-
1
-
-
77952407814
-
Organization based access control
-
Como, Italy, IEEE
-
A. Abou el Kalam, R.E. Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Mige, C. Saurel, and G. Trouessin Organization based access control Proceedings of the IEEE 4th International Workshop on Policies for Distributed Systems and Networks Como, Italy, IEEE 2003 120 131
-
(2003)
Proceedings of the IEEE 4th International Workshop on Policies for Distributed Systems and Networks
, pp. 120-131
-
-
Abou El Kalam, A.1
Baida, R.E.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Mige, A.7
Saurel, C.8
Trouessin, G.9
-
2
-
-
71949097552
-
PolyOrBAC: A security framework for critical infrastructures
-
A. Abou el Kalam, Y. Deswarte, A. Baïna, and M. Kaâniche PolyOrBAC: a security framework for critical infrastructures International Journal on Critical Infrastructure Protection, Springer 2 4 2009 154 169
-
(2009)
International Journal on Critical Infrastructure Protection, Springer
, vol.2
, Issue.4
, pp. 154-169
-
-
Abou El Kalam, A.1
Deswarte, Y.2
Baïna, A.3
Kaâniche, M.4
-
3
-
-
70350388459
-
MotOrBAC 2: A security policy tool
-
Loctudy, France, Editions Publibook
-
F. Autrel, F. Cuppens, N. Cuppens-Boulahia, and C. Coma MotOrBAC 2: a security policy tool Proceedings of the 3rd Joint Conference on Security in Network Architectures (SAR) and Security of Information Systems(SSI) Loctudy, France, Editions Publibook 2008 273 288
-
(2008)
Proceedings of the 3rd Joint Conference on Security in Network Architectures (SAR) and Security of Information Systems(SSI)
, pp. 273-288
-
-
Autrel, F.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Coma, C.4
-
4
-
-
70350362334
-
Reaction policy model based on dynamic organizations and threat context
-
Canada, Lecture Notes inComputer Science, Springer
-
F. Autrel, N. Cuppens-Boulahia, and F. Cuppens Reaction policy model based on dynamic organizations and threat context Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2009), vol. 5645 Canada, Lecture Notes inComputer Science, Springer 2009 49 64
-
(2009)
Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2009), Vol. 5645
, pp. 49-64
-
-
Autrel, F.1
Cuppens-Boulahia, N.2
Cuppens, F.3
-
5
-
-
84941163323
-
Formal characterization of active databases
-
Italy, Lecture Notes inComputer Science, Springer
-
C. Baral, and J. Lobo Formal characterization of active databases Proceedings of the International Workshop on Logic in Databases (LID'96), vol. 1154 Italy, Lecture Notes inComputer Science, Springer 1996 175 195
-
(1996)
Proceedings of the International Workshop on Logic in Databases (LID'96)
, vol.1154
, pp. 175-195
-
-
Baral, C.1
Lobo, J.2
-
6
-
-
79952415405
-
Formal Characterizations of Active Databases: Part II
-
Deductive and Object-Oriented Databases
-
C. Baral, J. Lobo, and G. Trajcevski Formal characterization of active databases: Part II Proceedings of the 5th International Conference on Deductive and Object-Oriented Databases, vol. 1341 Montreux, Switzerland, Lecture Notes in Computer Science, Springer 1997 247 264 (Pubitemid 127157144)
-
(1997)
Lecture Notes in Computer Science
, Issue.1341
, pp. 247-264
-
-
Baral, C.1
Lobo, J.2
Trajcevski, G.3
-
8
-
-
30644474741
-
GEO-RBAC: A spatially aware RBAC
-
DOI 10.1145/1063979.1063985, SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies
-
E. Bertino, B. Catania, M.L. Damiani, and P. Perlasca Geo-RBAC: a spatially aware RBAC Proceedings of the 10th ACM Symposium on Access control Models and Technologies Stockholm, Sweden, ACM 2005 29 37 (Pubitemid 43087458)
-
(2005)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 29-37
-
-
Bertino, E.1
Catania, B.2
Damiani, M.L.3
Perlasca, P.4
-
9
-
-
85066132860
-
A context-sensitive access control model and prototype implementation
-
Beijing, China, IFIP Conference Proceedings
-
D.G. Cholewka, R.A. Botha, and J.H.P. Eloff A context-sensitive access control model and prototype implementation Proceedings of the IFIP TC 11 16th Annual Working Conference on Information Security, vol. 175 Beijing, China, IFIP Conference Proceedings 2000 341 350
-
(2000)
Proceedings of the IFIP TC 11 16th Annual Working Conference on Information Security, Vol. 175
, pp. 341-350
-
-
Cholewka, D.G.1
Botha, R.A.2
Eloff, J.H.P.3
-
10
-
-
49049096753
-
Context ontology for secure interoperability
-
Barcelona, Spain, IEEE
-
C. Coma, N. Cuppens-Boulahia, F. Cuppens, and A. Cavalli Context ontology for secure interoperability Proceedings of the 3rd International Conference on Availability, Reliability and Security (ARES 2008) Barcelona, Spain, IEEE 2008 473 486
-
(2008)
Proceedings of the 3rd International Conference on Availability, Reliability and Security (ARES 2008)
, pp. 473-486
-
-
Coma, C.1
Cuppens-Boulahia, N.2
Cuppens, F.3
Cavalli, A.4
-
11
-
-
0035791053
-
Securing context aware applications using environment roles
-
Chantilly, Virginia, ACM
-
M. Convington, W. Long, S. Srinivasan, A.K. Dev, M. Ahamad, and G.D. Abowd Securing context aware applications using environment roles Proceedings of the 6th ACM Symposium on Access Control Models and Technologies Chantilly, Virginia, ACM 2001 10 20
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies
, pp. 10-20
-
-
Convington, M.1
Long, W.2
Srinivasan, S.3
Dev, A.K.4
Ahamad, M.5
Abowd, G.D.6
-
13
-
-
34347273369
-
High Level Conflict Management Strategies in Advanced Access Control Models
-
DOI 10.1016/j.entcs.2007.01.064, PII S1571066107004562
-
F. Cuppens, N. Cuppens-Boulahia, and B. Ben-Ghorbel High-level conflict management strategies in advanced access control models Proceedings of the Electronic Notes in Theoretical Computer Science (ENTCS 2007), vol. 186 Elsevier 2007 3 26 (Pubitemid 47001803)
-
(2007)
Electronic Notes in Theoretical Computer Science
, vol.186
, Issue.SPEC. ISS.
, pp. 3-26
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Ghorbel, M.B.3
-
14
-
-
35248881129
-
Administration model for OrBac
-
Italy, Lecture Notes in Computer Science, Springer
-
F. Cuppens, and A. Mige Administration model for OrBac Proceedings of the Workshops of OTM 2003, On The Move to Meaningful Internet Systems, vol. 2889 Italy, Lecture Notes in Computer Science, Springer 2003 754 768
-
(2003)
Proceedings of the Workshops of OTM 2003, on the Move to Meaningful Internet Systems, Vol. 2889
, pp. 754-768
-
-
Cuppens, F.1
Mige, A.2
-
15
-
-
84890861666
-
A formal approach to specify and deploy a network security policy
-
Toulouse, France, IFIP Conference Proceedings
-
F. Cuppens, N. Cuppens-Boulahia, T. Sans, and A. Mige A formal approach to specify and deploy a network security policy Proceedings of the 2nd Workshop on Formal Aspects in Security and Trust, vol. 173 Toulouse, France, IFIP Conference Proceedings 2004 203 218
-
(2004)
Proceedings of the 2nd Workshop on Formal Aspects in Security and Trust, Vol. 173
, pp. 203-218
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Sans, T.3
Mige, A.4
-
16
-
-
48249105083
-
Negotiation of prohibition: An approach based on policy rewriting
-
Italy, IFIP Conference Proceedings
-
N. Cuppens-Boulahia, F. Cuppens, D. Abi Haidar, and H. Debar Negotiation of prohibition: an approach based on policy rewriting Proceedings of the 23rd International Information Security Conference (SEC 2008), vol. 278 Italy, IFIP Conference Proceedings 2008 173 187
-
(2008)
Proceedings of the 23rd International Information Security Conference (SEC 2008), Vol. 278
, pp. 173-187
-
-
Cuppens-Boulahia, N.1
Cuppens, F.2
Abi Haidar, D.3
Debar, H.4
-
17
-
-
34547465100
-
Enabling automated threat response through the use of a dynamic security policy
-
DOI 10.1007/s11416-007-0039-z
-
H. Debar, Y. Thomas, F. Cuppens, and N. Cuppens-Boulahia Enabling automated threat response through the use of a dynamic security policy Journal in Computer Virology (JCV), Springer 3 3 2007 195 210 (Pubitemid 47167359)
-
(2007)
Journal in Computer Virology
, vol.3
, Issue.3
, pp. 195-210
-
-
Debar, H.1
Thomas, Y.2
Cuppens, F.3
Cuppens-Boulahia, N.4
-
18
-
-
33746455182
-
Using contextual security policies for threat response
-
Detection of Intrusions and Malware and Vulnerability Assessment - Third International Conference, DIMVA 2006, Proceedings
-
H. Debar, Y. Thomas, F. Cuppens, and N. Cuppens-Boulahia Using contextual security policies for threat response Proceedings of the Third GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment (DIMVA), vol. 4064 Berlin, Germany, Lecture Notes in Computer Science, Springer 2006 109 128 (Pubitemid 44124005)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4064 LNCS
, pp. 109-128
-
-
Debar, H.1
Thomas, Y.2
Boulahia-Cuppens, N.3
Cuppens, F.4
-
20
-
-
79956226973
-
-
Ensuite framework, 2010. http://ensuite.sourceforge.net/ (accessed 27.12.10).
-
(2010)
Ensuite Framework
-
-
-
21
-
-
33845446895
-
Substituting COPS-PR: An evaluation of NETCONF and SOAP for policy provisioning
-
DOI 10.1109/POLICY.2006.35, 1631173, Proceedings - Thirteenth International Symposium on Temporal Representation and Reasoning, TIME 2006
-
T. Franco, W. Lima, G. Silvestrin, R.C. Pereira, M.J. Almeida, B. Tarouco, L.M.R. Granville, L.Z. Beller, A. Jamhour, and E.M. Fonseca Substituting COPS-PR: an evaluation of NETCONF and SOAP for policy provisioning Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06) IEEE 2006 195 204 (Pubitemid 44888903)
-
(2006)
Proceedings - Seventh IEEE International Workshop on Policies for Distributed Systems and Networks, Policy 2006
, vol.2006
, pp. 195-204
-
-
Franco, T.F.1
Lima, W.Q.2
Silvestrin, G.3
Pereira, R.C.4
Almeida, M.J.B.5
Tarouco, L.M.R.6
Granville, L.Z.7
Beller, A.8
Jamhour, E.9
Fonseca, M.10
-
22
-
-
79956192392
-
-
Freeradius project
-
Freeradius project, 2010. http://freeradius.org/ (accessed 27.12.10).
-
(2010)
-
-
-
23
-
-
33750240265
-
Analysis of policy anomalies on distributed network security setups
-
Computer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Proceedings
-
J. Garcia-Alfaro, F. Cuppens, and N. Cuppens-Boulahia Analysis of policy anomalies on distributed network security setups Proceedings of the European Symposium On Research In Computer Security (Esorics), vol. 4189 Hamburg, Germany, Lecture Notes in Computer Science, Springer 2006 496 511 (Pubitemid 44609874)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4189 LNCS
, pp. 496-511
-
-
Alfaro, J.G.1
Cuppens, F.2
Cuppens-Boulahia, N.3
-
24
-
-
41849107232
-
Complete analysis of configuration rules to guarantee reliable network security policies
-
DOI 10.1007/s10207-007-0045-7
-
J. Garcia-Alfaro, N. Boulahia-Cuppens, and F. Cuppens Complete analysis of configuration rules to guarantee reliable network security policies International Journal of Information Security, Springer 7 2 2008 103 122 (Pubitemid 351493917)
-
(2008)
International Journal of Information Security
, vol.7
, Issue.2
, pp. 103-122
-
-
Alfaro, J.G.1
Boulahia-Cuppens, N.2
Cuppens, F.3
-
26
-
-
79956226865
-
Representing security policies in web information systems
-
Chiba, Japan, IEEE
-
F.J. Garcia-Clemente, G.M. Perez, J.A. Botia-Blaya, and A.F. Gomez-Skarmeta Representing security policies in web information systems Proceedings of the 14th International WWW Conference Policy Management for the Web (PM4W) Chiba, Japan, IEEE 2005 10 16
-
(2005)
Proceedings of the 14th International WWW Conference Policy Management for the Web (PM4W)
, pp. 10-16
-
-
Garcia-Clemente, F.J.1
Perez, G.M.2
Botia-Blaya, J.A.3
Gomez-Skarmeta, A.F.4
-
27
-
-
32544451794
-
Matching information security vulnerabilities to organizational security profiles: A genetic algorithm approach
-
DOI 10.1016/j.dss.2004.06.004, PII S0167923604001332
-
M. Gupta, J. Rees, A. Chaturvedi, and J. Ch Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach. In Decision Support Systems 41 2006 592 603 (Pubitemid 43233889)
-
(2006)
Decision Support Systems
, vol.41
, Issue.3
, pp. 592-603
-
-
Gupta, M.1
Rees, J.2
Chaturvedi, A.3
Chi, J.4
-
28
-
-
79952253206
-
A DSL for specifying autonomic security management strategies
-
Athens, Greece, Lecture Notes in Computer Science, Springer
-
R. He, M. Lacoste, J. Pulou, and J. Leneutre A DSL for specifying autonomic security management strategies Proceedings of the 3rd International Workshop on Autonomous and Spontaneous Security (SETOP 2010), vol. 6514 Athens, Greece, Lecture Notes in Computer Science, Springer 2010 216 230
-
(2010)
Proceedings of the 3rd International Workshop on Autonomous and Spontaneous Security (SETOP 2010), Vol. 6514
, pp. 216-230
-
-
He, R.1
Lacoste, M.2
Pulou, J.3
Leneutre, J.4
-
29
-
-
64249112993
-
SAT-solving approaches to contextaware enterprise network security management
-
J. Homer, and X. Ou SAT-solving approaches to contextaware enterprise network security management IEEE Journal on Selected Areas in Communications 27 3 2009 315 322
-
(2009)
IEEE Journal on Selected Areas in Communications
, vol.27
, Issue.3
, pp. 315-322
-
-
Homer, J.1
Ou, X.2
-
31
-
-
79956207151
-
-
Jena Java Library, 2010. http://jena.sourceforge.net/ (accessed 27.12.10).
-
(2010)
Jena Java Library
-
-
-
32
-
-
33845427407
-
A semantic context-aware access control framework for secure collaborations in pervasive computing environments
-
The Semantic Web - ISWC 2006 - 5th International Semantic Web Conference, ISWC 2006, Proceedings
-
L. Kagal, R. Montanari, O. Lassila, and A. Toninelli A semantic context-aware access control framework for secure collaborations in pervasive computing environments Proceedings of the 5th International Semantic Web Conference (ISWC 2006), vol. 4273 Athens, GA, USA, Lecture Notes in Computer Science, Springer 2006 473 486 (Pubitemid 44892050)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4273 LNCS
, pp. 473-486
-
-
Toninelli, A.1
Montanari, R.2
Kagal, L.3
Lassila, O.4
-
33
-
-
37349056999
-
Test generation from security policies specified in Or-BAC
-
DOI 10.1109/COMPSAC.2007.210, 4291133, Proceedings - 31st Annual International Computer Software and Applications Conference, COMPSAC 2007
-
K. Li, L. Mounier, and R. Groz Test generation from security policies specified in Or-BAC Proceedings of the 31st Annual International Computer Software and Applications Conference (COMPSAC 2007) IEEE, Beijing, China 2007 255 260 (Pubitemid 350301802)
-
(2007)
Proceedings - International Computer Software and Applications Conference
, vol.2
, pp. 255-260
-
-
Li, K.1
Mounier, L.2
Groz, R.3
-
34
-
-
26444568158
-
Zchaff2004: An efficient SAT solver
-
Theory and Applications of Satisfiability Testing: 7th International Conference, SAT 2004. Revised Selected Papers
-
Y.S. Mahajan, Z. Fu, and S. Malik Zchaff2004: an efficient SAT solver Proceedings of the 7th International Conference on Theory and Applications of Satisfiability Testing (SAT 2004) Springer 2004 360 375 (Pubitemid 41422894)
-
(2005)
Lecture Notes in Computer Science
, vol.3542
, pp. 360-375
-
-
Mahajan, Y.S.1
Fu, Z.2
Malik, S.3
-
36
-
-
79956222680
-
-
MotOrBAC website
-
MotOrBAC website, 2010. http://motorbac.sourceforge.net/ (accessed 27.12.10).
-
(2010)
-
-
-
38
-
-
67649816039
-
Reliable process for security policy deployment
-
Spain
-
S. Preda, F. Cuppens, N. Cuppens-Boulahia, J. Garcia-Alfaro, and L. Toutain Reliable process for security policy deployment Proceedings of the International Conference on Security and Cryptography Spain 2007 5 15
-
(2007)
Proceedings of the International Conference on Security and Cryptography
, pp. 5-15
-
-
Preda, S.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Garcia-Alfaro, J.4
Toutain, L.5
-
39
-
-
77952329338
-
A semantic context aware security policy deployment
-
Sydney, Australia, March
-
S. Preda, F. Cuppens, N. Cuppens-Boulahia, J. Garcia-Alfaro, L. Toutain, and Y. Elrakaiby A semantic context aware security policy deployment Proceedings of the ACM Symposium on Information, Computer and Communications Security Sydney, Australia, March 2009
-
(2009)
Proceedings of the ACM Symposium on Information, Computer and Communications Security
-
-
Preda, S.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Garcia-Alfaro, J.4
Toutain, L.5
Elrakaiby, Y.6
-
42
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman Role-based access control models IEEE Computer 29 2 1996 38 47
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
43
-
-
3142715261
-
Policy-based Network Management
-
Morgan Kaufmann Publishers, 1st edition
-
Strassner, C.J., 2003. Policy-based Network Management, Solutions for the Next Generation. Morgan Kaufmann Publishers, 1st edition.
-
(2003)
Solutions for the Next Generation
-
-
Strassner, C.J.1
|