Cuppens-Boulahia, Nora
223  results:
Search for persons X
?
2

A Posteriori Access Control with an Administrative Policy:

, In: Advances in Security, Networks, and Internet of Things; Transactions on Computational Science and Computational Intelligence,
 
?
3

A Priority-Based Domain Type Enforcement for Exception Mana..:

, In: Foundations and Practice of Security; Lecture Notes in Computer Science,
 
?
4

A Posteriori Analysis of Policy Temporal Compliance:

, In: Lecture Notes in Computer Science; Risks and Security of Internet and Systems,
 
?
5

Norms and Deontic Logic:

, In: A Guided Tour of Artificial Intelligence Research,
 
?
6

Risks and Security of Internet and Systems: 14th Internatio.. 

Information Systems and Applications, incl. Internet/Web, and HCI, 12026
 
?
7

Network Functions Virtualization Access Control as a Servic:

, In: Data and Applications Security and Privacy XXXIV; Lecture Notes in Computer Science,
 
?
8

Accountability in the A Posteriori Access Control: A Requir..:

, In: Communications in Computer and Information Science; Quality of Information and Communications Technology,
 
?
9

PROS2E, a Probabilistic Representation of Safety and Securi..:

, In: Proceedings of the 6th ACM on Cyber-Physical System Security Workshop,
 
?
10

A Certificate-Less Key Exchange Protocol for IoT:

, In: Lecture Notes in Computer Science; Risks and Security of Internet and Systems,
 
?
11

Risks and Security of Internet and Systems: 13th Internatio.. 

Information Systems and Applications, incl. Internet/Web, and HCI, 11391
 
?
12

Optimal Distribution of Privacy Budget in Differential Priv..:

, In: Lecture Notes in Computer Science; Risks and Security of Internet and Systems,
 
?
13

A Prediction-Based Method for False Data Injection Attacks ..:

, In: Lecture Notes in Computer Science; Risks and Security of Internet and Systems,
 
?
14

Semantic Mediation for A Posteriori Log Analysis:

, In: Proceedings of the 14th International Conference on Availability, Reliability and Security,
 
?
15

USB Packets Filtering Policies and an Associated Low-Cost S..:

, In: Information and Communications Security; Lecture Notes in Computer Science,
 
1-15