Frédéric Cuppens

Orcid: 0000-0003-1124-2200

According to our database1, Frédéric Cuppens authored at least 299 papers between 1988 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Adversarial robustness of deep reinforcement learning-based intrusion detection.
Int. J. Inf. Sec., December, 2024

Trustless Distributed Symmetric-key Encryption.
CoRR, 2024

Diffusion-based Adversarial Purification for Intrusion Detection.
CoRR, 2024

Robust Deep Reinforcement Learning Through Adversarial Attacks and Training : A Survey.
CoRR, 2024

How to Better Fit Reinforcement Learning for Pentesting: A New Hierarchical Approach.
Proceedings of the Computer Security - ESORICS 2024, 2024

Optimal Automated Generation of Playbooks.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

2023
Foreword of the special issue on « FPS 2021» symposium.
Ann. des Télécommunications, August, 2023

Cybersecurity in networking: adaptations, investigation, attacks, and countermeasures.
Ann. des Télécommunications, April, 2023

Automated Enrichment of Logical Attack Graphs via Formal Ontologies.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

Security assessment of a commercial router using physical access: a case study.
Proceedings of the 34th International Workshop on Rapid System Prototyping, 2023

Automated Attacker Behaviour Classification Using Threat Intelligence Insights.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Trust Management Framework for Containerized Workloads Applications to 5G Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

Parameterizing poisoning attacks in federated learning-based intrusion detection.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Real-Time Defensive Strategy Selection via Deep Reinforcement Learning.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Ontology-based Attack Graph Enrichment.
CoRR, 2022

Investigating the practicality of adversarial evasion attacks on network intrusion detection.
Ann. des Télécommunications, 2022

Attacker Attribution via Characteristics Inference Using Honeypot Data.
Proceedings of the Network and System Security - 16th International Conference, 2022

Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Deep Reinforcement Learning-Based Defense Strategy Selection.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Special issue on risk and security of smart systems.
J. Inf. Secur. Appl., 2021

MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT.
IEEE Internet Things J., 2021

Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming.
Comput. Networks, 2021

Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics.
IEEE Access, 2021

Asymptotic Random Distortion Testing and Application to Change-in-Mean Detection.
Proceedings of the 10th International Symposium on Signal, Image, Video and Communications, 2021

2020
Privacy-Preserving Pattern Matching on Encrypted Data.
IACR Cryptol. ePrint Arch., 2020

Metrics to Enhance the Resilience of Cyber-Physical Systems.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Accountability in the A Posteriori Access Control: A Requirement and a Mechanism.
Proceedings of the Quality of Information and Communications Technology, 2020

Formalization of a security access control model for the 5G system.
Proceedings of the 11th International Conference on Network of the Future, 2020

IANVS: A Moving Target Defense Framework for a Resilient Internet of Things.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

A Priority-Based Domain Type Enforcement for Exception Management.
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020

Managing Secure Inter-slice Communication in 5G Network Slice Chains.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

Network Functions Virtualization Access Control as a Service.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

A Deeper Analysis of Adversarial Examples in Intrusion Detection.
Proceedings of the Risks and Security of Internet and Systems, 2020

A Posteriori Analysis of Policy Temporal Compliance.
Proceedings of the Risks and Security of Internet and Systems, 2020

PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020

Norms and Deontic Logic.
Proceedings of the A Guided Tour of Artificial Intelligence Research: Volume I: Knowledge Representation, 2020

2019
Misconfiguration Management of Network Security Components.
CoRR, 2019

Defining a communication service management function for 5G network slices.
Proceedings of the European Conference on Networks and Communications, 2019

Semantic Mediation for A Posteriori Log Analysis.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Managing the Overestimation of Resilience.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Substring search over encrypted data.
J. Comput. Secur., 2018

Achieving dynamicity in security policies enforcement using aspects.
Int. J. Inf. Sec., 2018

Detection and Response to Data Exfiltration from Internet of Things Android Devices.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

CoAP Enhancement for a Better IoT Centric Protocol: CoAP 2.0.
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018

USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Linking Differential Identifiability with Differential Privacy.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

Towards the Evaluation of End-to-End Resilience Through External Consistency.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense.
Proceedings of the Risks and Security of Internet and Systems, 2018

A Certificate-Less Key Exchange Protocol for IoT.
Proceedings of the Risks and Security of Internet and Systems, 2018

Optimal Distribution of Privacy Budget in Differential Privacy.
Proceedings of the Risks and Security of Internet and Systems, 2018

A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems.
Proceedings of the Risks and Security of Internet and Systems, 2018

Stratification Based Model for Security Policy with Exceptions and Contraries to Duty.
Proceedings of the From Database to Cyber Security, 2018

Demo: Do Not Trust Your Neighbors! A Small IoT Platform Illustrating a Man-in-the-Middle Attack.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018

2017
Detection of Side Channel Attacks Based on Data Tainting in Android Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems.
Proceedings of the Information Systems Security - 13th International Conference, 2017

wIDS: A Multilayer IDS for Wireless-Based SCADA Systems.
Proceedings of the Information Systems Security - 13th International Conference, 2017

wirelessOrBAC: Towards an access-control-based IDS for Wireless Sensor Networks.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

Firewall Policies Provisioning Through SDN in the Cloud.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Enabling Trust Assessment In Clouds-of-Clouds: A Similarity-Based Approach.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform.
World Wide Web, 2016

Software Defined Networking Reactive Stateful Firewall.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Towards a new generation of industrial firewalls: Operational-process aware filtering.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Toward an off-line analysis of obligation with deadline policies.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Tracking Explicit and Control Flows in Java and Native Android Apps Code.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Building a Fair System Using Access Rights.
Proceedings of the Information Systems Security - 12th International Conference, 2016

Vulnerability Analysis of Software Defined Networking.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Multi-Criteria Recommender Approach for Supporting Intrusion Response System.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Security Analysis of WirelessHART Communication Scheme.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

A Proactive Stateful Firewall for Software Defined Networking.
Proceedings of the Risks and Security of Internet and Systems, 2016

Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Mining a high level access control policy in a network with multiple firewalls.
J. Inf. Secur. Appl., 2015

Deployment of a posteriori access control using IHE ATNA.
Int. J. Inf. Sec., 2015

Dynamic Security Policies Enforcement and Adaptation Using Aspects.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Dynamic deployment of access and usage control policies using aspects.
Proceedings of the International Conference on Protocol Engineering, 2015

Data Quality Evaluation in Medical Database Watermarking.
Proceedings of the Digital Healthcare Empowering Europeans, 2015

Similarity Measure for Security Policies in Service Provider Selection.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Security Mechanisms Planning to Enforce Security Policies.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

On the Fly Design and Co-simulation of Responses Against Simultaneous Attacks.
Proceedings of the Computer Security - ESORICS 2015, 2015

WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks Simulator.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

Privacy Preserving Record Matching Using Automated Semi-trusted Broker.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Context Aware Intrusion Response Based on Argumentation Logic.
Proceedings of the Risks and Security of Internet and Systems, 2015

Security Issue of WirelessHART Based SCADA Systems.
Proceedings of the Risks and Security of Internet and Systems, 2015

2014
Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation.
IEEE Trans. Inf. Forensics Secur., 2014

KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems.
J. Netw. Comput. Appl., 2014

Log content extraction engine based on ontology for the purpose of a posteriori access control.
Int. J. Knowl. Learn., 2014

Conflict detection in obligation with deadline policies.
EURASIP J. Inf. Secur., 2014

Privacy query rewriting algorithm instrumented by a privacy-aware access control model.
Ann. des Télécommunications, 2014

Car2X Communication - Putting Security Negotiation into Practice.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

Reaching Agreement in Security Policy Negotiation.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Optimized and controlled provisioning of encrypted outsourced data.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Specifying and enforcing constraints in dynamic access control policies.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Adapted Quantization Index Modulation for Database Watermarking.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Détection de flux de contrôle illégaux dans les Smartphones.
Proceedings of the Actes du XXXIIème Congrès INFORSID, Lyon, France, 20-23 Mai 2014., 2014

Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Metric for Security Activities Assisted by Argumentative Logic.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Ontology-guided distortion control for robust-lossless database watermarking: Application to inpatient hospital stay records.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

ELITE: zEro Links Identity managemenT systEm.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Specification and Deployment of Integrated Security Policies for Outsourced Data.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting.
IEEE Trans. Inf. Forensics Secur., 2013

PAIRSE: a privacy-preserving service-oriented data integration system.
SIGMOD Rec., 2013

Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Formal specification and management of security policies with collective group obligations.
J. Comput. Secur., 2013

Semantic analysis of role mining results and shadowed roles detection.
Inf. Secur. Tech. Rep., 2013

Editorial.
J. Inf. Secur. Appl., 2013

Smatch: Formal dynamic session management model for RBAC.
J. Inf. Secur. Appl., 2013

Management of stateful firewall misconfiguration.
Comput. Secur., 2013

A privacy-aware access control model for distributed network monitoring.
Comput. Electr. Eng., 2013

Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

Formal Characterization of Illegal Control Flow in Android System.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Security Aspects: A Framework for Enforcement of Security Policies Using AOP.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Define privacy-preserving setbase drawer size standard: A ∊-closeness perspective.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Model-Driven Extraction and Analysis of Network Security Policies.
Proceedings of the Model-Driven Engineering Languages and Systems, 2013

Fine-grained privacy control for the RFID middleware of EPCglobal networks.
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, 2013

IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices.
Proceedings of the Advances in Communication Networking, 2013

Towards an Access-Control Metamodel for Web Content Management Systems.
Proceedings of the Current Trends in Web Engineering, 2013

Semantic search over encrypted data.
Proceedings of the 20st International Conference on Telecommunications, 2013

Confidentiality-Preserving Query Execution of Fragmented Outsourced Data.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

PrivComp: a privacy-aware data service composition system.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Reverse Engineering of Database Security Policies.
Proceedings of the Database and Expert Systems Applications, 2013

Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Privacy-enhanced filtering and collection middleware in EPCglobal networks.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Secure and Privacy-Preserving Execution Model for Data Services.
Proceedings of the Advanced Information Systems Engineering, 2013

Conflict Management in Obligation with Deadline Policies.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Role Mining to Assist Authorization Governance: How Far Have We Gone?
Int. J. Secur. Softw. Eng., 2012

Formal enforcement and management of obligation policies.
Data Knowl. Eng., 2012

Towards Dynamic Risk Management: Success Likelihood of Ongoing Attacks.
Bell Labs Tech. J., 2012

Handling Stateful Firewall Anomalies.
Proceedings of the Information Security and Privacy Research, 2012

A model-driven approach for the extraction of network access-control policies.
Proceedings of the Model-Driven Security Workshop, 2012

Enabling Dynamic Security Policy in the Java Security Manager.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

Towards a Temporal Response Taxonomy.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

Towards Session-Aware RBAC Delegation: Function Switch.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

Robust lossless watermarking based on circular interpretation of bijective transformations for the protection of medical databases.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012

Adaptive Access Control Enforcement in Social Network Using Aspect Weaving.
Proceedings of the Database Systems for Advanced Applications, 2012

Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Privacy Policy Preferences Enforced by SPARQL Query Rewriting.
Proceedings of the Seventh International Conference on Availability, 2012

Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Multilevel Security Policies.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Cover Story.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Dynamic deployment of context-aware access control policies for constrained security devices.
J. Syst. Softw., 2011

An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations.
Int. J. Mob. Comput. Multim. Commun., 2011

Delegation of Obligations and Responsibility.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Privacy Enforcement of Composed Services in Cellular Networks.
Proceedings of the 11th Annual International Conference on New Technologies of Distributed Systems, 2011

Consistency Policies for Dynamic Information Systems with Declassification Flows.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress.
Proceedings of the Foundations and Practice of Security, 2011

Using Requirements Engineering in an Automatic Security Policy Derivation Process.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Reversible watermarking based on invariant image classification and dynamical error histogram shifting.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

Declassification Policy Management in Dynamic Information Systems.
Proceedings of the Sixth International Conference on Availability, 2011

Smatch Model: Extending RBAC Sessions in Virtualization Environment.
Proceedings of the Sixth International Conference on Availability, 2011

2010
A delegation model for extended RBAC.
Int. J. Inf. Sec., 2010

Managing Delegation in Access Control Models
CoRR, 2010

Watermarking to Enforce Medical Image Access and Usage Control Policy.
Proceedings of the Sixth International Conference on Signal-Image Technology and Internet-Based Systems, 2010

Privacy Administration in Distributed Service Infrastructure.
Proceedings of the Security and Privacy in Communication Networks, 2010

Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Risk-Aware Framework for Activating and Deactivating Policy-Based Response.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Service Dependencies in Information Systems Security.
Proceedings of the Computer Network Security, 2010

Expression and enforcement of confidentiality policy in active databases.
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010

Negotiating and delegating obligations.
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010

Rewriting of SPARQL/Update Queries for Securing Data Access.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Model-Driven Security Policy Deployment: Property Oriented Approach.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

A Service Dependency Model for Cost-Sensitive Intrusion Response.
Proceedings of the Computer Security, 2010

MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

<i>f</i>Query: SPARQL Query Rewriting to Enforce Data Confidentiality.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010

Intelligent response system to mitigate the success likelihood of ongoing attacks.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

Architecture-Aware Adaptive Deployment of Contextual Security Policies.
Proceedings of the ARES 2010, 2010

From Contextual Permission to Dynamic Pre-obligation: An Integrated Approach.
Proceedings of the ARES 2010, 2010

2009
An ontology-based approach to react to network attacks.
Int. J. Inf. Comput. Secur., 2009

XeNA: an access negotiation framework using XACML.
Ann. des Télécommunications, 2009

An Extended Role-Based Access Control Model for Delegating Obligations.
Proceedings of the Trust, 2009

Modeling and Controlling Downgrading Operations in Information Systems.
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009

Formalization and Management of Group Obligations.
Proceedings of the POLICY 2009, 2009

From state-based to event-based contextual security policies.
Proceedings of the Fourth IEEE International Conference on Digital Information Management, 2009

Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

Contextual Privacy Management in Extended Role Based Access Control Model.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

A Service Dependency Modeling Framework for Policy-Based Response Enforcement.
Proceedings of the Detection of Intrusions and Malware, 2009

Reaction Policy Model Based on Dynamic Organizations and Threat Context.
Proceedings of the Data and Applications Security XXIII, 2009

Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

A secured delegation of remote services on IPv6 home networks.
Proceedings of the CRiSIS 2009, 2009

Semantic context aware security policy deployment.
Proceedings of the 2009 ACM Symposium on Information, 2009

Deploying Security Policy in Intra and Inter Workflow Management Systems.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Complete analysis of configuration rules to guarantee reliable network security policies.
Int. J. Inf. Sec., 2008

Modeling contextual security policies.
Int. J. Inf. Sec., 2008

Deploying Access and Flow Control in Distributed Workflows.
J. Res. Pract. Inf. Technol., 2008

Expression and Deployment of Reaction Policies.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

Interoperability of Context Based System Policies Using O2O Contract.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

Interactivity for Reactive Access Control.
Proceedings of the SECRYPT 2008, 2008

Negotiation of Prohibition: An Approach Based on Policy Rewriting.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A Robust Reputation Scheme for Decentralized Group Management Systems.
Proceedings of the Information Systems Security, 4th International Conference, 2008

Revocation Schemes for Delegation Licences.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic.
Proceedings of the Deontic Logic in Computer Science, 9th International Conference, 2008

Automated reaction based on risk analysis and attackers skills in intrusion detection systems.
Proceedings of the CRiSIS '08, 2008

An ontology-based approach to react to network attacks.
Proceedings of the CRiSIS '08, 2008

Evaluating the Trustworthiness of Contributors in a Collaborative Environment.
Proceedings of the Collaborative Computing: Networking, 2008

Deploying Access Control in Distributed Workflow.
Proceedings of the Sixth Australasian Information Security Conference, 2008

Managing access and flow control requirements in distributed workflows.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

Context Ontology for Secure Interoperability.
Proceedings of the The Third International Conference on Availability, 2008

2007
Enabling automated threat response through the use of a dynamic security policy.
J. Comput. Virol., 2007

A Framework to Enforce Access Control, Usage Control and Obligations.
Ann. des Télécommunications, 2007

Introduction Selection of articles from the SAR-SSI 2006.
Ann. des Télécommunications, 2007

Reliable Process for Security Policy Deployment.
Proceedings of the SECRYPT 2007, 2007

OPA: Onion Policy Administration Model - Another approach to manage rights in DRM.
Proceedings of the New Approaches for Security, 2007

Management of Exceptions on Access Control Policies.
Proceedings of the New Approaches for Security, 2007

A formal approach for testing security rules.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Misbehaviors Detection to Ensure Availability in OLSR.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

XML-BB: A Model to Handle Relationships Protection in XML Documents.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Advanced Reaction Using Risk Assessment in Intrusion Detection Systems.
Proceedings of the Critical Information Infrastructures Security, 2007

Security policy compliance with violation management.
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007

An Integrated Model for Access Control and Information Flow Requirements.
Proceedings of the Advances in Computer Science, 2007

Resource Classification Based Negotiation in Web Services.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Aggregating and Deploying Network Access Control Policies.
Proceedings of the The Second International Conference on Availability, 2007

2006
High Level Conflict Management Strategies in Advanced Access Control Models.
Proceedings of the First Workshop in Information and Computer Security, 2006

Foreword.
Ann. des Télécommunications, 2006

Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework.
Ann. des Télécommunications, 2006

CRIM: un module de corrélation d'alertes et de réaction aux attaques.
Ann. des Télécommunications, 2006

An extended RBAC profile of XACML.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

A Flexible and Distributed Architecture to Enforce Dynamic Access Control.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Detecting Known and Novel Network Intrusions.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Towards Filtering and Alerting Rule Rewriting on Single-Component Policies.
Proceedings of the Computer Safety, 2006

O2O: Virtual Private Organizations to Manage Security Policy Interoperability.
Proceedings of the Information Systems Security, Second International Conference, 2006

Detecting and Reacting against Distributed Denial of Service Attacks.
Proceedings of IEEE International Conference on Communications, 2006

Analysis of Policy Anomalies on Distributed Network Security Setups.
Proceedings of the Computer Security, 2006

Using Contextual Security Policies for Threat Response.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006

FORM : A Federated Rights Expression Model for Open DRM Frameworks.
Proceedings of the Advances in Computer Science, 2006

Availability Enforcement by Obligations and Aspects Identification.
Proceedings of the The First International Conference on Availability, 2006

2005
Protecting On-Line Casinos against Fraudulent Player Drop-Out.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Protection of Relationships in XML Documents with the XML-BB Model.
Proceedings of the Information Systems Security, First International Conference, 2005

Nomad: A Security Model with Non Atomic Actions and Deadlines.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

2004
Détection d'intrusions : corrélation d'alertes.
Tech. Sci. Informatiques, 2004

AdOrBAC: an administration model for Or-BAC.
Comput. Syst. Sci. Eng., 2004

Utilisation de la corrélation pondérée dans un processus de détection d'intrusions.
Ann. des Télécommunications, 2004

Health care and social inference systems: An unauthorized inference control based on fuzzy logic.
Proceedings of the Security In Information Systems, 2004

A Formal Approach to Specify and Deploy a Network Security Policy.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Selecting Appropriate Counter-Measures in an Intrusion Detection Framework.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

2003
A stratification-based approach for handling conflicts in access control.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

Organization based access contro.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

Administration Model for Or-BAC.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

Enhanced Correlation in an Intrusion Detection Process.
Proceedings of the Computer Network Security, 2003

A Possibilistic Logic Encoding of Access Control.
Proceedings of the Sixteenth International Florida Artificial Intelligence Research Society Conference, 2003

Modelling Contexts in the Or-BAC Model.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Alert Correlation in a Cooperative Intrusion Detection Framework.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Recognizing Malicious Intention in an Intrusion Detection Process.
Proceedings of the Soft Computing Systems - Design, Management and Applications, 2002

2001
Merging regulations: Analysis of a practical example.
Int. J. Intell. Syst., 2001

Fusion: General concepts and characteristics.
Int. J. Intell. Syst., 2001

Cover story management.
Data Knowl. Eng., 2001

Managing Alerts in a Multi-Intrusion Detection Environmen.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
LAMBDA: A Language to Model a Database for Detection of Attacks.
Proceedings of the Recent Advances in Intrusion Detection, Third International Workshop, 2000

LExIS: A Query Language to Scan Information Flow.
Proceedings of the Natural Language Processing and Information Systems, 2000

1999
Logical Foundations of Multilevel Databases.
Data Knowl. Eng., 1999

1998
A Logical Formalization of Integrity Policies for Database Management Systems.
Proceedings of the Integrity and Internal Control in Information Systems, 1998

Rules for Designing Multilevel Object-Oriented Databases.
Proceedings of the Computer Security, 1998

SACADDOS: A Support Tool to Manage Multilevel Documents.
Proceedings of the Database Security XII: Status and Prospects, 1998

Merging Security Policies: Analysis of a Practical Example.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1997
Analyzing Consistency of Security Policies.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

A Modal Logical Framework for Security Policies.
Proceedings of the Foundations of Intelligent Systems, 10th International Symposium, 1997

Towards a Logical Formalization of Responsibility.
Proceedings of the Sixth International Conference on Artificial Intelligence and Law, 1997

1996
Querying a Multilevel Database: A Logical Analysis.
Proceedings of the VLDB'96, 1996

A Deontic Logic for Reasoning about Confidentiality.
Proceedings of the Deontic Logic, Agency and Normative Systems, 1996

A Logical Approach to Model a Multilevel Object-Oriented Database.
Proceedings of the Database Security Volume X, 1996

Specifying a security policy: a case study.
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996

Formalisation de la Confidentialité dans une Base de Données à Objets.
Proceedings of the 12èmes Journées Bases de Données Avancées, 1996

1995
Solving Normative Conflicts by Merging Roles.
Proceedings of the Fifth International Conference on Artificial Intelligence and Law, 1995

Modelling a Multilevel Database with Temporal Downgrading Functionalities.
Proceedings of the Database Security IX: Status and Prospects, 1995

1994
Asynchronous composition and required security conditions.
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

Information Flow Controls vs Interference Controls: An Integrated Approach.
Proceedings of the Computer Security, 1994

Decomposition of Multilevel Objects in an Object-Oriented Database.
Proceedings of the Computer Security, 1994

Providing Consistent Views in a Polyinstantiated Database.
Proceedings of the Database Security, 1994

1993
A logical analysis of authorized and prohibited information flows.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

Multilevel Security in Object-Oriented Databases.
Proceedings of the Security for Object-Oriented Systems, 1993

Neighborhood data and database security.
Proceedings of the Proceedings on the 1992-1993 Workshop on New Security Paradigms, 1993

A Logical Formalization of Secrecy.
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993

MultiView model for object-oriented database.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993

1992
A Logical View of Secure Dependencies.
J. Comput. Secur., 1992

A 'natural' decomposition of multi-level relations.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

Secure Dependencies with Dynamic Level Assignments.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992

1991
Extending answers to neighbour entities in a cooperative answering context.
Decis. Support Syst., 1991

Logic Hints and Security in Relational Databases.
Proceedings of the Database Security, 1991

A Modal Logic Framework to Solve Aggregation Problems.
Proceedings of the Database Security, 1991

A Definition of Secure Dependencies Using the Logic of Security.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

1990
An Epistemic and Deontic Logic for Reasoning about Computer Security.
Proceedings of the ESORICS 90, 1990

1989
How to recognize interesting topics to provide cooperative answering.
Inf. Syst., 1989

Un langage de requêtes pour obtenir des résponses intelligentes.
Proceedings of the Cinquièmes Journées Bases de Données Avancées, 1989

1988
A Prolog-Relational DBMS Interface Using Delayed Evaluation.
Proceedings of the Third International Conference on Data and Knowledge Bases: Improving Usability and Responsiveness, 1988

Cooperative Answering: A Methodology to Provide Intelligent Access to databases.
Proceedings of the Expert Database Systems, 1988

Comment reconnaître les centres d'intérêt pour fournir des réponses coopératives.
Proceedings of the Quatrièmes Journées Bases de Données Avancées, 1988


  Loading...