Nora Cuppens

Orcid: 0000-0001-8792-0413

Affiliations:
  • Polytechnique Montréal, Department of IT and software engineering, QC, Canada
  • IMT Atlantique, Department of Systems, Networks, Cybersecurity and Digital Law, Cesson-Sévigné, France


According to our database1, Nora Cuppens authored at least 250 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Adversarial robustness of deep reinforcement learning-based intrusion detection.
Int. J. Inf. Sec., December, 2024

Trustless Distributed Symmetric-key Encryption.
CoRR, 2024

Diffusion-based Adversarial Purification for Intrusion Detection.
CoRR, 2024

Robust Deep Reinforcement Learning Through Adversarial Attacks and Training : A Survey.
CoRR, 2024

How to Better Fit Reinforcement Learning for Pentesting: A New Hierarchical Approach.
Proceedings of the Computer Security - ESORICS 2024, 2024

Optimal Automated Generation of Playbooks.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

2023
AIS Authentication Using Certificateless Cryptography.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Automated Enrichment of Logical Attack Graphs via Formal Ontologies.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

Automated Attacker Behaviour Classification Using Threat Intelligence Insights.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Unsupervised Clustering of Honeypot Attacks by Deep HTTP Packet Inspection.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Trust Management Framework for Containerized Workloads Applications to 5G Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

Parameterizing poisoning attacks in federated learning-based intrusion detection.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Real-Time Defensive Strategy Selection via Deep Reinforcement Learning.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
A Survey on Windows-based Ransomware Taxonomy and Detection Mechanisms.
ACM Comput. Surv., 2022

Ontology-based Attack Graph Enrichment.
CoRR, 2022

Investigating the practicality of adversarial evasion attacks on network intrusion detection.
Ann. des Télécommunications, 2022

Attacker Attribution via Characteristics Inference Using Honeypot Data.
Proceedings of the Network and System Security - 16th International Conference, 2022

Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Deep Reinforcement Learning-Based Defense Strategy Selection.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Special issue on risk and security of smart systems.
J. Inf. Secur. Appl., 2021

MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT.
IEEE Internet Things J., 2021

Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming.
Comput. Networks, 2021

Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics.
IEEE Access, 2021

Asymptotic Random Distortion Testing and Application to Change-in-Mean Detection.
Proceedings of the 10th International Symposium on Signal, Image, Video and Communications, 2021

2020
Watch out! Doxware on the way...
J. Inf. Secur. Appl., 2020

Privacy-Preserving Pattern Matching on Encrypted Data.
IACR Cryptol. ePrint Arch., 2020

Metrics to Enhance the Resilience of Cyber-Physical Systems.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Accountability in the A Posteriori Access Control: A Requirement and a Mechanism.
Proceedings of the Quality of Information and Communications Technology, 2020

IANVS: A Moving Target Defense Framework for a Resilient Internet of Things.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

A Priority-Based Domain Type Enforcement for Exception Management.
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020

Network Functions Virtualization Access Control as a Service.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

A Deeper Analysis of Adversarial Examples in Intrusion Detection.
Proceedings of the Risks and Security of Internet and Systems, 2020

A Posteriori Analysis of Policy Temporal Compliance.
Proceedings of the Risks and Security of Internet and Systems, 2020

PROS2E, a Probabilistic Representation of Safety and Security Events for Diagnosis.
Proceedings of the 6th ACM Workshop on Cyber-Physical System Security, 2020

Alert Characterization by Non-expert Users in a Cybersecurity Virtual Environment: A Usability Study.
Proceedings of the Augmented Reality, Virtual Reality, and Computer Graphics, 2020

Norms and Deontic Logic.
Proceedings of the A Guided Tour of Artificial Intelligence Research: Volume I: Knowledge Representation, 2020

2019
Misconfiguration Management of Network Security Components.
CoRR, 2019

Ransomware Network Traffic Analysis for Pre-encryption Alert.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

Reflective Attenuation of Cyber-Physical Attacks.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Watch Out! Doxware on the Way...
Proceedings of the Risks and Security of Internet and Systems, 2019

DTE Access Control Model for Integrated ICS Systems.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Semantic Mediation for A Posteriori Log Analysis.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Managing the Overestimation of Resilience.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Substring search over encrypted data.
J. Comput. Secur., 2018

Achieving dynamicity in security policies enforcement using aspects.
Int. J. Inf. Sec., 2018

Detection and Response to Data Exfiltration from Internet of Things Android Devices.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

CoAP Enhancement for a Better IoT Centric Protocol: CoAP 2.0.
Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, 2018

From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform.
Proceedings of the Information Systems Security - 14th International Conference, 2018

SONICS: A Segmentation Method for Integrated ICS and Corporate System.
Proceedings of the Information Systems Security - 14th International Conference, 2018

USB Packets Filtering Policies and an Associated Low-Cost Simulation Framework.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Linking Differential Identifiability with Differential Privacy.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Theoretical Security Evaluation of the Human Semantic Authentication Protocol.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

A Study on Mitigation Techniques for SCADA-Driven Cyber-Physical Systems (Position Paper).
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

Probabilistic Event Graph to Model Safety and Security for Diagnosis Purposes.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

Towards the Evaluation of End-to-End Resilience Through External Consistency.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

Effectiveness and Impact Measurements of a Diversification Based Moving Target Defense.
Proceedings of the Risks and Security of Internet and Systems, 2018

A Certificate-Less Key Exchange Protocol for IoT.
Proceedings of the Risks and Security of Internet and Systems, 2018

RIICS: Risk Based IICS Segmentation Method.
Proceedings of the Risks and Security of Internet and Systems, 2018

Optimal Distribution of Privacy Budget in Differential Privacy.
Proceedings of the Risks and Security of Internet and Systems, 2018

A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control Systems.
Proceedings of the Risks and Security of Internet and Systems, 2018

3D CyberCOP: A Collaborative Platform for Cybersecurity Data Analysis and Training.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2018

Stratification Based Model for Security Policy with Exceptions and Contraries to Duty.
Proceedings of the From Database to Cyber Security, 2018

Demo: Do Not Trust Your Neighbors! A Small IoT Platform Illustrating a Man-in-the-Middle Attack.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks, 2018

Ransomware's Early Mitigation Mechanisms.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Detection of Side Channel Attacks Based on Data Tainting in Android Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

A New Segmentation Method for Integrated ICS (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Real-Time Detection and Reaction to Activity Hijacking Attacks in Android Smartphones (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems.
Proceedings of the Information Systems Security - 13th International Conference, 2017

wIDS: A Multilayer IDS for Wireless-Based SCADA Systems.
Proceedings of the Information Systems Security - 13th International Conference, 2017

wirelessOrBAC: Towards an access-control-based IDS for Wireless Sensor Networks.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

Firewall Policies Provisioning Through SDN in the Cloud.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Enabling Trust Assessment In Clouds-of-Clouds: A Similarity-Based Approach.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Access and privacy control enforcement in RFID middleware systems: Proposal and implementation on the fosstrak platform.
World Wide Web, 2016

Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

Towards a new generation of industrial firewalls: Operational-process aware filtering.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Toward an off-line analysis of obligation with deadline policies.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Tracking Explicit and Control Flows in Java and Native Android Apps Code.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Building a Fair System Using Access Rights.
Proceedings of the Information Systems Security - 12th International Conference, 2016

Multi-Criteria Recommender Approach for Supporting Intrusion Response System.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Security Analysis of WirelessHART Communication Scheme.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Mining a high level access control policy in a network with multiple firewalls.
J. Inf. Secur. Appl., 2015

Deployment of a posteriori access control using IHE ATNA.
Int. J. Inf. Sec., 2015

Dynamic Security Policies Enforcement and Adaptation Using Aspects.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Dynamic deployment of access and usage control policies using aspects.
Proceedings of the International Conference on Protocol Engineering, 2015

Data Quality Evaluation in Medical Database Watermarking.
Proceedings of the Digital Healthcare Empowering Europeans, 2015

Similarity Measure for Security Policies in Service Provider Selection.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Security Mechanisms Planning to Enforce Security Policies.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

On the Fly Design and Co-simulation of Responses Against Simultaneous Attacks.
Proceedings of the Computer Security - ESORICS 2015, 2015

WirelessHART NetSIM: A WirelessHART SCADA-Based Wireless Sensor Networks Simulator.
Proceedings of the Security of Industrial Control Systems and Cyber Physical Systems, 2015

Privacy Preserving Record Matching Using Automated Semi-trusted Broker.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Context Aware Intrusion Response Based on Argumentation Logic.
Proceedings of the Risks and Security of Internet and Systems, 2015

Security Issue of WirelessHART Based SCADA Systems.
Proceedings of the Risks and Security of Internet and Systems, 2015

Trust Negotiation Based Approach to Enforce MANET Routing Security.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation.
IEEE Trans. Inf. Forensics Secur., 2014

KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems.
J. Netw. Comput. Appl., 2014

Introduction.
Ingénierie des Systèmes d Inf., 2014

Log content extraction engine based on ontology for the purpose of a posteriori access control.
Int. J. Knowl. Learn., 2014

Conflict detection in obligation with deadline policies.
EURASIP J. Inf. Secur., 2014

Privacy query rewriting algorithm instrumented by a privacy-aware access control model.
Ann. des Télécommunications, 2014

Car2X Communication - Putting Security Negotiation into Practice.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

Reaching Agreement in Security Policy Negotiation.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Probabilistic Cycle Detection for Schneier's Solitaire Keystream Algorithm.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Coordination and Concurrency Aware Likelihood Assessment of Simultaneous Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Optimized and controlled provisioning of encrypted outsourced data.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Specifying and enforcing constraints in dynamic access control policies.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Adapted Quantization Index Modulation for Database Watermarking.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Détection de flux de contrôle illégaux dans les Smartphones.
Proceedings of the Actes du XXXIIème Congrès INFORSID, Lyon, France, 20-23 Mai 2014., 2014

Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

Metric for Security Activities Assisted by Argumentative Logic.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Ontology-guided distortion control for robust-lossless database watermarking: Application to inpatient hospital stay records.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

ELITE: zEro Links Identity managemenT systEm.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Specification and Deployment of Integrated Security Policies for Outsourced Data.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting.
IEEE Trans. Inf. Forensics Secur., 2013

PAIRSE: a privacy-preserving service-oriented data integration system.
SIGMOD Rec., 2013

Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Formal specification and management of security policies with collective group obligations.
J. Comput. Secur., 2013

Semantic analysis of role mining results and shadowed roles detection.
Inf. Secur. Tech. Rep., 2013

Editorial.
J. Inf. Secur. Appl., 2013

Smatch: Formal dynamic session management model for RBAC.
J. Inf. Secur. Appl., 2013

Management of stateful firewall misconfiguration.
Comput. Secur., 2013

A privacy-aware access control model for distributed network monitoring.
Comput. Electr. Eng., 2013

Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

Formal Characterization of Illegal Control Flow in Android System.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Security Aspects: A Framework for Enforcement of Security Policies Using AOP.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Define privacy-preserving setbase drawer size standard: A ∊-closeness perspective.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Model-Driven Extraction and Analysis of Network Security Policies.
Proceedings of the Model-Driven Engineering Languages and Systems, 2013

Fine-grained privacy control for the RFID middleware of EPCglobal networks.
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems, 2013

IPv6 Address Obfuscation by Intermediate Middlebox in Coordination with Connected Devices.
Proceedings of the Advances in Communication Networking, 2013

Towards an Access-Control Metamodel for Web Content Management Systems.
Proceedings of the Current Trends in Web Engineering, 2013

Semantic search over encrypted data.
Proceedings of the 20st International Conference on Telecommunications, 2013

Confidentiality-Preserving Query Execution of Fragmented Outsourced Data.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

PrivComp: a privacy-aware data service composition system.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Enhance Biometric Database Privacy: Defining Privacy-Preserving Drawer Size Standard for the Setbase.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Situation Calculus and Graph Based Defensive Modeling of Simultaneous Attacks.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Privacy-enhanced filtering and collection middleware in EPCglobal networks.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Secure and Privacy-Preserving Execution Model for Data Services.
Proceedings of the Advanced Information Systems Engineering, 2013

Conflict Management in Obligation with Deadline Policies.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Role Mining to Assist Authorization Governance: How Far Have We Gone?
Int. J. Secur. Softw. Eng., 2012

Formal enforcement and management of obligation policies.
Data Knowl. Eng., 2012

Penetration Tester's Open Source Toolkit.
Comput. Secur., 2012

Towards Dynamic Risk Management: Success Likelihood of Ongoing Attacks.
Bell Labs Tech. J., 2012

Handling Stateful Firewall Anomalies.
Proceedings of the Information Security and Privacy Research, 2012

A model-driven approach for the extraction of network access-control policies.
Proceedings of the Model-Driven Security Workshop, 2012

Enabling Dynamic Security Policy in the Java Security Manager.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

Towards a Temporal Response Taxonomy.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

Towards Session-Aware RBAC Delegation: Function Switch.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

Robust lossless watermarking based on circular interpretation of bijective transformations for the protection of medical databases.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012

Adaptive Access Control Enforcement in Social Network Using Aspect Weaving.
Proceedings of the Database Systems for Advanced Applications, 2012

Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Privacy Policy Preferences Enforced by SPARQL Query Rewriting.
Proceedings of the Seventh International Conference on Availability, 2012

Towards Automated Assistance for Mined Roles Analysis in Role Mining Applications.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Multilevel Security Policies.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Cover Story.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Dynamic deployment of context-aware access control policies for constrained security devices.
J. Syst. Softw., 2011

An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations.
Int. J. Mob. Comput. Multim. Commun., 2011

Delegation of Obligations and Responsibility.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Privacy Enforcement of Composed Services in Cellular Networks.
Proceedings of the 11th Annual International Conference on New Technologies of Distributed Systems, 2011

Consistency Policies for Dynamic Information Systems with Declassification Flows.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress.
Proceedings of the Foundations and Practice of Security, 2011

Using Requirements Engineering in an Automatic Security Policy Derivation Process.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

Reversible watermarking based on invariant image classification and dynamical error histogram shifting.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

Declassification Policy Management in Dynamic Information Systems.
Proceedings of the Sixth International Conference on Availability, 2011

Smatch Model: Extending RBAC Sessions in Virtualization Environment.
Proceedings of the Sixth International Conference on Availability, 2011

2010
A delegation model for extended RBAC.
Int. J. Inf. Sec., 2010

Managing Delegation in Access Control Models
CoRR, 2010

Watermarking to Enforce Medical Image Access and Usage Control Policy.
Proceedings of the Sixth International Conference on Signal-Image Technology and Internet-Based Systems, 2010

Privacy Administration in Distributed Service Infrastructure.
Proceedings of the Security and Privacy in Communication Networks, 2010

Ex-SDF: An Extended Service Dependency Framework for Intrusion Impact Assessment.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Risk-Aware Framework for Activating and Deactivating Policy-Based Response.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Service Dependencies in Information Systems Security.
Proceedings of the Computer Network Security, 2010

Expression and enforcement of confidentiality policy in active databases.
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010

Negotiating and delegating obligations.
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010

Rewriting of SPARQL/Update Queries for Securing Data Access.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Model-Driven Security Policy Deployment: Property Oriented Approach.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

A Service Dependency Model for Cost-Sensitive Intrusion Response.
Proceedings of the Computer Security, 2010

MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

<i>f</i>Query: SPARQL Query Rewriting to Enforce Data Confidentiality.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010

Intelligent response system to mitigate the success likelihood of ongoing attacks.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

Reconciling IHE-ATNA profile with a posteriori contextual access and usage control policy in healthcare environment.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

Architecture-Aware Adaptive Deployment of Contextual Security Policies.
Proceedings of the ARES 2010, 2010

From Contextual Permission to Dynamic Pre-obligation: An Integrated Approach.
Proceedings of the ARES 2010, 2010

2009
An ontology-based approach to react to network attacks.
Int. J. Inf. Comput. Secur., 2009

XeNA: an access negotiation framework using XACML.
Ann. des Télécommunications, 2009

An Extended Role-Based Access Control Model for Delegating Obligations.
Proceedings of the Trust, 2009

Modeling and Controlling Downgrading Operations in Information Systems.
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009

Formalization and Management of Group Obligations.
Proceedings of the POLICY 2009, 2009

From state-based to event-based contextual security policies.
Proceedings of the Fourth IEEE International Conference on Digital Information Management, 2009

Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

Contextual Privacy Management in Extended Role Based Access Control Model.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

A Service Dependency Modeling Framework for Policy-Based Response Enforcement.
Proceedings of the Detection of Intrusions and Malware, 2009

Reaction Policy Model Based on Dynamic Organizations and Threat Context.
Proceedings of the Data and Applications Security XXIII, 2009

Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

A secured delegation of remote services on IPv6 home networks.
Proceedings of the CRiSIS 2009, 2009

Semantic context aware security policy deployment.
Proceedings of the 2009 ACM Symposium on Information, 2009

Deploying Security Policy in Intra and Inter Workflow Management Systems.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Complete analysis of configuration rules to guarantee reliable network security policies.
Int. J. Inf. Sec., 2008

Modeling contextual security policies.
Int. J. Inf. Sec., 2008

Deploying Access and Flow Control in Distributed Workflows.
J. Res. Pract. Inf. Technol., 2008

Expression and Deployment of Reaction Policies.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

Interoperability of Context Based System Policies Using O2O Contract.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

Interactivity for Reactive Access Control.
Proceedings of the SECRYPT 2008, 2008

Negotiation of Prohibition: An Approach Based on Policy Rewriting.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A Robust Reputation Scheme for Decentralized Group Management Systems.
Proceedings of the Information Systems Security, 4th International Conference, 2008

Revocation Schemes for Delegation Licences.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic.
Proceedings of the Deontic Logic in Computer Science, 9th International Conference, 2008

Automated reaction based on risk analysis and attackers skills in intrusion detection systems.
Proceedings of the CRiSIS '08, 2008

An ontology-based approach to react to network attacks.
Proceedings of the CRiSIS '08, 2008

Evaluating the Trustworthiness of Contributors in a Collaborative Environment.
Proceedings of the Collaborative Computing: Networking, 2008

Deploying Access Control in Distributed Workflow.
Proceedings of the Sixth Australasian Information Security Conference, 2008

Managing access and flow control requirements in distributed workflows.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

Context Ontology for Secure Interoperability.
Proceedings of the The Third International Conference on Availability, 2008

2007
Enabling automated threat response through the use of a dynamic security policy.
J. Comput. Virol., 2007

A Framework to Enforce Access Control, Usage Control and Obligations.
Ann. des Télécommunications, 2007

Reliable Process for Security Policy Deployment.
Proceedings of the SECRYPT 2007, 2007

OPA: Onion Policy Administration Model - Another approach to manage rights in DRM.
Proceedings of the New Approaches for Security, 2007

Management of Exceptions on Access Control Policies.
Proceedings of the New Approaches for Security, 2007

A formal approach for testing security rules.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Misbehaviors Detection to Ensure Availability in OLSR.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

XML-BB: A Model to Handle Relationships Protection in XML Documents.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Advanced Reaction Using Risk Assessment in Intrusion Detection Systems.
Proceedings of the Critical Information Infrastructures Security, 2007

Security policy compliance with violation management.
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007

An Integrated Model for Access Control and Information Flow Requirements.
Proceedings of the Advances in Computer Science, 2007

Resource Classification Based Negotiation in Web Services.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Aggregating and Deploying Network Access Control Policies.
Proceedings of the The Second International Conference on Availability, 2007

2006
High Level Conflict Management Strategies in Advanced Access Control Models.
Proceedings of the First Workshop in Information and Computer Security, 2006

An extended RBAC profile of XACML.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

A Flexible and Distributed Architecture to Enforce Dynamic Access Control.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Towards Filtering and Alerting Rule Rewriting on Single-Component Policies.
Proceedings of the Computer Safety, 2006

O2O: Virtual Private Organizations to Manage Security Policy Interoperability.
Proceedings of the Information Systems Security, Second International Conference, 2006

Analysis of Policy Anomalies on Distributed Network Security Setups.
Proceedings of the Computer Security, 2006

Using Contextual Security Policies for Threat Response.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2006

FORM : A Federated Rights Expression Model for Open DRM Frameworks.
Proceedings of the Advances in Computer Science, 2006

Availability Enforcement by Obligations and Aspects Identification.
Proceedings of the The First International Conference on Availability, 2006

2005
Protection of Relationships in XML Documents with the XML-BB Model.
Proceedings of the Information Systems Security, First International Conference, 2005

Nomad: A Security Model with Non Atomic Actions and Deadlines.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

2004
A Formal Approach to Specify and Deploy a Network Security Policy.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

1994
Asynchronous composition and required security conditions.
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

Formal Development of Authentication Protocols.
Proceedings of the 6th Refinement Workshop, 1994

Decomposition of Multilevel Objects in an Object-Oriented Database.
Proceedings of the Computer Security, 1994

1993
Multilevel Security in Object-Oriented Databases.
Proceedings of the Security for Object-Oriented Systems, 1993

Abstract Machines for Communication Security.
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993

MultiView model for object-oriented database.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993


  Loading...