-
1
-
-
4143059199
-
Organization based access control
-
Lake Como, Italy
-
A. Abou-El-kalam, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, R. El-Baida, A. Mige, C. Saurel, and G. Trouessin. Organization based access control. In IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Como, Italy, 2003.
-
(2003)
IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003)
-
-
Abou-El-kalam, A.1
Balbiani, P.2
Benferhat, S.3
Cuppens, F.4
Deswarte, Y.5
El-Baida, R.6
Mige, A.7
Saurel, C.8
Trouessin, G.9
-
2
-
-
70350388459
-
MotOrBAC 2: A security policy tool
-
Loctudy, France, October
-
F. Autrel, F. Cuppens, N. Cuppens-Boulahia, and C. Coma. MotOrBAC 2: A security policy tool. In 3rd joint SAR-SSI conference, Loctudy, France, October 2008.
-
(2008)
3rd joint SAR-SSI conference
-
-
Autrel, F.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Coma, C.4
-
3
-
-
10744225535
-
Representation and reasoning for DAML-based policy and domain services in KAoS and Nomad
-
Melbourne, Australia, July
-
J. M. Bradshaw, A. Uszok, R. Jeffers, N. Suri, P. Hayes, M. H. Burstein, A. Acquisti, B. Benyo, M. R. Breedy, M. Carvalho, D. Diller, M. Johnson, S. Kulkarni, J. Lott, M. Sierhuis, and R. V. Hoof. Representation and reasoning for DAML-based policy and domain services in KAoS and Nomad. In Autonomous Agents and Multi-Agent Systems Conference (AAMAS 2003), Melbourne, Australia, July 2003.
-
(2003)
Autonomous Agents and Multi-Agent Systems Conference (AAMAS 2003)
-
-
Bradshaw, J.M.1
Uszok, A.2
Jeffers, R.3
Suri, N.4
Hayes, P.5
Burstein, M.H.6
Acquisti, A.7
Benyo, B.8
Breedy, M.R.9
Carvalho, M.10
Diller, D.11
Johnson, M.12
Kulkarni, S.13
Lott, J.14
Sierhuis, M.15
Hoof, R.V.16
-
5
-
-
33751017347
-
A formal approach to specify and deploy a network security policy
-
Toulouse, France, August
-
F. Cuppens, N. Cuppens-Boulahia, T. Sans, and A. Miège. A formal approach to specify and deploy a network security policy. In Second Workshop on Formal Aspects in Security and Trust (FAST), Toulouse, France, August 2004.
-
(2004)
Second Workshop on Formal Aspects in Security and Trust (FAST)
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Sans, T.3
Miège, A.4
-
7
-
-
63249135157
-
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. In Workshop on Policies for Distributed Systems and Networks (POLICY2001). Lecture Notes in Computer Science, 1995, 2001.
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. In Workshop on Policies for Distributed Systems and Networks (POLICY2001). Lecture Notes in Computer Science, Vol. 1995, 2001.
-
-
-
-
8
-
-
70350716910
-
The Intrusion Detection Message Exchange Format (IDMEF)
-
March
-
H. Debar, D. Curry, and B. Feinstein. The Intrusion Detection Message Exchange Format (IDMEF). In IETF Request for Comments 4765, March 2006.
-
(2006)
IETF Request for Comments
, vol.4765
-
-
Debar, H.1
Curry, D.2
Feinstein, B.3
-
9
-
-
33746455182
-
Using contextual security policies for threat response
-
Berlin, Germany, July
-
H. Debar, Y. Thomas, N. Boulahia-Cuppens, and F. Cuppens. Using contextual security policies for threat response. In Third GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA), Berlin, Germany, July 2006.
-
(2006)
Third GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA)
-
-
Debar, H.1
Thomas, Y.2
Boulahia-Cuppens, N.3
Cuppens, F.4
-
10
-
-
35048819574
-
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation
-
Malaga, Spain
-
J. Garca-Alfara, F. Autrel, J. Borrell, S. Castillo, F. Cuppens, and G. Navarro. Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation. In 6th International Conference on Information and Communications Security (ICICS), pages 223-235, Malaga, Spain, 2004.
-
(2004)
6th International Conference on Information and Communications Security (ICICS)
, pp. 223-235
-
-
Garca-Alfara, J.1
Autrel, F.2
Borrell, J.3
Castillo, S.4
Cuppens, F.5
Navarro, G.6
-
11
-
-
33947149035
-
An ontology description for SIP security flaws
-
March
-
D. Geneiatakis and C. Lambrinoudakis. An ontology description for SIP security flaws. Computer Communications, 30(6):1367-1374, March 2007.
-
(2007)
Computer Communications
, vol.30
, Issue.6
, pp. 1367-1374
-
-
Geneiatakis, D.1
Lambrinoudakis, C.2
-
12
-
-
35148839490
-
A Translation Approach to Portable Ontology Specifications
-
T. R. Gruber. A Translation Approach to Portable Ontology Specifications. Knowledge Acquisition, 5(2):199-220, 1993.
-
(1993)
Knowledge Acquisition
, vol.5
, Issue.2
, pp. 199-220
-
-
Gruber, T.R.1
-
13
-
-
33845261379
-
Ontology-based Policy Refinement Using SWRL Rules for Management Information Definitions in OWL
-
A. Guerrero, V. Villagrá, and J. B. J.E. López de Vergara, A. Sánchez-Macián. Ontology-based Policy Refinement Using SWRL Rules for Management Information Definitions in OWL. In Lecture Notes in Computer Science, Vol 4269, pages 227-232, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4269
, pp. 227-232
-
-
Guerrero, A.1
Villagrá, V.2
López de Vergara, J.B.J.E.3
Sánchez-Macián, A.4
-
14
-
-
17644419220
-
SWRL: A Semantic Web Rule Language Combining OWL and RuleML
-
May
-
I. Horrocks, P. F. Patel-Schneider, H. Boley, S. Tabet, B. Grosof, and M. Dean. SWRL: A Semantic Web Rule Language Combining OWL and RuleML. In W3C Member Submission, May 2004.
-
(2004)
W3C Member Submission
-
-
Horrocks, I.1
Patel-Schneider, P.F.2
Boley, H.3
Tabet, S.4
Grosof, B.5
Dean, M.6
-
16
-
-
0035499176
-
Managing Vulnerabilities in Networked Systems
-
November
-
R. A. Martin. Managing Vulnerabilities in Networked Systems. IEEE Computer Magazine, 34(11):32-38, November 2001.
-
(2001)
IEEE Computer Magazine
, vol.34
, Issue.11
, pp. 32-38
-
-
Martin, R.A.1
|