/SITIS.2010.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sitis/PanCCCR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1012-2720,
  author       = {Meriam Ben{-}Ghorbel{-}Talbi and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Adel Bouhoula},
  title        = {Managing Delegation in Access Control Models},
  journal      = {CoRR},
  volume       = {abs/1012.2720},
  year         = {2010},
  url          = {http://arxiv.org/abs/1012.2720},
  eprinttype    = {arXiv},
  eprint       = {1012.2720},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1012-2720.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/HaidarCCD09,
  author       = {Diala Abi Haidar and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Herv{\'{e}} Debar},
  title        = {XeNA: an access negotiation framework using {XACML}},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {64},
  number       = {1-2},
  pages        = {155--169},
  year         = {2009},
  url          = {https://doi.org/10.1007/s12243-008-0050-5},
  doi          = {10.1007/S12243-008-0050-5},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/HaidarCCD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/Cuppens-Boulahia09,
  author       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Fabien Autrel and
                  Herv{\'{e}} Debar},
  title        = {An ontology-based approach to react to network attacks},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {280--305},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJICS.2009.031041},
  doi          = {10.1504/IJICS.2009.031041},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/Cuppens-Boulahia09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AyedCC09,
  author       = {Samiha Ayed and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Deploying Security Policy in Intra and Inter Workflow Management Systems},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {58--65},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.152},
  doi          = {10.1109/ARES.2009.152},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AyedCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PredaCCGTE09,
  author       = {Stere Preda and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Laurent Toutain and
                  Yehia Elrakaiby},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {Semantic context aware security policy deployment},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {251--261},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533092},
  doi          = {10.1145/1533057.1533092},
  timestamp    = {Fri, 18 Mar 2022 11:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PredaCCGTE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/PredaTCCG09,
  author       = {Stere Preda and
                  Laurent Toutain and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  editor       = {Anas Abou El Kalam and
                  Yves Deswarte and
                  Mahmoud Mostafa},
  title        = {A secured delegation of remote services on IPv6 home networks},
  booktitle    = {CRiSIS 2009, Post-Proceedings of the Fourth International Conference
                  on Risks and Security of Internet and Systems, Toulouse, France, October
                  19-22, 2009},
  pages        = {12--18},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CRISIS.2009.5411984},
  doi          = {10.1109/CRISIS.2009.5411984},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/PredaTCCG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/KanounCCDM09,
  author       = {Wael Kanoun and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Samuel Dubus and
                  Antony Martin},
  title        = {Success Likelihood of Ongoing Attacks for Intrusion Detection and
                  Response Systems},
  booktitle    = {Proceedings of the 12th {IEEE} International Conference on Computational
                  Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August
                  29-31, 2009},
  pages        = {83--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSE.2009.233},
  doi          = {10.1109/CSE.2009.233},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/KanounCCDM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AutrelCC09,
  author       = {Fabien Autrel and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Reaction Policy Model Based on Dynamic Organizations and Threat Context},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_4},
  doi          = {10.1007/978-3-642-03007-9\_4},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/AutrelCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/KheirDCCV09,
  author       = {Nizar Kheir and
                  Herv{\'{e}} Debar and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Jouni Viinikka},
  editor       = {Ulrich Flegel and
                  Danilo Bruschi},
  title        = {A Service Dependency Modeling Framework for Policy-Based Response
                  Enforcement},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5587},
  pages        = {176--195},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02918-9\_11},
  doi          = {10.1007/978-3-642-02918-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/KheirDCCV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AjamCC09,
  author       = {Nabil Ajam and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Nora Cuppens{-}Boulahia and
                  Yves Roudier},
  title        = {Contextual Privacy Management in Extended Role Based Access Control
                  Model},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security, 4th International
                  Workshop, {DPM} 2009 and Second International Workshop, {SETOP} 2009,
                  St. Malo, France, September 24-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5939},
  pages        = {121--135},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11207-2\_10},
  doi          = {10.1007/978-3-642-11207-2\_10},
  timestamp    = {Fri, 27 Dec 2019 21:19:57 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AjamCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PanCCCR09,
  author       = {Wei Pan and
                  Gouenou Coatrieux and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Christian Roux},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Nora Cuppens{-}Boulahia and
                  Yves Roudier},
  title        = {Medical Image Integrity Control Combining Digital Signature and Lossless
                  Watermarking},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security, 4th International
                  Workshop, {DPM} 2009 and Second International Workshop, {SETOP} 2009,
                  St. Malo, France, September 24-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5939},
  pages        = {153--162},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11207-2\_12},
  doi          = {10.1007/978-3-642-11207-2\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/PanCCCR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdim/ElrakaibyCC09,
  author       = {Yehia El Rakaiby and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Bill Grosky and
                  Fr{\'{e}}d{\'{e}}ric Andr{\`{e}}s and
                  Pit Pichappan},
  title        = {From state-based to event-based contextual security policies},
  booktitle    = {Fourth {IEEE} International Conference on Digital Information Management,
                  {ICDIM} 2009, November 1-4, 2009, University of Michigan, Ann Arbor,
                  Michigan, {USA}},
  pages        = {241--247},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICDIM.2009.5356768},
  doi          = {10.1109/ICDIM.2009.5356768},
  timestamp    = {Sat, 15 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdim/ElrakaibyCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/ElrakaibyCC09,
  author       = {Yehia El Rakaiby and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  title        = {Formalization and Management of Group Obligations},
  booktitle    = {{POLICY} 2009, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, London, UK, 20-22 July 2009},
  pages        = {158--165},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/POLICY.2009.10},
  doi          = {10.1109/POLICY.2009.10},
  timestamp    = {Sat, 15 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/policy/ElrakaibyCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sitis/ThomasCC09,
  author       = {Julien A. Thomas and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Kokou Y{\'{e}}tongnon and
                  Richard Chbeir and
                  Albert Dipanda},
  title        = {Modeling and Controlling Downgrading Operations in Information Systems},
  booktitle    = {Fifth International Conference on Signal-Image Technology {\&}
                  Internet-Based Systems, {SITIS} 2009, Marrakesh, Morocco, November
                  29 - December 4, 2009},
  pages        = {377--384},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SITIS.2009.66},
  doi          = {10.1109/SITIS.2009.66},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sitis/ThomasCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/Ben-Ghorbel-TalbiCCB09,
  author       = {Meriam Ben{-}Ghorbel{-}Talbi and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Adel Bouhoula},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis and
                  G{\"{u}}nther Pernul},
  title        = {An Extended Role-Based Access Control Model for Delegating Obligations},
  booktitle    = {Trust, Privacy and Security in Digital Business, 6th International
                  Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5695},
  pages        = {127--137},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03748-1\_13},
  doi          = {10.1007/978-3-642-03748-1\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/Ben-Ghorbel-TalbiCCB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0905-1362,
  author       = {Stere Preda and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Laurent Toutain},
  title        = {Reliable Process for Security Policy Deployment},
  journal      = {CoRR},
  volume       = {abs/0905.1362},
  year         = {2009},
  url          = {http://arxiv.org/abs/0905.1362},
  eprinttype    = {arXiv},
  eprint       = {0905.1362},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0905-1362.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acj/AyedCC08,
  author       = {Samiha Ayed and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Deploying Access and Flow Control in Distributed Workflows},
  journal      = {J. Res. Pract. Inf. Technol.},
  volume       = {40},
  number       = {4},
  pages        = {231--254},
  year         = {2008},
  url          = {http://ws.acs.org.au/jrpit/JRPITVolumes/JRPIT40/JRPIT40.4.231.pdf},
  timestamp    = {Thu, 26 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/acj/AyedCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Garcia-AlfaroBC08,
  author       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nora Boulahia{-}Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Complete analysis of configuration rules to guarantee reliable network
                  security policies},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {2},
  pages        = {103--122},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0045-7},
  doi          = {10.1007/S10207-007-0045-7},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/Garcia-AlfaroBC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/CuppensC08,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  title        = {Modeling contextual security policies},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {4},
  pages        = {285--305},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0051-9},
  doi          = {10.1007/S10207-007-0051-9},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/CuppensC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ComaCCC08,
  author       = {C{\'{e}}line Coma and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Ana R. Cavalli},
  title        = {Context Ontology for Secure Interoperability},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {821--827},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.133},
  doi          = {10.1109/ARES.2008.133},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ComaCCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiccsa/AyedCC08,
  author       = {Samiha Ayed and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Managing access and flow control requirements in distributed workflows},
  booktitle    = {The 6th {ACS/IEEE} International Conference on Computer Systems and
                  Applications, {AICCSA} 2008, Doha, Qatar, March 31 - April 4, 2008},
  pages        = {702--710},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/AICCSA.2008.4493605},
  doi          = {10.1109/AICCSA.2008.4493605},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aiccsa/AyedCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/AyedCC08,
  author       = {Samiha Ayed and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Ljiljana Brankovic and
                  Mirka Miller},
  title        = {Deploying Access Control in Distributed Workflow},
  booktitle    = {Sixth Australasian Information Security Conference, {AISC} 2008, Wollongong,
                  NSW, Australia, January 2008},
  series       = {{CRPIT}},
  volume       = {81},
  pages        = {9--17},
  publisher    = {Australian Computer Society},
  year         = {2008},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV81Ayed.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/AyedCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/LeCCM08,
  author       = {Cam Tu Phan Le and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Patrick Maill{\'{e}}},
  editor       = {Elisa Bertino and
                  James B. D. Joshi},
  title        = {Evaluating the Trustworthiness of Contributors in a Collaborative
                  Environment},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing,
                  4th International Conference, CollaborateCom 2008, Orlando, FL, USA,
                  November 13-16, 2008, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {10},
  pages        = {451--460},
  publisher    = {Springer / {ICST}},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-03354-4\_34},
  doi          = {10.1007/978-3-642-03354-4\_34},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/LeCCM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/Cuppens-BoulahiaCVVGD08,
  author       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Jorge E. L{\'{o}}pez de Vergara and
                  Enrique V{\'{a}}zquez and
                  Javier Guerra and
                  Herv{\'{e}} Debar},
  editor       = {Mohamed Jmaiel and
                  Mohamed Mosbah},
  title        = {An ontology-based approach to react to network attacks},
  booktitle    = {CRiSIS '08, Third International Conference on Risks and Security of
                  Internet and Systems, Tozeur, Tunisia, October 28-30, 2008},
  pages        = {27--35},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/CRISIS.2008.4757461},
  doi          = {10.1109/CRISIS.2008.4757461},
  timestamp    = {Tue, 11 Oct 2022 14:59:07 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/Cuppens-BoulahiaCVVGD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/KanounCCA08,
  author       = {Wael Kanoun and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Jos{\'{e}} Araujo},
  editor       = {Mohamed Jmaiel and
                  Mohamed Mosbah},
  title        = {Automated reaction based on risk analysis and attackers skills in
                  intrusion detection systems},
  booktitle    = {CRiSIS '08, Third International Conference on Risks and Security of
                  Internet and Systems, Tozeur, Tunisia, October 28-30, 2008},
  pages        = {117--124},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/CRISIS.2008.4757471},
  doi          = {10.1109/CRISIS.2008.4757471},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/KanounCCA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/deon/Cuppens-BoulahiaC08,
  author       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Ron van der Meyden and
                  Leendert W. N. van der Torre},
  title        = {Specifying Intrusion Detection and Reaction Policies: An Application
                  of Deontic Logic},
  booktitle    = {Deontic Logic in Computer Science, 9th International Conference, {DEON}
                  2008, Luxembourg, Luxembourg, July 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5076},
  pages        = {65--80},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70525-3\_7},
  doi          = {10.1007/978-3-540-70525-3\_7},
  timestamp    = {Thu, 14 Oct 2021 10:16:00 +0200},
  biburl       = {https://dblp.org/rec/conf/deon/Cuppens-BoulahiaC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Ben-Ghorbel-TalbiCCB08,
  author       = {Meriam Ben{-}Ghorbel{-}Talbi and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Adel Bouhoula},
  editor       = {Liqun Chen and
                  Mark Dermot Ryan and
                  Guilin Wang},
  title        = {Revocation Schemes for Delegation Licences},
  booktitle    = {Information and Communications Security, 10th International Conference,
                  {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5308},
  pages        = {190--205},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88625-9\_13},
  doi          = {10.1007/978-3-540-88625-9\_13},
  timestamp    = {Sun, 22 Jan 2023 01:36:25 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/Ben-Ghorbel-TalbiCCB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/CuppensCT08,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Julien A. Thomas},
  editor       = {R. Sekar and
                  Arun K. Pujari},
  title        = {A Robust Reputation Scheme for Decentralized Group Management Systems},
  booktitle    = {Information Systems Security, 4th International Conference, {ICISS}
                  2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {71--85},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89862-7\_5},
  doi          = {10.1007/978-3-540-89862-7\_5},
  timestamp    = {Thu, 18 Nov 2021 17:21:37 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/CuppensCT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Cuppens-BoulahiaCHD08,
  author       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Diala Abi Haidar and
                  Herv{\'{e}} Debar},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Negotiation of Prohibition: An Approach Based on Policy Rewriting},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {173--187},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_12},
  doi          = {10.1007/978-0-387-09699-5\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/Cuppens-BoulahiaCHD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ElrakaibyCC08,
  author       = {Yehia ElRakaiby and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Interactivity for Reactive Access Control},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {57--64},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Sat, 15 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ElrakaibyCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sitis/CuppensCBKC08,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Yacine Bouzida and
                  Wael Kanoun and
                  Aur{\'{e}}lien Croissant},
  editor       = {Richard Chbeir and
                  Albert Dipanda and
                  Kokou Y{\'{e}}tongnon},
  title        = {Expression and Deployment of Reaction Policies},
  booktitle    = {4th {IEEE} International Conference on Signal Image Technology and
                  Internet Based Systems, {SITIS} 2008, Bali, Indonesia, November 30
                  - December 3, 2008},
  pages        = {118--127},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SITIS.2008.96},
  doi          = {10.1109/SITIS.2008.96},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sitis/CuppensCBKC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sitis/ComaCCC08,
  author       = {C{\'{e}}line Coma and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Ana R. Cavalli},
  editor       = {Richard Chbeir and
                  Albert Dipanda and
                  Kokou Y{\'{e}}tongnon},
  title        = {Interoperability of Context Based System Policies Using {O2O} Contract},
  booktitle    = {4th {IEEE} International Conference on Signal Image Technology and
                  Internet Based Systems, {SITIS} 2008, Bali, Indonesia, November 30
                  - December 3, 2008},
  pages        = {137--144},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SITIS.2008.68},
  doi          = {10.1109/SITIS.2008.68},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sitis/ComaCCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0803-0653,
  author       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  title        = {Aggregating and Deploying Network Access Control Policies},
  journal      = {CoRR},
  volume       = {abs/0803.0653},
  year         = {2008},
  url          = {http://arxiv.org/abs/0803.0653},
  eprinttype    = {arXiv},
  eprint       = {0803.0653},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0803-0653.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/CuppensDBG07,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Herv{\'{e}} Debar and
                  Danielle Boulanger and
                  Alban Gabillon},
  title        = {Introduction Selection of articles from the {SAR-SSI} 2006},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {62},
  number       = {11-12},
  pages        = {1327},
  year         = {2007},
  url          = {https://doi.org/10.1007/BF03253321},
  doi          = {10.1007/BF03253321},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/CuppensDBG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/SansCC07,
  author       = {Thierry Sans and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  title        = {A Framework to Enforce Access Control, Usage Control and Obligations},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {62},
  number       = {11-12},
  pages        = {1329--1352},
  year         = {2007},
  url          = {https://doi.org/10.1007/BF03253322},
  doi          = {10.1007/BF03253322},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/SansCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/DebarTCC07,
  author       = {Herv{\'{e}} Debar and
                  Yohann Thomas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  title        = {Enabling automated threat response through the use of a dynamic security
                  policy},
  journal      = {J. Comput. Virol.},
  volume       = {3},
  number       = {3},
  pages        = {195--210},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11416-007-0039-z},
  doi          = {10.1007/S11416-007-0039-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/DebarTCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Garcia-AlfaroCC07,
  author       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  title        = {Aggregating and Deploying Network Access Control Policies},
  booktitle    = {Proceedings of the The Second International Conference on Availability,
                  Reliability and Security, {ARES} 2007, The International Dependability
                  Conference - Bridging Theory and Practice, April 10-13 2007, Vienna,
                  Austria},
  pages        = {532--542},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ARES.2007.34},
  doi          = {10.1109/ARES.2007.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Garcia-AlfaroCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HaidarCCD07,
  author       = {Diala Abi Haidar and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Herv{\'{e}} Debar},
  editor       = {Ning Zhang and
                  Ajith Abraham},
  title        = {Resource Classification Based Negotiation in Web Services},
  booktitle    = {Proceedings of the Third International Symposium on Information Assurance
                  and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom},
  pages        = {313--318},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAS.2007.54},
  doi          = {10.1109/IAS.2007.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HaidarCCD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/AyedCC07,
  author       = {Samiha Ayed and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Iliano Cervesato},
  title        = {An Integrated Model for Access Control and Information Flow Requirements},
  booktitle    = {Advances in Computer Science - {ASIAN} 2007. Computer and Network
                  Security, 12th Asian Computing Science Conference, Doha, Qatar, December
                  9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4846},
  pages        = {111--125},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76929-3\_12},
  doi          = {10.1007/978-3-540-76929-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/AyedCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BrunelCCSB07,
  author       = {Julien Brunel and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Thierry Sans and
                  Jean{-}Paul Bodeveix},
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Virgil D. Gligor and
                  Heiko Mantel},
  title        = {Security policy compliance with violation management},
  booktitle    = {Proceedings of the 2007 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {31--40},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314436.1314441},
  doi          = {10.1145/1314436.1314441},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BrunelCCSB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/KanounCCA07,
  author       = {Wael Kanoun and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Fabien Autrel},
  editor       = {Javier L{\'{o}}pez and
                  Bernhard M. H{\"{a}}mmerli},
  title        = {Advanced Reaction Using Risk Assessment in Intrusion Detection Systems},
  booktitle    = {Critical Information Infrastructures Security, Second International
                  Workshop, {CRITIS} 2007, M{\'{a}}laga, Spain, October 3-5, 2007.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5141},
  pages        = {58--70},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-89173-4\_6},
  doi          = {10.1007/978-3-540-89173-4\_6},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/KanounCCA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/CuppensCS07,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Thierry Sans},
  editor       = {Bruno Apolloni and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {{XML-BB:} {A} Model to Handle Relationships Protection in {XML} Documents},
  booktitle    = {Knowledge-Based Intelligent Information and Engineering Systems, 11th
                  International Conference, {KES} 2007, {XVII} Italian Workshop on Neural
                  Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4694},
  pages        = {1107--1114},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74829-8\_135},
  doi          = {10.1007/978-3-540-74829-8\_135},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/CuppensCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/CuppensCRT07,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Tony Ramard and
                  Julien A. Thomas},
  editor       = {Hongke Zhang and
                  Stephan Olariu and
                  Jiannong Cao and
                  David B. Johnson},
  title        = {Misbehaviors Detection to Ensure Availability in {OLSR}},
  booktitle    = {Mobile Ad-Hoc and Sensor Networks, Third International Conference,
                  {MSN} 2007, Beijing, China, December 12-14, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4864},
  pages        = {799--813},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77024-4\_72},
  doi          = {10.1007/978-3-540-77024-4\_72},
  timestamp    = {Tue, 14 Apr 2020 13:23:09 +0200},
  biburl       = {https://dblp.org/rec/conf/msn/CuppensCRT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/MallouliOCCC07,
  author       = {Wissam Mallouli and
                  Jean{-}Marie Orset and
                  Ana R. Cavalli and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Volkmar Lotz and
                  Bhavani Thuraisingham},
  title        = {A formal approach for testing security rules},
  booktitle    = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings},
  pages        = {127--132},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1266840.1266860},
  doi          = {10.1145/1266840.1266860},
  timestamp    = {Wed, 29 Jun 2022 15:37:42 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/MallouliOCCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Garcia-AlfaroCC07,
  author       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Les Labuschagne and
                  Jan H. P. Eloff and
                  Rossouw von Solms},
  title        = {Management of Exceptions on Access Control Policies},
  booktitle    = {New Approaches for Security, Privacy and Trust in Complex Environments,
                  Proceedings of the {IFIP} {TC-11} 22nd International Information Security
                  Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa},
  series       = {{IFIP}},
  volume       = {232},
  pages        = {97--108},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-72367-9\_9},
  doi          = {10.1007/978-0-387-72367-9\_9},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/Garcia-AlfaroCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SansCC07,
  author       = {Thierry Sans and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Les Labuschagne and
                  Jan H. P. Eloff and
                  Rossouw von Solms},
  title        = {{OPA:} Onion Policy Administration Model - Another approach to manage
                  rights in {DRM}},
  booktitle    = {New Approaches for Security, Privacy and Trust in Complex Environments,
                  Proceedings of the {IFIP} {TC-11} 22nd International Information Security
                  Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa},
  series       = {{IFIP}},
  volume       = {232},
  pages        = {349--360},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-72367-9\_30},
  doi          = {10.1007/978-0-387-72367-9\_30},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SansCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PredaCCGT07,
  author       = {Stere Preda and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Laurent Toutain},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Reliable Process for Security Policy Deployment},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {5--15},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 13:27:09 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PredaCCGT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/CuppensABGGS06,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Fabien Autrel and
                  Yacine Bouzida and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a and
                  Sylvain Gombault and
                  Thierry Sans},
  title        = {Anti-correlation as a criterion to select appropriate counter-measures
                  in an intrusion detection framework},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {61},
  number       = {1-2},
  pages        = {197--217},
  year         = {2006},
  url          = {https://doi.org/10.1007/BF03219974},
  doi          = {10.1007/BF03219974},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/CuppensABGGS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/CuppensDB06,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Herv{\'{e}} Debar and
                  Elisa Bertino},
  title        = {Foreword},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {61},
  number       = {3-4},
  pages        = {242--244},
  year         = {2006},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/CuppensDB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/AutrelC06,
  author       = {Fabien Autrel and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {{CRIM:} un module de corr{\'{e}}lation d'alertes et de r{\'{e}}action
                  aux attaques},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {61},
  number       = {9-10},
  pages        = {1172--1192},
  year         = {2006},
  url          = {https://doi.org/10.1007/BF03219887},
  doi          = {10.1007/BF03219887},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/AutrelC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/CuppensCR06,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Tony Ramard},
  title        = {Availability Enforcement by Obligations and Aspects Identification},
  booktitle    = {Proceedings of the The First International Conference on Availability,
                  Reliability and Security, {ARES} 2006, The International Dependability
                  Conference - Bridging Theory and Practice, April 20-22 2006, Vienna
                  University of Technology, Austria},
  pages        = {229--239},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ARES.2006.36},
  doi          = {10.1109/ARES.2006.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/CuppensCR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/SansCC06,
  author       = {Thierry Sans and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Mitsu Okada and
                  Ichiro Satoh},
  title        = {{FORM} : {A} Federated Rights Expression Model for Open {DRM} Frameworks},
  booktitle    = {Advances in Computer Science - {ASIAN} 2006. Secure Software and Related
                  Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December
                  6-8, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4435},
  pages        = {45--59},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-77505-8\_5},
  doi          = {10.1007/978-3-540-77505-8\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/SansCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/DebarTBC06,
  author       = {Herv{\'{e}} Debar and
                  Yohann Thomas and
                  Nora Boulahia{-}Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Roland B{\"{u}}schkes and
                  Pavel Laskov},
  title        = {Using Contextual Security Policies for Threat Response},
  booktitle    = {Detection of Intrusions and Malware {\&} Vulnerability Assessment,
                  Third International Conference, {DIMVA} 2006, Berlin, Germany, July
                  13-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4064},
  pages        = {109--128},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11790754\_7},
  doi          = {10.1007/11790754\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/DebarTBC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Garcia-AlfaroCC06,
  author       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Dieter Gollmann and
                  Jan Meier and
                  Andrei Sabelfeld},
  title        = {Analysis of Policy Anomalies on Distributed Network Security Setups},
  booktitle    = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
                  in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4189},
  pages        = {496--511},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863908\_30},
  doi          = {10.1007/11863908\_30},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/Garcia-AlfaroCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/BouzidaCG06,
  author       = {Yacine Bouzida and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sylvain Gombault},
  title        = {Detecting and Reacting against Distributed Denial of Service Attacks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2006, Istanbul, Turkey, 11-15 June 2006},
  pages        = {2394--2400},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICC.2006.255128},
  doi          = {10.1109/ICC.2006.255128},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/BouzidaCG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/CuppensCC06,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  C{\'{e}}line Coma},
  editor       = {Aditya Bagchi and
                  Vijayalakshmi Atluri},
  title        = {{O2O:} Virtual Private Organizations to Manage Security Policy Interoperability},
  booktitle    = {Information Systems Security, Second International Conference, {ICISS}
                  2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  pages        = {101--115},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11961635\_7},
  doi          = {10.1007/11961635\_7},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/CuppensCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/Garcia-AlfaroCC06,
  author       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Janusz G{\'{o}}rski},
  title        = {Towards Filtering and Alerting Rule Rewriting on Single-Component
                  Policies},
  booktitle    = {Computer Safety, Reliability, and Security, 25th International Conference,
                  {SAFECOMP} 2006, Gdansk, Poland, September 27-29, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4166},
  pages        = {182--194},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11875567\_14},
  doi          = {10.1007/11875567\_14},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safecomp/Garcia-AlfaroCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SansCC06,
  author       = {Thierry Sans and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Kai Rannenberg and
                  Louise Yngstr{\"{o}}m and
                  Stefan Lindskog},
  title        = {A Flexible and Distributed Architecture to Enforce Dynamic Access
                  Control},
  booktitle    = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
                  {TC-11} 21st International Information Security Conference {(SEC}
                  2006), 22-24 May 2006, Karlstad, Sweden},
  series       = {{IFIP}},
  volume       = {201},
  pages        = {183--195},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-33406-8\_16},
  doi          = {10.1007/0-387-33406-8\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SansCC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/BouzidaC06,
  author       = {Yacine Bouzida and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Kai Rannenberg and
                  Louise Yngstr{\"{o}}m and
                  Stefan Lindskog},
  title        = {Detecting Known and Novel Network Intrusions},
  booktitle    = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
                  {TC-11} 21st International Information Security Conference {(SEC}
                  2006), 22-24 May 2006, Karlstad, Sweden},
  series       = {{IFIP}},
  volume       = {201},
  pages        = {258--270},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-33406-8\_22},
  doi          = {10.1007/0-387-33406-8\_22},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/BouzidaC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/HaidarCCD06,
  author       = {Diala Abi Haidar and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Herv{\'{e}} Debar},
  editor       = {Ari Juels and
                  Ernesto Damiani and
                  Alban Gabillon},
  title        = {An extended {RBAC} profile of {XACML}},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop On Secure Web Services, {SWS}
                  2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {13--22},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180367.1180372},
  doi          = {10.1145/1180367.1180372},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/HaidarCCD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CuppensCG07,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Meriam Ben Ghorbel},
  editor       = {Catalin Dima and
                  Marius Minea and
                  Ferucio Laurentiu Tiplea},
  title        = {High Level Conflict Management Strategies in Advanced Access Control
                  Models},
  booktitle    = {Proceedings of the First Workshop in Information and Computer Security,
                  ICS@SYNASC 2006, Timisoara, Romania, September 30, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {186},
  pages        = {3--26},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2007.01.064},
  doi          = {10.1016/J.ENTCS.2007.01.064},
  timestamp    = {Tue, 31 Jan 2023 14:10:47 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/CuppensCG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CuppensCS05,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Thierry Sans},
  title        = {Nomad: {A} Security Model with Non Atomic Actions and Deadlines},
  booktitle    = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005),
                  20-22 June 2005, Aix-en-Provence, France},
  pages        = {186--196},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSFW.2005.20},
  doi          = {10.1109/CSFW.2005.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CuppensCS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/CuppensCS05,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Thierry Sans},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Protection of Relationships in {XML} Documents with the {XML-BB} Model},
  booktitle    = {Information Systems Security, First International Conference, {ICISS}
                  2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {148--163},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593980\_11},
  doi          = {10.1007/11593980\_11},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/CuppensCS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/GarciaCACBNO05,
  author       = {Joaqu{\'{\i}}n Garc{\'{\i}}a and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Fabien Autrel and
                  Jordi Castell{\`{a}}{-}Roca and
                  Joan Borrell and
                  Guillermo Navarro and
                  Jose A. Ortega{-}Ruiz},
  title        = {Protecting On-Line Casinos against Fraudulent Player Drop-Out},
  booktitle    = {International Symposium on Information Technology: Coding and Computing
                  {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}},
  pages        = {500--505},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITCC.2005.232},
  doi          = {10.1109/ITCC.2005.232},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/GarciaCACBNO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/AutrelBC04,
  author       = {Fabien Autrel and
                  Salem Benferhat and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Utilisation de la corr{\'{e}}lation pond{\'{e}}r{\'{e}}e
                  dans un processus de d{\'{e}}tection d'intrusions},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {59},
  number       = {9-10},
  pages        = {1072--1091},
  year         = {2004},
  url          = {https://doi.org/10.1007/BF03179711},
  doi          = {10.1007/BF03179711},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/AutrelBC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/CuppensM04,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Alexandre Mi{\`{e}}ge},
  title        = {AdOrBAC: an administration model for Or-BAC},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {19},
  number       = {3},
  year         = {2004},
  timestamp    = {Tue, 20 Feb 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csse/CuppensM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsi/DebarMCAMVBDO04,
  author       = {Herv{\'{e}} Debar and
                  Benjamin Morin and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Fabien Autrel and
                  Ludovic M{\'{e}} and
                  Bernard Vivinis and
                  Salem Benferhat and
                  Mireille Ducass{\'{e}} and
                  Rodolphe Ortalo},
  title        = {D{\'{e}}tection d'intrusions : corr{\'{e}}lation d'alertes},
  journal      = {Tech. Sci. Informatiques},
  volume       = {23},
  number       = {3},
  pages        = {359--390},
  year         = {2004},
  url          = {https://doi.org/10.3166/tsi.23.359-390},
  doi          = {10.3166/TSI.23.359-390},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsi/DebarMCAMVBDO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CuppensGS04,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sylvain Gombault and
                  Thierry Sans},
  title        = {Selecting Appropriate Counter-Measures in an Intrusion Detection Framework},
  booktitle    = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004),
                  28-30 June 2004, Pacific Grove, CA, {USA}},
  pages        = {78--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.18},
  doi          = {10.1109/CSFW.2004.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CuppensGS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/GarciaABCCN04,
  author       = {Joaqu{\'{\i}}n Garc{\'{\i}}a and
                  Fabien Autrel and
                  Joan Borrell and
                  Sergio Castillo and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Guillermo Navarro},
  editor       = {Javier L{\'{o}}pez and
                  Sihan Qing and
                  Eiji Okamoto},
  title        = {Decentralized Publish-Subscribe System to Prevent Coordinated Attacks
                  via Alert Correlation},
  booktitle    = {Information and Communications Security, 6th International Conference,
                  {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3269},
  pages        = {223--235},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30191-2\_18},
  doi          = {10.1007/978-3-540-30191-2\_18},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/GarciaABCCN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/CuppensCSM04,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Thierry Sans and
                  Alexandre Mi{\`{e}}ge},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {A Formal Approach to Specify and Deploy a Network Security Policy},
  booktitle    = {Formal Aspects in Security and Trust: Second {IFIP} {TC1} {WG1.7}
                  Workshop on Formal Aspects in Security and Trust (FAST), an event
                  of the 18th {IFIP} World Computer Congress, August 22-27, 2004, Toulouse,
                  France},
  series       = {{IFIP}},
  volume       = {173},
  pages        = {203--218},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-24098-5\_15},
  doi          = {10.1007/0-387-24098-5\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/CuppensCSM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sis/KaciAC04,
  author       = {Souhila Kaci and
                  Abdeslam Ali{-}Laouar and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  L. Javier Garc{\'{\i}}a{-}Villalba},
  title        = {Health care and social inference systems: An unauthorized inference
                  control based on fuzzy logic},
  booktitle    = {Security In Information Systems, Proceedings of the 2nd International
                  Workshop on Security In Information Systems, {WOSIS} 2004, In conjunction
                  with {ICEIS} 2004, Porto, Portugal, April 2004},
  pages        = {217--226},
  publisher    = {{INSTICC} Press},
  year         = {2004},
  timestamp    = {Mon, 23 Aug 2004 13:05:50 +0200},
  biburl       = {https://dblp.org/rec/conf/sis/KaciAC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip11/2004,
  editor       = {Yves Deswarte and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Lingyu Wang},
  title        = {Information Security Management, Education and Privacy, {IFIP} 18th
                  World Computer Congress, {TC11} 19th International Information Security
                  Workshops, 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {148},
  publisher    = {Kluwer},
  year         = {2004},
  isbn         = {1-4020-8144-8},
  timestamp    = {Mon, 02 Jan 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2004,
  editor       = {Yves Deswarte and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Lingyu Wang},
  title        = {Security and Protection in Information Processing Systems, {IFIP}
                  18th WorldComputer Congress, {TC11} 19th International Information
                  Security Conference, 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {147},
  publisher    = {Kluwer / Springer},
  year         = {2004},
  isbn         = {1-4020-8142-1},
  timestamp    = {Mon, 02 Jan 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CuppensM03,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Alexandre Mi{\`{e}}ge},
  title        = {Modelling Contexts in the Or-BAC Model},
  booktitle    = {19th Annual Computer Security Applications Conference {(ACSAC} 2003),
                  8-12 December 2003, Las Vegas, NV, {USA}},
  pages        = {416--425},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CSAC.2003.1254346},
  doi          = {10.1109/CSAC.2003.1254346},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CuppensM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/flairs/BenferhatBC03,
  author       = {Salem Benferhat and
                  Rania El Baida and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Ingrid Russell and
                  Susan M. Haller},
  title        = {A Possibilistic Logic Encoding of Access Control},
  booktitle    = {Proceedings of the Sixteenth International Florida Artificial Intelligence
                  Research Society Conference, May 12-14, 2003, St. Augustine, Florida,
                  {USA}},
  pages        = {481--485},
  publisher    = {{AAAI} Press},
  year         = {2003},
  url          = {http://www.aaai.org/Library/FLAIRS/2003/flairs03-094.php},
  timestamp    = {Wed, 26 Oct 2022 08:35:31 +0200},
  biburl       = {https://dblp.org/rec/conf/flairs/BenferhatBC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/BenferhatAC03,
  author       = {Salem Benferhat and
                  Fabien Autrel and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Enhanced Correlation in an Intrusion Detection Process},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {157--170},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_13},
  doi          = {10.1007/978-3-540-45215-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/BenferhatAC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/CuppensM03,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Alexandre Mi{\`{e}}ge},
  editor       = {Robert Meersman and
                  Zahir Tari},
  title        = {Administration Model for Or-BAC},
  booktitle    = {On The Move to Meaningful Internet Systems 2003: {OTM} 2003 Workshops,
                  {OTM} Confederated International Workshops, HCI-SWWA, IPW, JTRES,
                  WORM, WMS, and {WRSM} 2003, Catania, Sicily, Italy, November 3-7,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2889},
  pages        = {754--768},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39962-9\_76},
  doi          = {10.1007/978-3-540-39962-9\_76},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/CuppensM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/KalamBMBCSBDT03,
  author       = {Anas Abou El Kalam and
                  Salem Benferhat and
                  Alexandre Mi{\`{e}}ge and
                  Rania El Baida and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Claire Saurel and
                  Philippe Balbiani and
                  Yves Deswarte and
                  Gilles Trouessin},
  title        = {Organization based access contro},
  booktitle    = {4th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2003), 4-6 June 2003, Lake Como, Italy},
  pages        = {120},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/POLICY.2003.1206966},
  doi          = {10.1109/POLICY.2003.1206966},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/KalamBMBCSBDT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BenferhatBC03,
  author       = {Salem Benferhat and
                  Rania El Baida and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Elena Ferrari and
                  David F. Ferraiolo},
  title        = {A stratification-based approach for handling conflicts in access control},
  booktitle    = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings},
  pages        = {189--195},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/775412.775437},
  doi          = {10.1145/775412.775437},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/BenferhatBC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/his/CuppensAMB02,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Fabien Autrel and
                  Alexandre Mi{\`{e}}ge and
                  Salem Benferhat},
  editor       = {Ajith Abraham and
                  Javier Ruiz{-}del{-}Solar and
                  Mario K{\"{o}}ppen},
  title        = {Recognizing Malicious Intention in an Intrusion Detection Process},
  booktitle    = {Soft Computing Systems - Design, Management and Applications, {HIS}
                  2002, December 1-4, 2002, Santiago, Chile},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {87},
  pages        = {806--817},
  publisher    = {{IOS} Press},
  year         = {2002},
  timestamp    = {Thu, 29 Jan 2004 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/his/CuppensAMB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CuppensM02,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Alexandre Mi{\`{e}}ge},
  title        = {Alert Correlation in a Cooperative Intrusion Detection Framework},
  booktitle    = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California,
                  USA, May 12-15, 2002},
  pages        = {202--215},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/SECPRI.2002.1004372},
  doi          = {10.1109/SECPRI.2002.1004372},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/CuppensM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/CuppensG01,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Alban Gabillon},
  title        = {Cover story management},
  journal      = {Data Knowl. Eng.},
  volume       = {37},
  number       = {2},
  pages        = {177--201},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0169-023X(01)00006-4},
  doi          = {10.1016/S0169-023X(01)00006-4},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/CuppensG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/BlochHAABBCCCDFGKLMPSSS01,
  author       = {Isabelle Bloch and
                  Anthony Hunter and
                  Alain Appriou and
                  Andr{\'{e}} Ayoun and
                  Salem Benferhat and
                  Philippe Besnard and
                  Laurence Cholvy and
                  Roger M. Cooke and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Didier Dubois and
                  H{\'{e}}l{\`{e}}ne Fargier and
                  Michel Grabisch and
                  Rudolf Kruse and
                  J{\'{e}}r{\^{o}}me Lang and
                  Seraf{\'{\i}}n Moral and
                  Henri Prade and
                  Alessandro Saffiotti and
                  Philippe Smets and
                  Claudio Sossai},
  title        = {Fusion: General concepts and characteristics},
  journal      = {Int. J. Intell. Syst.},
  volume       = {16},
  number       = {10},
  pages        = {1107--1134},
  year         = {2001},
  url          = {https://doi.org/10.1002/int.1052},
  doi          = {10.1002/INT.1052},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijis/BlochHAABBCCCDFGKLMPSSS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/CuppensCSC01,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Laurence Cholvy and
                  Claire Saurel and
                  J{\'{e}}r{\^{o}}me Carr{\`{e}}re},
  title        = {Merging regulations: Analysis of a practical example},
  journal      = {Int. J. Intell. Syst.},
  volume       = {16},
  number       = {11},
  pages        = {1223--1243},
  year         = {2001},
  url          = {https://doi.org/10.1002/int.1057},
  doi          = {10.1002/INT.1057},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/CuppensCSC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Cuppens01,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Managing Alerts in a Multi-Intrusion Detection Environmen},
  booktitle    = {17th Annual Computer Security Applications Conference {(ACSAC} 2001),
                  11-14 December 2001, New Orleans, Louisiana, {USA}},
  pages        = {22--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ACSAC.2001.991518},
  doi          = {10.1109/ACSAC.2001.991518},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Cuppens01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nldb/CarrereCS00,
  author       = {J{\'{e}}r{\^{o}}me Carr{\`{e}}re and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Claire Saurel},
  editor       = {Mokrane Bouzeghoub and
                  Zoubida Kedad and
                  Elisabeth M{\'{e}}tais},
  title        = {LExIS: {A} Query Language to Scan Information Flow},
  booktitle    = {Natural Language Processing and Information Systems, 5th International
                  Conference on Applications of Natural Language to Information Systems,
                  {NLDB} 2000, Versailles, France, June 28-30, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {1959},
  pages        = {369},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45399-7\_35},
  doi          = {10.1007/3-540-45399-7\_35},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/nldb/CarrereCS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CuppensO00,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Rodolphe Ortalo},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {{LAMBDA:} {A} Language to Model a Database for Detection of Attacks},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {197--216},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_13},
  doi          = {10.1007/3-540-39945-3\_13},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CuppensO00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2000,
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599},
  doi          = {10.1007/10722599},
  isbn         = {3-540-41031-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/CuppensG99,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Alban Gabillon},
  title        = {Logical Foundations of Multilevel Databases},
  journal      = {Data Knowl. Eng.},
  volume       = {29},
  number       = {3},
  pages        = {259--291},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0169-023X(98)00044-5},
  doi          = {10.1016/S0169-023X(98)00044-5},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/CuppensG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CuppensCSC98,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Laurence Cholvy and
                  Claire Saurel and
                  J{\'{e}}r{\^{o}}me Carr{\`{e}}re},
  title        = {Merging Security Policies: Analysis of a Practical Example},
  booktitle    = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop,
                  Rockport, Massachusetts, USA, June 9-11, 1998},
  pages        = {123--136},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/CSFW.1998.683163},
  doi          = {10.1109/CSFW.1998.683163},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CuppensCSC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CarrereCS98,
  author       = {J{\'{e}}r{\^{o}}me Carr{\`{e}}re and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Claire Saurel},
  editor       = {Sushil Jajodia},
  title        = {{SACADDOS:} {A} Support Tool to Manage Multilevel Documents},
  booktitle    = {Database Security {XII:} Status and Prospects, {IFIP} {TC11} {WG}
                  11.3 Twelfth International Working Conference on Database Security,
                  July 15-17, 1998, Chalkidiki, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {142},
  pages        = {173--188},
  publisher    = {Kluwer},
  year         = {1998},
  timestamp    = {Mon, 21 Oct 2002 13:30:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/CarrereCS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CuppensG98,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Alban Gabillon},
  editor       = {Jean{-}Jacques Quisquater and
                  Yves Deswarte and
                  Catherine Meadows and
                  Dieter Gollmann},
  title        = {Rules for Designing Multilevel Object-Oriented Databases},
  booktitle    = {Computer Security - {ESORICS} 98, 5th European Symposium on Research
                  in Computer Security, Louvain-la-Neuve, Belgium, September 16-18,
                  1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1485},
  pages        = {159--174},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055862},
  doi          = {10.1007/BFB0055862},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CuppensG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/CuppensS98,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Claire Saurel},
  editor       = {Sushil Jajodia and
                  William List and
                  Graeme W. McGregor and
                  Leon Strous},
  title        = {A Logical Formalization of Integrity Policies for Database Management
                  Systems},
  booktitle    = {Integrity and Internal Control in Information Systems, {IFIP} {TC11}
                  Working Group 11.5, Second Working Conference on Integrity and Internal
                  Control in Information Systems: Bridging Business Requirements and
                  Research Results, Warrenton, Virginia, USA, November 19-20, 1998},
  series       = {{IFIP} Conference Proceedings},
  volume       = {136},
  pages        = {231--254},
  publisher    = {Kluwer},
  year         = {1998},
  timestamp    = {Thu, 22 Aug 2002 09:35:37 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/CuppensS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icail/CholvyCS97,
  author       = {Laurence Cholvy and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Claire Saurel},
  editor       = {John Zeleznikow and
                  Daniel Hunter and
                  Luther Karl Branting},
  title        = {Towards a Logical Formalization of Responsibility},
  booktitle    = {Proceedings of the Sixth International Conference on Artificial Intelligence
                  and Law, {ICAIL} '97, Melbourne, Vicoria, Australia, June 30 - July
                  3, 1997},
  pages        = {233--242},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/261618.261658},
  doi          = {10.1145/261618.261658},
  timestamp    = {Tue, 06 Nov 2018 16:58:12 +0100},
  biburl       = {https://dblp.org/rec/conf/icail/CholvyCS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ismis/CuppensD97,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Robert Demolombe},
  editor       = {Zbigniew W. Ras and
                  Andrzej Skowron},
  title        = {A Modal Logical Framework for Security Policies},
  booktitle    = {Foundations of Intelligent Systems, 10th International Symposium,
                  {ISMIS} '97, Charlotte, North Carolina, USA, October 15-18, 1997,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1325},
  pages        = {579--589},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-63614-5\_56},
  doi          = {10.1007/3-540-63614-5\_56},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ismis/CuppensD97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CholvyC97,
  author       = {Laurence Cholvy and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Analyzing Consistency of Security Policies},
  booktitle    = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland,
                  CA, {USA}},
  pages        = {103--112},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/SECPRI.1997.601324},
  doi          = {10.1109/SECPRI.1997.601324},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/CholvyC97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bda/CuppensG96,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Alban Gabillon},
  editor       = {Patrick Bosc},
  title        = {Formalisation de la Confidentialit{\'{e}} dans une Base de Donn{\'{e}}es
                  {\`{a}} Objets},
  booktitle    = {12{\`{e}}mes Journ{\'{e}}es Bases de Donn{\'{e}}es Avanc{\'{e}}es,
                  27-30 Ao{\^{u}}t 1996, Cassis, France (Informal Proceedings)},
  pages        = {417},
  publisher    = {{INRIA}},
  year         = {1996},
  timestamp    = {Fri, 22 Jun 2018 07:11:37 +0200},
  biburl       = {https://dblp.org/rec/conf/bda/CuppensG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CuppensS96,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Claire Saurel},
  title        = {Specifying a security policy: a case study},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {123},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503697},
  doi          = {10.1109/CSFW.1996.503697},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/CuppensS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CuppensG96,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Alban Gabillon},
  editor       = {Pierangela Samarati and
                  Ravi S. Sandhu},
  title        = {A Logical Approach to Model a Multilevel Object-Oriented Database},
  booktitle    = {Database Security Volume X, Status and Prospects, {IFIP} {TC11} /
                  {WG11.3} Tenth International Conference on Database Security, 22-24
                  July 1996, Como, Italy},
  series       = {{IFIP} Conference Proceedings},
  volume       = {79},
  pages        = {145--166},
  publisher    = {Chapman {\&} Hall},
  year         = {1996},
  timestamp    = {Thu, 24 Oct 2002 16:14:24 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/CuppensG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/deon/CuppensD96,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Robert Demolombe},
  editor       = {Mark A. Brown and
                  Jos{\'{e}} Carmo},
  title        = {A Deontic Logic for Reasoning about Confidentiality},
  booktitle    = {Deontic Logic, Agency and Normative Systems, {DEON} '96: Third International
                  Workshop on Deontic Logic in Computer Science, Sesimbra, Portugal,
                  11-13 January 1996},
  series       = {Workshops in Computing},
  pages        = {66--79},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/978-1-4471-1488-8\_4},
  doi          = {10.1007/978-1-4471-1488-8\_4},
  timestamp    = {Mon, 24 Jun 2019 15:47:45 +0200},
  biburl       = {https://dblp.org/rec/conf/deon/CuppensD96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vldb/Cuppens96,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {T. M. Vijayaraman and
                  Alejandro P. Buchmann and
                  C. Mohan and
                  Nandlal L. Sarda},
  title        = {Querying a Multilevel Database: {A} Logical Analysis},
  booktitle    = {VLDB'96, Proceedings of 22th International Conference on Very Large
                  Data Bases, September 3-6, 1996, Mumbai (Bombay), India},
  pages        = {484--494},
  publisher    = {Morgan Kaufmann},
  year         = {1996},
  url          = {http://www.vldb.org/conf/1996/P484.PDF},
  timestamp    = {Wed, 29 Mar 2017 16:45:22 +0200},
  biburl       = {https://dblp.org/rec/conf/vldb/Cuppens96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CuppensG95,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Alban Gabillon},
  editor       = {David L. Spooner and
                  Steven A. Demurjian and
                  John E. Dobson},
  title        = {Modelling a Multilevel Database with Temporal Downgrading Functionalities},
  booktitle    = {Database Security {IX:} Status and Prospects, Proceedings of the Ninth
                  Annual {IFIP} {WG11} Working Conference on Database Security, Rensselaerville,
                  New York, USA, 13-16 August 1995},
  series       = {{IFIP} Conference Proceedings},
  volume       = {51},
  pages        = {145--164},
  publisher    = {Chapman {\&} Hall},
  year         = {1995},
  timestamp    = {Thu, 24 Oct 2002 16:18:58 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/CuppensG95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icail/CholvyC95,
  author       = {Laurence Cholvy and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {L. Thorne McCarty},
  title        = {Solving Normative Conflicts by Merging Roles},
  booktitle    = {Proceedings of the Fifth International Conference on Artificial Intelligence
                  and Law, {ICAIL} '95, College Park, Maryland, USA, May 21-24, 1995},
  pages        = {201--209},
  publisher    = {{ACM}},
  year         = {1995},
  url          = {https://doi.org/10.1145/222092.222241},
  doi          = {10.1145/222092.222241},
  timestamp    = {Tue, 06 Nov 2018 16:58:12 +0100},
  biburl       = {https://dblp.org/rec/conf/icail/CholvyC95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CholvyC94,
  author       = {Laurence Cholvy and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Joachim Biskup and
                  Matthew Morgenstern and
                  Carl E. Landwehr},
  title        = {Providing Consistent Views in a Polyinstantiated Database},
  booktitle    = {Database Security, {VIII:} Status and Prospects, Proceedings of the
                  {IFIP} {WG11.3} Working Conference on Database Security, Bad Salzdetfurth,
                  Germany, 23-26 August, 1994},
  series       = {{IFIP} Transactions},
  volume       = {{A-60}},
  pages        = {277--296},
  publisher    = {North-Holland},
  year         = {1994},
  timestamp    = {Thu, 03 Jan 2002 11:56:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/CholvyC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Boulahia-CuppensCGY94,
  author       = {Nora Boulahia{-}Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Alban Gabillon and
                  Kioumars Yazdanian},
  editor       = {Dieter Gollmann},
  title        = {Decomposition of Multilevel Objects in an Object-Oriented Database},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {875},
  pages        = {375--402},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_75},
  doi          = {10.1007/3-540-58618-0\_75},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Boulahia-CuppensCGY94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CuppensT94,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Gilles Trouessin},
  editor       = {Dieter Gollmann},
  title        = {Information Flow Controls vs Interference Controls: An Integrated
                  Approach},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {875},
  pages        = {447--468},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_78},
  doi          = {10.1007/3-540-58618-0\_78},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CuppensT94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Boulahia-CuppensC94,
  author       = {Nora Boulahia{-}Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Asynchronous composition and required security conditions},
  booktitle    = {1994 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 16-18, 1994},
  pages        = {68--78},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/RISP.1994.296591},
  doi          = {10.1109/RISP.1994.296591},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Boulahia-CuppensC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Boulahia-Cuppens93,
  author       = {Nora Boulahia{-}Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Alban Gabillon and
                  Kioumars Yazdanian},
  title        = {MultiView model for object-oriented database},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {222--231},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315437},
  doi          = {10.1109/CSAC.1993.315437},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Boulahia-Cuppens93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Cuppens93,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {A Logical Formalization of Secrecy},
  booktitle    = {6th {IEEE} Computer Security Foundations Workshop - CSFW'93, Franconia,
                  New Hampshire, USA, June 15-17, 1993, Proceedings},
  pages        = {53--62},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSFW.1993.246639},
  doi          = {10.1109/CSFW.1993.246639},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Cuppens93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/YazdanianC93,
  author       = {Kioumars Yazdanian and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Neighborhood data and database security},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {150--154},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283829},
  doi          = {10.1145/283751.283829},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/YazdanianC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/oopsla/Boulahia-CuppensCGY93,
  author       = {Nora Boulahia{-}Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Alban Gabillon and
                  Kioumars Yazdanian},
  editor       = {Bhavani Thuraisingham and
                  Ravi S. Sandhu and
                  T. C. Ting},
  title        = {Multilevel Security in Object-Oriented Databases},
  booktitle    = {Security for Object-Oriented Systems, Proceedings of the {OOPSLA-93}
                  Conference Workshop on Security for Object-Oriented Systems, Washington,
                  DC, USA, 26 September 1993},
  series       = {Workshops in Computing},
  pages        = {79--89},
  publisher    = {Springer},
  year         = {1993},
  timestamp    = {Wed, 29 Jun 2022 15:37:45 +0200},
  biburl       = {https://dblp.org/rec/conf/oopsla/Boulahia-CuppensCGY93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Cuppens93,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {A logical analysis of authorized and prohibited information flows},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {100--109},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287639},
  doi          = {10.1109/RISP.1993.287639},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Cuppens93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BieberC92,
  author       = {Pierre Bieber and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {A Logical View of Secure Dependencies},
  journal      = {J. Comput. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {99--130},
  year         = {1992},
  url          = {https://doi.org/10.3233/JCS-1992-1105},
  doi          = {10.3233/JCS-1992-1105},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BieberC92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BieberC92,
  author       = {Pierre Bieber and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Secure Dependencies with Dynamic Level Assignments},
  booktitle    = {5th {IEEE} Computer Security Foundations Workshop - CSFW'92, Franconia,
                  New Hampshire, USA, June 16-18, 1992, Proceedings},
  pages        = {63--75},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/CSFW.1992.236787},
  doi          = {10.1109/CSFW.1992.236787},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BieberC92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CuppensY92,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Kioumars Yazdanian},
  title        = {A 'natural' decomposition of multi-level relations},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {273--284},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213254},
  doi          = {10.1109/RISP.1992.213254},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/CuppensY92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/CuppensD91,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Robert Demolombe},
  title        = {Extending answers to neighbour entities in a cooperative answering
                  context},
  journal      = {Decis. Support Syst.},
  volume       = {7},
  number       = {1},
  pages        = {1--11},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-9236(91)90073-K},
  doi          = {10.1016/0167-9236(91)90073-K},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/CuppensD91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BieberC91,
  author       = {Pierre Bieber and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {A Definition of Secure Dependencies Using the Logic of Security},
  booktitle    = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia,
                  New Hampshire, USA, June 18-20, 1991, Proceedings},
  pages        = {2--11},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/CSFW.1991.151563},
  doi          = {10.1109/CSFW.1991.151563},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/BieberC91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CuppensY91,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Kioumars Yazdanian},
  editor       = {Carl E. Landwehr and
                  Sushil Jajodia},
  title        = {Logic Hints and Security in Relational Databases},
  booktitle    = {Database Security, {V:} Status and Prospects, Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Shepherdstown, West Virginia,
                  USA, 4-7 November, 1991},
  series       = {{IFIP} Transactions},
  volume       = {{A-6}},
  pages        = {227--238},
  publisher    = {North-Holland},
  year         = {1991},
  timestamp    = {Fri, 15 Feb 2002 12:14:34 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/CuppensY91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Cuppens91,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens},
  editor       = {Carl E. Landwehr and
                  Sushil Jajodia},
  title        = {A Modal Logic Framework to Solve Aggregation Problems},
  booktitle    = {Database Security, {V:} Status and Prospects, Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Shepherdstown, West Virginia,
                  USA, 4-7 November, 1991},
  series       = {{IFIP} Transactions},
  volume       = {{A-6}},
  pages        = {315--332},
  publisher    = {North-Holland},
  year         = {1991},
  timestamp    = {Fri, 15 Feb 2002 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/Cuppens91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Cuppens90,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {An Epistemic and Deontic Logic for Reasoning about Computer Security},
  booktitle    = {{ESORICS} 90 - First European Symposium on Research in Computer Security,
                  October 24-26, 1990, Toulouse, France},
  pages        = {135--145},
  publisher    = {{AFCET}},
  year         = {1990},
  timestamp    = {Mon, 26 May 2008 15:32:38 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Cuppens90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/is/CuppensD89,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Robert Demolombe},
  title        = {How to recognize interesting topics to provide cooperative answering},
  journal      = {Inf. Syst.},
  volume       = {14},
  number       = {2},
  pages        = {163--173},
  year         = {1989},
  url          = {https://doi.org/10.1016/0306-4379(89)90044-6},
  doi          = {10.1016/0306-4379(89)90044-6},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/is/CuppensD89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bda/Cuppens89,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Un langage de requ{\^{e}}tes pour obtenir des r{\'{e}}sponses
                  intelligentes},
  booktitle    = {Cinqui{\`{e}}mes Journ{\'{e}}es Bases de Donn{\'{e}}es Avanc{\'{e}}es,
                  26-28 Septembre 1989, Gen{\`{e}}ve, Suisse (Informal Proceedings)},
  pages        = {249},
  publisher    = {{INRIA}},
  year         = {1989},
  timestamp    = {Tue, 31 Oct 2006 14:02:09 +0100},
  biburl       = {https://dblp.org/rec/conf/bda/Cuppens89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bda/CuppensD88,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Robert Demolombe},
  title        = {Comment reconna{\^{\i}}tre les centres d'int{\'{e}}r{\^{e}}t
                  pour fournir des r{\'{e}}ponses coop{\'{e}}ratives},
  booktitle    = {Quatri{\`{e}}mes Journ{\'{e}}es Bases de Donn{\'{e}}es Avanc{\'{e}}es,
                  17-20 Mai 1988, B{\'{e}}nodet, France {(2} Volumes) (Informal
                  Proceedings)},
  pages        = {257--268},
  publisher    = {{INRIA}},
  year         = {1988},
  timestamp    = {Thu, 27 Sep 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bda/CuppensD88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eds/CuppensD88,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Robert Demolombe},
  editor       = {Larry Kerschberg},
  title        = {Cooperative Answering: {A} Methodology to Provide Intelligent Access
                  to databases},
  booktitle    = {Expert Database Systems, Proceedings from the Second International
                  Conference, Vienna, Virginia, USA, April 25-27, 1988},
  pages        = {621--643},
  publisher    = {Benjamin/Cummings},
  year         = {1988},
  timestamp    = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eds/CuppensD88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jcdkb/CuppensD88,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Robert Demolombe},
  editor       = {Catriel Beeri and
                  Joachim W. Schmidt and
                  Umeshwar Dayal},
  title        = {A Prolog-Relational {DBMS} Interface Using Delayed Evaluation},
  booktitle    = {Proceedings of the Third International Conference on Data and Knowledge
                  Bases: Improving Usability and Responsiveness, June 28-30, 1988, Jerusalem,
                  Israel},
  pages        = {135--148},
  publisher    = {Morgan Kaufmann},
  year         = {1988},
  url          = {https://doi.org/10.1016/b978-1-4832-1313-2.50018-4},
  doi          = {10.1016/B978-1-4832-1313-2.50018-4},
  timestamp    = {Mon, 05 Aug 2019 12:00:23 +0200},
  biburl       = {https://dblp.org/rec/conf/jcdkb/CuppensD88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics