Solange Ghernaouti-Helie

Affiliations:
  • University of Lausanne, Switzerland


According to our database1, Solange Ghernaouti-Helie authored at least 34 papers between 2003 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
An interdisciplinary approach for security, privacy and trust in the electronic medical record : A pragmatic legal perspective.
Proceedings of the 2019 IEEE International Conference on E-health Networking, 2019

Information sharing in cybersecurity : Enhancing security, trust and privacy by capacity building.
Proceedings of the 3rd Cyber Security in Networking Conference, 2019

2016
Using Incentives to Foster Security Information Sharing and Cooperation: A General Theory and Application to Critical Infrastructure Protection.
Proceedings of the Critical Information Infrastructures Security, 2016

Cyber Security Investment in the Context of Disruptive Technologies: Extension of the Gordon-Loeb Model and Application to Critical Infrastructure Protection.
Proceedings of the Critical Information Infrastructures Security, 2016

Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds.
Proceedings of the Privacy Technologies and Policy - 4th Annual Privacy Forum, 2016

2013
Structured and Unstructured Data in the Cloud: A Swiss Perspective on Readiness and Internal Controls.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Cybercrime and Privacy Issues - Introduction to the Special Theme.
ERCIM News, 2012

The Cybercrime Ecosystem & Privacy Issues - Main Challenges and Perspectives from a Societal Perspective.
ERCIM News, 2012

Architecting Interoperable Privacy within User-Centric Federated Digital Identity Systems: Overview of a Service-Oriented Implementation Framework.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

Service-Oriented Digital Identity-Related Privacy Interoperability: Implementation Framework of Privacy-as-a-Set-of-Services (PaaSS).
Proceedings of the Enterprise Interoperability - 4th International IFIP Working Conference, 2012

Disassembling Digital Identity-Related Privacy into a Set of Services: SoaML-Based Services Design.
Proceedings of the Exploring Services Science - Third International Conference, 2012

Going Digital - Rethinking Cybersecurity and Confidence in a Connected World: A Challenge for Society.
Proceedings of the 2012 Third International Conference on Emerging Security Technologies, 2012

Processes View Modeling of Identity-related Privacy Business Interoperability: Considering User-Supremacy Federated Identity Technical Model and Identity Contract Negotiation.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
Protecting Information in a Connected World: A Question of Security and of Confidence in Security.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

Digital Identity Management within Networked Information Systems: From Vertical Silos View into Horizontal User-Supremacy Processes Management.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

Privacy requirements specification for digital identity management systems implementation: Towards a digital society of privacy.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Optimizing Security Efficiency through Effective Risk Management.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
OpenAdap.net: a Community-Based Sharing System.
Proceedings of the 10th International Conference on Innovative Internet Community Services (I<sup>2</sup>CS), 2010

A Multi-stage Methodology for Ensuring Appropriate Security Culture and Governance.
Proceedings of the ARES 2010, 2010

A National Strategy for an Effective Cybersecurity Approach and Culture.
Proceedings of the ARES 2010, 2010

2009
SECOQC Business White Paper
CoRR, 2009

Reasonable Security by Effective Risk Management Practices: From Theory to Practice.
Proceedings of the NBiS 2009, 2009

A Security Management Assurance Model to Holistically Assess the Information Security Posture.
Proceedings of the The Forth International Conference on Availability, 2009

An Inclusive Information Society Needs a Global Approach of Information Security.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Secure Message Relay over Networks with QKD-Links.
Proceedings of the Second International Conference on Quantum, 2008

2007
Sharing information using quantum cryptography to reach the unconditional security.
Proceedings of the 2007 IEEE International Conference on Research, 2007

ISO Security Standards as a Leverage on IT Security Management.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
802.11i Encryption Key Distribution Using Quantum Cryptography.
J. Networks, 2006

Achieving Unconditional Security in Existing Networks Using Quantum Cryptography.
Proceedings of the SECRYPT 2006, 2006

Ownership Detection and Protection for Learning Objects.
Proceedings of the 6th IEEE International Conference on Advanced Learning Technologies, 2006

Integration of Quantum Cryptography in 802.11 Networks.
Proceedings of the The First International Conference on Availability, 2006

2005
Upgrading PPP security by Quantum Key Distribution.
Proceedings of the Network Control and Engineering for QoS, 2005

Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment.
Proceedings of the E-business and Telecommunication Networks, 2005

2003
From Security Culture to Effective E-Security Solutions.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003


  Loading...