-
1
-
-
77952407814
-
Organization based access control
-
Lake Come, Italy
-
Abou el Kalam, A., Baida, R. E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., and Trouessin, G. Organization Based Access Control. In IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp. 120-131, Lake Come, Italy, 2003.
-
(2003)
IEEE 4th International Workshop on Policies for Distributed Systems and Networks
, pp. 120-131
-
-
Kalam, A.E.A.1
Baida, R.E.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.M.A.6
Saurel, C.7
Trouessin, G.8
-
2
-
-
70350388459
-
Motorbac 2: A security policy tool
-
Loctudy, France, Octobre
-
Autrel, F., Cuppens, F., Cuppens-Boulahia, N., and Coma, C. MotOrBAC 2: A security policy tool. In 3rd Joint Conference on Security in Network Architectures (SAR) and Security of Information Systems (SSI), Loctudy, France, Octobre 2008.
-
(2008)
3rd Joint Conference on Security in Network Architectures (SAR) and Security of Information Systems (SSI)
-
-
Autrel, F.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Coma, C.4
-
3
-
-
33750240265
-
Analysis of policy anomalies on distributed network security setups
-
Lecture Notes in Computer Science, Hamburg, Germany, September
-
Alfaro, J. G., Cuppens, F., and Cuppens-Boulahia, N. Analysis of Policy Anomalies on Distributed Network Security Setups. In European Symposium On Research In Computer Security (Esorics), Lecture Notes in Computer Science, 4189, pp. 496-511, Hamburg, Germany, September, 2006.
-
(2006)
European Symposium on Research in Computer Security (Esorics)
, vol.4189
, pp. 496-511
-
-
Alfaro, J.G.1
Cuppens, F.2
Cuppens-Boulahia, N.3
-
4
-
-
41849107232
-
Complete analysis of configuration rules to guarantee reliable network security policies
-
April
-
Alfaro, J. G., Boulahia-Cuppens, N., and Cuppens, F. Complete Analysis of Configuration Rules to Guarantee Reliable Network Security Policies. In International Journal of Information Security, 7 (2):103-122, April 2008.
-
(2008)
International Journal of Information Security
, vol.7
, Issue.2
, pp. 103-122
-
-
Alfaro, J.G.1
Boulahia-Cuppens, N.2
Cuppens, F.3
-
7
-
-
84940102288
-
Firmato: A novel firewall management toolkit
-
Oakland, California
-
Bartal, Y., Mayer, A., Nissim, K., and Wool, A. Firmato: A novel firewall management toolkit. In 20th IEEE Symposium on Security and Privacy, Oakland, California, 1999.
-
(1999)
20th IEEE Symposium on Security and Privacy
-
-
Bartal, Y.1
Mayer, A.2
Nissim, K.3
Wool, A.4
-
8
-
-
0010647136
-
Trbac: A temporal role-based access control model
-
Bertino, E., Bonatti, P. A. and Ferrari, E. TRBAC: A temporal role-based access control model. In ACM TIS-SEC, 4 (3):191233, 2001.
-
(2001)
ACM TIS-SEC
, vol.4
, Issue.3
, pp. 191233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
9
-
-
30644474741
-
Geo-rbac: A spatially aware rbac
-
June
-
Bertino, E., Catania, B., Damiani, M. L. and Perlasca, P. Geo-rbac: a spatially aware rbac. In 10th ACM Symposium on Access control Models and Technologies, June 2005.
-
(2005)
10th ACM Symposium on Access Control Models and Technologies
-
-
Bertino, E.1
Catania, B.2
Damiani, M.L.3
Perlasca, P.4
-
10
-
-
0002937996
-
A context-sensitive access control model and prototype implementation
-
Beijing, China
-
Cholewka, D. G., Botha, R. A., and Eloff, J. H. P.. A Context-sensitive Access Control Model and Prototype Implementation. In IFIP TC 11 16th Annual Working Conference on Information Security, Beijing, China, 2000.
-
(2000)
IFIP TC 11 16th Annual Working Conference on Information Security
-
-
Cholewka, D.G.1
Botha, R.A.2
Eloff, J.H.P.3
-
11
-
-
33947132784
-
Deployment of a policy-based management system for the dynamic provision of ipsec-based vpns in ipv6 networks
-
Clemente, F., Lopez, G., Martinez, G., and Gomez-Skarmeta, A. Deployment of a Policy-Based Management System for the Dynamic Provision of IPsec-Based VPNs in IPv6 Networks. In 2005 Symposium on Applications and the Internet Workshops, pp. 10-13, 2005.
-
(2005)
2005 Symposium on Applications and the Internet Workshops
, pp. 10-13
-
-
Clemente, F.1
Lopez, G.2
Martinez, G.3
Gomez-Skarmeta, A.4
-
13
-
-
84890861666
-
A formal approach to specify and deploy a network security policy
-
Toulouse, France
-
Cuppens, F., Cuppens-Boulahia, N., Sans, T. and Miege, A. A formal approach to specify and deploy a network security policy. In 2nd Workshop on Formal Aspects in Security and Trust, pp. 203-218, Toulouse, France, 2004.
-
(2004)
2nd Workshop on Formal Aspects in Security and Trust
, pp. 203-218
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Sans, T.3
Miege, A.4
-
14
-
-
48249105083
-
Negotiation of prohibition: An approach based on policy rewriting
-
Italy, September
-
Cuppens-Boulahia, N., Cuppens, F., Abi Haidar, D. and Debar H. Negotiation of Prohibition: An Approach Based on Policy Rewriting. In 23rd International Information Security Conference (SEC 2008), Italy, September 2008.
-
(2008)
23rd International Information Security Conference (SEC 2008)
-
-
Cuppens-Boulahia, N.1
Cuppens, F.2
Haidar, A.D.3
Debar, H.4
-
15
-
-
34547465100
-
Enabling automated threat response through the use of a dynamic security policy
-
Debar, H., Thomas, Y., Cuppens, F. and Cuppens-Boulahia, N. Enabling Automated Threat Response through the Use of a Dynamic Security Policy. In Journal in Computer Virology (JCV), 3 (3):195-210, 2007.
-
(2007)
Journal in Computer Virology (JCV)
, vol.3
, Issue.3
, pp. 195-210
-
-
Debar, H.1
Thomas, Y.2
Cuppens, F.3
Cuppens-Boulahia, N.4
-
16
-
-
63249104009
-
Using contextual security policies for threat response
-
Berlin, Germany
-
Debar, H., Thomas, Y., Cuppens, F. and Cuppens-Boulahia, N. Using contextual security policies for threat response. In Third GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA), Berlin, Germany, 2006.
-
(2006)
Third GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA)
-
-
Debar, H.1
Thomas, Y.2
Cuppens, F.3
Cuppens-Boulahia, N.4
-
17
-
-
33845446895
-
Substituting COPS-PR: An evaluation of netconf and soap for policy provisioning
-
USA
-
Franco, T., Lima, W., Silvestrin, G., Pereira, R. C., Almeida, M. J. B, Tarouco, L. M. R., Granville, L. Z., Beller, A., Jamhour, E., and Fonseca, M. Substituting COPS-PR: An Evaluation of NETCONF and SOAP for Policy Provisioning. In 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06), pp. 195-204, USA, 2006.
-
(2006)
7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)
, pp. 195-204
-
-
Franco, T.1
Lima, W.2
Silvestrin, G.3
Pereira, R.C.4
Almeida, M.J.B.5
Tarouco, L.M.R.6
Granville, L.Z.7
Beller, A.8
Jamhour, E.9
Fonseca, M.10
-
19
-
-
77952376051
-
-
IETF Netconf Working Group. On-line. Available from
-
IETF Netconf Working Group. [On-line]. Available from: http://www.ops.ietf.org/netconf/.
-
-
-
-
21
-
-
77952408397
-
-
Permis project. On-line. Available from
-
Permis project. [On-line]. Available from: http://sec.cs.kent.ac.uk/ permis/.
-
-
-
-
22
-
-
67649816039
-
Reliable process for security policy deployment
-
Spain
-
Preda, S., Cuppens, F., Cuppens-Boulahia, N., Alfaro, J. G., and Toutain, L. Reliable Process for Security Policy Deployment. In International Conf. on Security and Cryptography, Spain, 2007.
-
(2007)
International Conf. on Security and Cryptography
-
-
Preda, S.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Alfaro, J.G.4
Toutain, L.5
-
23
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., Coyne, E. J., Feinstein, H. L., and Youman, C. E. Role-Based Access Control Models. In IEEE Computer, 29 (2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
24
-
-
77952372424
-
-
Shibboleth system. On-line. Available from
-
Shibboleth system. [On-line]. Available from: http://shibboleth. internet2.edu/.
-
-
-
-
26
-
-
3543075969
-
A mobile-agent based distributed dynamic μfirewall architecture
-
Xian, F., Jin, H., Liu, K. and Han, Z. A Mobile-Agent based Distributed Dynamic μFirewall Architecture. In 9th International Conf. on Parallel and Distributed Systems, pp. 431-436, 2002.
-
(2002)
9th International Conf. on Parallel and Distributed Systems
, pp. 431-436
-
-
Xian, F.1
Jin, H.2
Liu, K.3
Han, Z.4
|