Jocelyn Aubert
Orcid: 0000-0003-1233-4043
According to our database1,
Jocelyn Aubert
authored at least 27 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
The PRECINCT Ecosystem Platform for Critical Infrastructure Protection: Architecture, Deployment and Transferability.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2022
A Participative and Collaborative Approach for Security Risk Management Modelling in the Context of Essential Services.
Proceedings of the Information Systems and Technologies, 2022
2019
An integrated conceptual model for information system security risk management supported by enterprise architecture management.
Softw. Syst. Model., 2019
2018
Proceedings of the Trends and Advances in Information Systems and Technologies, 2018
Evaluation of Cloud Computing Offers through Security Risks - An Industrial Case Study.
Proceedings of the 8th International Conference on Cloud Computing and Services Science, 2018
2017
An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management based on TOGAF, ArchiMate, IAF and DoDAF.
CoRR, 2017
Proceedings of the 8th International Conference on Ambient Systems, 2017
2016
The TISRIM-Telco Toolset - An IT Regulatory Framework to Support Security Compliance in the Telecommunications Sector.
ERCIM News, 2016
Defining measurements for analyzing information security risk reports in the telecommunications sector.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF.
Proceedings of the Practice of Enterprise Modeling, 2016
2015
Participative Design of a Security Risk Reference Model: an Experience in the Healthcare Sector.
Proceedings of Short and Doctoral Consortium Papers Presented at the 8th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modelling (PoEM 2015), 2015
2014
Sector-Specific Tool for Information Security Risk Management in the Context of Telecommunications Regulation (Tool demo).
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
2013
Preliminary Requirements on Trusted Third Parties for Service Transactions in Cloud Environments.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
Sector-Based Improvement of the Information Security Risk Management Process in the Context of Telecommunications Regulation.
Proceedings of the Systems, Software and Services Process Improvement, 2013
2012
Design and implementation of a mediation system enabling secure communication among Critical Infrastructures.
Int. J. Crit. Infrastructure Prot., 2012
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
Service Level Agreements as a Service - Towards Security Risks Aware SLA Management.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012
2011
Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures.
Proceedings of the Critical Information Infrastructure Security, 2011
Trust based interdependency weighting for on-line risk monitoring in interdependent critical infrastructures.
Proceedings of the CRiSIS 2011, 2011
2010
ERCIM News, 2010
Improving Resilience of Interdependent Critical Infrastructures via an On-Line Alerting System.
Proceedings of the Complexity in Engineering, 2010
Proceedings of the Information Systems Evolution, 2010
Proceedings of the ARES 2010, 2010
Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures.
Proceedings of the ARES 2010, 2010
2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
An agent-based framework for identity management: The unsuspected relation with ISO/IEC 15504.
Proceedings of the IEEE International Conference on Research Challenges in Information Science, 2008
If only I can trust my police! SIM : An agent-based audit solution of access right deployment through open network.
Proceedings of the CRiSIS '08, 2008