Jocelyn Aubert

Orcid: 0000-0003-1233-4043

According to our database1, Jocelyn Aubert authored at least 27 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The PRECINCT Ecosystem Platform for Critical Infrastructure Protection: Architecture, Deployment and Transferability.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2022
A Participative and Collaborative Approach for Security Risk Management Modelling in the Context of Essential Services.
Proceedings of the Information Systems and Technologies, 2022

2019
An integrated conceptual model for information system security risk management supported by enterprise architecture management.
Softw. Syst. Model., 2019

2018
Coalition-OrBAC: An Agent-Based Access Control Model for Dynamic Coalitions.
Proceedings of the Trends and Advances in Information Systems and Technologies, 2018

Evaluation of Cloud Computing Offers through Security Risks - An Industrial Case Study.
Proceedings of the 8th International Conference on Cloud Computing and Services Science, 2018

2017
An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management based on TOGAF, ArchiMate, IAF and DoDAF.
CoRR, 2017

Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics.
Proceedings of the 8th International Conference on Ambient Systems, 2017

2016
The TISRIM-Telco Toolset - An IT Regulatory Framework to Support Security Compliance in the Telecommunications Sector.
ERCIM News, 2016

Defining measurements for analyzing information security risk reports in the telecommunications sector.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF.
Proceedings of the Practice of Enterprise Modeling, 2016

2015
Participative Design of a Security Risk Reference Model: an Experience in the Healthcare Sector.
Proceedings of Short and Doctoral Consortium Papers Presented at the 8th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modelling (PoEM 2015), 2015

2014
Sector-Specific Tool for Information Security Risk Management in the Context of Telecommunications Regulation (Tool demo).
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

2013
Preliminary Requirements on Trusted Third Parties for Service Transactions in Cloud Environments.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Sector-Based Improvement of the Information Security Risk Management Process in the Context of Telecommunications Regulation.
Proceedings of the Systems, Software and Services Process Improvement, 2013

2012
Design and implementation of a mediation system enabling secure communication among Critical Infrastructures.
Int. J. Crit. Infrastructure Prot., 2012

Towards Cloud Computing SLA Risk Management: Issues and Challenges.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Service Level Agreements as a Service - Towards Security Risks Aware SLA Management.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

2011
Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures.
Proceedings of the Critical Information Infrastructure Security, 2011

Trust based interdependency weighting for on-line risk monitoring in interdependent critical infrastructures.
Proceedings of the CRiSIS 2011, 2011

2010
IT Security: Risk-Based Prediction Tool and Method for Critical Infrastructures.
ERCIM News, 2010


Programming Electronic Institutions with Utopia.
Proceedings of the Information Systems Evolution, 2010

A Security Decision-Reaction Architecture for Heterogeneous Distributed Network.
Proceedings of the ARES 2010, 2010

Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures.
Proceedings of the ARES 2010, 2010

2009
Methodology to Align Business and IT Policies: Use Case from an IT Company.
Proceedings of the The Forth International Conference on Availability, 2009

2008
An agent-based framework for identity management: The unsuspected relation with ISO/IEC 15504.
Proceedings of the IEEE International Conference on Research Challenges in Information Science, 2008

If only I can trust my police! SIM : An agent-based audit solution of access right deployment through open network.
Proceedings of the CRiSIS '08, 2008


  Loading...