Solange Ghernaouti-Helie
Affiliations:- University of Lausanne, Switzerland
According to our database1,
Solange Ghernaouti-Helie
authored at least 34 papers
between 2003 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on viaf.org
-
on id.loc.gov
-
on d-nb.info
-
on scarg.org
On csauthors.net:
Bibliography
2019
An interdisciplinary approach for security, privacy and trust in the electronic medical record : A pragmatic legal perspective.
Proceedings of the 2019 IEEE International Conference on E-health Networking, 2019
Information sharing in cybersecurity : Enhancing security, trust and privacy by capacity building.
Proceedings of the 3rd Cyber Security in Networking Conference, 2019
2016
Using Incentives to Foster Security Information Sharing and Cooperation: A General Theory and Application to Critical Infrastructure Protection.
Proceedings of the Critical Information Infrastructures Security, 2016
Cyber Security Investment in the Context of Disruptive Technologies: Extension of the Gordon-Loeb Model and Application to Critical Infrastructure Protection.
Proceedings of the Critical Information Infrastructures Security, 2016
Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds.
Proceedings of the Privacy Technologies and Policy - 4th Annual Privacy Forum, 2016
2013
Structured and Unstructured Data in the Cloud: A Swiss Perspective on Readiness and Internal Controls.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
2012
The Cybercrime Ecosystem & Privacy Issues - Main Challenges and Perspectives from a Societal Perspective.
ERCIM News, 2012
Architecting Interoperable Privacy within User-Centric Federated Digital Identity Systems: Overview of a Service-Oriented Implementation Framework.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012
Service-Oriented Digital Identity-Related Privacy Interoperability: Implementation Framework of Privacy-as-a-Set-of-Services (PaaSS).
Proceedings of the Enterprise Interoperability - 4th International IFIP Working Conference, 2012
Disassembling Digital Identity-Related Privacy into a Set of Services: SoaML-Based Services Design.
Proceedings of the Exploring Services Science - Third International Conference, 2012
Going Digital - Rethinking Cybersecurity and Confidence in a Connected World: A Challenge for Society.
Proceedings of the 2012 Third International Conference on Emerging Security Technologies, 2012
Processes View Modeling of Identity-related Privacy Business Interoperability: Considering User-Supremacy Federated Identity Technical Model and Identity Contract Negotiation.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
2011
Protecting Information in a Connected World: A Question of Security and of Confidence in Security.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011
Digital Identity Management within Networked Information Systems: From Vertical Silos View into Horizontal User-Supremacy Processes Management.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011
Privacy requirements specification for digital identity management systems implementation: Towards a digital society of privacy.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
2010
Proceedings of the 10th International Conference on Innovative Internet Community Services (I<sup>2</sup>CS), 2010
Proceedings of the ARES 2010, 2010
Proceedings of the ARES 2010, 2010
2009
Proceedings of the NBiS 2009, 2009
A Security Management Assurance Model to Holistically Assess the Information Security Posture.
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Proceedings of the Second International Conference on Quantum, 2008
2007
Proceedings of the 2007 IEEE International Conference on Research, 2007
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007
2006
Achieving Unconditional Security in Existing Networks Using Quantum Cryptography.
Proceedings of the SECRYPT 2006, 2006
Proceedings of the 6th IEEE International Conference on Advanced Learning Technologies, 2006
Proceedings of the The First International Conference on Availability, 2006
2005
Proceedings of the Network Control and Engineering for QoS, 2005
Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment.
Proceedings of the E-business and Telecommunication Networks, 2005
2003
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003