Meriam Ben-Ghorbel-Talbi

According to our database1, Meriam Ben-Ghorbel-Talbi authored at least 14 papers between 2006 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Tuple-based access control: a provenance-based information flow control for relational data.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Information Flow Control on a Multi-paradigm Web Application for SQL Injection Prevention.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

2014
Palpable Privacy through Declarative Information Flows Tracking for Smart Buildings.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Smatch: Formal dynamic session management model for RBAC.
J. Inf. Secur. Appl., 2013

2012
Towards Session-Aware RBAC Delegation: Function Switch.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

2011
Delegation of Obligations and Responsibility.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

2010
A delegation model for extended RBAC.
Int. J. Inf. Sec., 2010

Managing Delegation in Access Control Models
CoRR, 2010

Negotiating and delegating obligations.
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010

2009
An Extended Role-Based Access Control Model for Delegating Obligations.
Proceedings of the Trust, 2009

2008
Intrusion Detection Prototype Based on ADM-Logic.
J. Softw., 2008

Revocation Schemes for Delegation Licences.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

2007
Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic.
Proceedings of the The Second International Conference on Availability, 2007

2006
High Level Conflict Management Strategies in Advanced Access Control Models.
Proceedings of the First Workshop in Information and Computer Security, 2006


  Loading...