dblp.uni-trier.dewww.uni-trier.de

Frédéric Cuppens Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
97EEStere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro, Laurent Toutain, Yehia Elrakaiby: Semantic context aware security policy deployment. ASIACCS 2009: 251-261
96EEFabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens: Reaction Policy Model Based on Dynamic Organizations and Threat Context. DBSec 2009: 49-64
95EENizar Kheir, Hervé Debar, Frédéric Cuppens, Nora Cuppens-Boulahia, Jouni Viinikka: A Service Dependency Modeling Framework for Policy-Based Response Enforcement. DIMVA 2009: 176-195
94EEMeriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula: An Extended Role-Based Access Control Model for Delegating Obligations. TrustBus 2009: 127-137
93EEDiala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar: XeNA: an access negotiation framework using XACML. Annales des Télécommunications 64(1-2): 155-169 (2009)
92EEStere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro, Laurent Toutain: Reliable Process for Security Policy Deployment CoRR abs/0905.1362: (2009)
2008
91EESamiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens: Managing access and flow control requirements in distributed workflows. AICCSA 2008: 702-710
90EECéline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens, Ana R. Cavalli: Context Ontology for Secure Interoperability. ARES 2008: 821-827
89EECam Tu Phan Le, Frédéric Cuppens, Nora Cuppens-Boulahia, Patrick Maillé: Evaluating the Trustworthiness of Contributors in a Collaborative Environment. CollaborateCom 2008: 451-460
88EENora Cuppens-Boulahia, Frédéric Cuppens: Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic. DEON 2008: 65-80
87EEMeriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula: Revocation Schemes for Delegation Licences. ICICS 2008: 190-205
86EEFrédéric Cuppens, Nora Cuppens-Boulahia, Julien A. Thomas: A Robust Reputation Scheme for Decentralized Group Management Systems. ICISS 2008: 71-85
85EENora Cuppens-Boulahia, Frédéric Cuppens, Diala Abi Haidar, Hervé Debar: Negotiation of Prohibition: An Approach Based on Policy Rewriting. SEC 2008: 173-187
84 Yehia Elrakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia: Interactivity for Reactive Access Control. SECRYPT 2008: 57-64
83EEJoaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia: Aggregating and Deploying Network Access Control Policies CoRR abs/0803.0653: (2008)
82EEJoaquín García-Alfaro, Nora Boulahia-Cuppens, Frédéric Cuppens: Complete analysis of configuration rules to guarantee reliable network security policies. Int. J. Inf. Sec. 7(2): 103-122 (2008)
81EEFrédéric Cuppens, Nora Cuppens-Boulahia: Modeling contextual security policies. Int. J. Inf. Sec. 7(4): 285-305 (2008)
2007
80EEJoaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia: Aggregating and Deploying Network Access Control Policies. ARES 2007: 532-542
79EESamiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens: An Integrated Model for Access Control and Information Flow Requirements. ASIAN 2007: 111-125
78EEJulien Brunel, Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Jean-Paul Bodeveix: Security policy compliance with violation management. FMSE 2007: 31-40
77EEDiala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar: Resource Classification Based Negotiation in Web Services. IAS 2007: 313-318
76EEFrédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans: XML-BB: A Model to Handle Relationships Protection in XML Documents. KES (3) 2007: 1107-1114
75EEFrédéric Cuppens, Nora Cuppens-Boulahia, Tony Ramard, Julien A. Thomas: Misbehaviors Detection to Ensure Availability in OLSR. MSN 2007: 799-813
74EEWissam Mallouli, Jean-Marie Orset, Ana R. Cavalli, Nora Cuppens-Boulahia, Frédéric Cuppens: A formal approach for testing security rules. SACMAT 2007: 127-132
73EEThierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia: OPA: Onion Policy Administration Model - Another approach to manage rights in DRM. SEC 2007: 349-360
72EEJoaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia: Management of Exceptions on Access Control Policies. SEC 2007: 97-108
71 Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro, Laurent Toutain: Reliable Process for Security Policy Deployment. SECRYPT 2007: 5-15
70EEFrédéric Cuppens, Nora Cuppens-Boulahia, Meriam Ben Ghorbel: High Level Conflict Management Strategies in Advanced Access Control Models. Electr. Notes Theor. Comput. Sci. 186: 3-26 (2007)
69EEHervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia: Enabling automated threat response through the use of a dynamic security policy. Journal in Computer Virology 3(3): 195-210 (2007)
2006
68EEFrédéric Cuppens, Nora Cuppens-Boulahia, Tony Ramard: Availability Enforcement by Obligations and Aspects Identification. ARES 2006: 229-239
67EEThierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia: FORM : A Federated Rights Expression Model for Open DRM Frameworks. ASIAN 2006: 45-59
66EEHervé Debar, Yohann Thomas, Nora Boulahia-Cuppens, Frédéric Cuppens: Using Contextual Security Policies for Threat Response. DIMVA 2006: 109-128
65EEJoaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia: Analysis of Policy Anomalies on Distributed Network Security Setups. ESORICS 2006: 496-511
64EEFrédéric Cuppens, Nora Cuppens-Boulahia, Céline Coma: O2O: Virtual Private Organizations to Manage Security Policy Interoperability. ICISS 2006: 101-115
63EEJoaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia: Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. SAFECOMP 2006: 182-194
62EEThierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia: A Flexible and Distributed Architecture to Enforce Dynamic Access Control. SEC 2006: 183-195
61EEYacine Bouzida, Frédéric Cuppens: Detecting Known and Novel Network Intrusions. SEC 2006: 258-270
60EEDiala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar: An extended RBAC profile of XACML. SWS 2006: 13-22
59 Frédéric Cuppens, Fabien Autrel, Yacine Bouzida, Joaquín García, Sylvain Gombault, Thierry Sans: Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Annales des Télécommunications 61(1-2): 197-217 (2006)
58 Frédéric Cuppens, Hervé Debar, Elisa Bertino: Foreword. Annales des Télécommunications 61(3-4): 242-244 (2006)
2005
57EEFrédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans: Nomad: A Security Model with Non Atomic Actions and Deadlines. CSFW 2005: 186-196
56EEFrédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans: Protection of Relationships in XML Documents with the XML-BB Model. ICISS 2005: 148-163
55EEJoaquín García, Frédéric Cuppens, Fabien Autrel, Jordi Castellà-Roca, Joan Borrell, Guillermo Navarro, Jose A. Ortega-Ruiz: Protecting On-Line Casinos against Fraudulent Player Drop-Out. ITCC (1) 2005: 500-505
2004
54 Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France Kluwer 2004
53 Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France Kluwer 2004
52EEFrédéric Cuppens, Sylvain Gombault, Thierry Sans: Selecting Appropriate Counter-Measures in an Intrusion Detection Framework. CSFW 2004: 78-87
51EEFrédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Alexandre Miège: A Formal Approach to Specify and Deploy a Network Security Policy. Formal Aspects in Security and Trust 2004: 203-218
50EEJoaquín García, Fabien Autrel, Joan Borrell, Sergio Castillo, Frédéric Cuppens, Guillermo Navarro: Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation. ICICS 2004: 223-235
49 Souhila Kaci, Abdeslam Ali-Laouar, Frédéric Cuppens: Health care and social inference systems: An unauthorized inference control based on fuzzy logic. WOSIS 2004: 217-226
48 Frédéric Cuppens, Alexandre Miège: AdOrBAC: an administration model for Or-BAC. Comput. Syst. Sci. Eng. 19(3): (2004)
47 Hervé Debar, Benjamin Morin, Frédéric Cuppens, Fabien Autrel, Ludovic Mé, Bernard Vivinis, Salem Benferhat, Mireille Ducassé, Rodolphe Ortalo: Détection d'intrusions : corrélation d'alertes. Technique et Science Informatiques 23(3): 359-390 (2004)
2003
46EEFrédéric Cuppens, Alexandre Miège: Modelling Contexts in the Or-BAC Model. ACSAC 2003: 416-427
45 Salem Benferhat, Rania El Baida, Frédéric Cuppens: A Possibilistic Logic Encoding of Access Control. FLAIRS Conference 2003: 481-485
44EESalem Benferhat, Fabien Autrel, Frédéric Cuppens: Enhanced Correlation in an Intrusion Detection Process. MMM-ACNS 2003: 157-170
43EEFrédéric Cuppens, Alexandre Miège: Administration Model for Or-BAC. OTM Workshops 2003: 754-768
42EEAnas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida, Frédéric Cuppens, Claire Saurel, Philippe Balbiani, Yves Deswarte, Gilles Trouessin: Organization based access contro. POLICY 2003: 120-
41EESalem Benferhat, Rania El Baida, Frédéric Cuppens: A stratification-based approach for handling conflicts in access control. SACMAT 2003: 189-195
2002
40 Frédéric Cuppens, Fabien Autrel, Alexandre Miège, Salem Benferhat: Recognizing Malicious Intention in an Intrusion Detection Process. HIS 2002: 806-817
39EEFrédéric Cuppens, Alexandre Miège: Alert Correlation in a Cooperative Intrusion Detection Framework. IEEE Symposium on Security and Privacy 2002: 202-215
2001
38EEFrédéric Cuppens: Managing Alerts in a Multi-Intrusion Detection Environmen. ACSAC 2001: 22-31
37EEFrédéric Cuppens, Alban Gabillon: Cover story management. Data Knowl. Eng. 37(2): 177-201 (2001)
36 Isabelle Bloch, Anthony Hunter, Alain Appriou, André Ayoun, Salem Benferhat, Philippe Besnard, Laurence Cholvy, Roger Cooke, Frédéric Cuppens, Didier Dubois, Hélène Fargier, Michel Grabisch, Rudolf Kruse, Jérôme Lang, Serafín Moral, Henri Prade, Alessandro Saffiotti, Philippe Smets, Claudio Sossai: Fusion: General concepts and characteristics. Int. J. Intell. Syst. 16(10): 1107-1134 (2001)
35 Frédéric Cuppens, Laurence Cholvy, Claire Saurel, Jérôme Carrère: Merging regulations: Analysis of a practical example. Int. J. Intell. Syst. 16(11): 1223-1243 (2001)
2000
34 Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings Springer 2000
33EEJérôme Carrère, Frédéric Cuppens, Claire Saurel: LExIS: A Query Language to Scan Information Flow. NLDB 2000: 369
32EEFrédéric Cuppens, Rodolphe Ortalo: LAMBDA: A Language to Model a Database for Detection of Attacks. Recent Advances in Intrusion Detection 2000: 197-216
1999
31EEFrédéric Cuppens, Alban Gabillon: Logical Foundations of Multilevel Databases. Data Knowl. Eng. 29(3): 259-291 (1999)
1998
30EEFrédéric Cuppens, Laurence Cholvy, Claire Saurel, Jérôme Carrère: Merging Security Policies: Analysis of a Practical Example. CSFW 1998: 123-136
29 Jérôme Carrère, Frédéric Cuppens, Claire Saurel: SACADDOS: A Support Tool to Manage Multilevel Documents. DBSec 1998: 173-188
28EEFrédéric Cuppens, Alban Gabillon: Rules for Designing Multilevel Object-Oriented Databases. ESORICS 1998: 159-174
27 Frédéric Cuppens, Claire Saurel: A Logical Formalization of Integrity Policies for Database Management Systems. IICIS 1998: 231-254
1997
26EELaurence Cholvy, Frédéric Cuppens, Claire Saurel: Towards a Logical Formalization of Responsibility. ICAIL 1997: 233-242
25EELaurence Cholvy, Frédéric Cuppens: Analyzing Consistency of Security Policies. IEEE Symposium on Security and Privacy 1997: 103-112
24EEFrédéric Cuppens, Robert Demolombe: A Modal Logical Framework for Security Policies. ISMIS 1997: 579-589
1996
23 Frédéric Cuppens, Alban Gabillon: Formalisation de la Confidentialité dans une Base de Données à Objets. BDA 1996: 417-
22EEFrédéric Cuppens, Claire Saurel: Specifying a security policy: a case study. CSFW 1996: 123-
21 Frédéric Cuppens, Alban Gabillon: A Logical Approach to Model a Multilevel Object-Oriented Database. DBSec 1996: 145-166
20 Frédéric Cuppens, Robert Demolombe: A Deontic Logic for Reasoning about Confidentiality. DEON 1996: 66-79
19EEFrédéric Cuppens: Querying a Multilevel Database: A Logical Analysis. VLDB 1996: 484-494
1995
18 Frédéric Cuppens, Alban Gabillon: Modelling a Multilevel Database with Temporal Downgrading Functionalities. DBSec 1995: 145-164
17EELaurence Cholvy, Frédéric Cuppens: Solving Normative Conflicts by Merging Roles. ICAIL 1995: 201-209
1994
16 Laurence Cholvy, Frédéric Cuppens: Providing Consistent Views in a Polyinstantiated Database. DBSec 1994: 277-296
15EENora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian: Decomposition of Multilevel Objects in an Object-Oriented Database. ESORICS 1994: 375-402
14EEFrédéric Cuppens, Gilles Trouessin: Information Flow Controls vs Interference Controls: An Integrated Approach. ESORICS 1994: 447-468
1993
13 Frédéric Cuppens: A Logical Formalization of Secrecy. CSFW 1993: 53-62
12 Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian: Multilevel Security in Object-Oriented Databases. Security for Object-Oriented Systems 1993: 79-89
1992
11 Pierre Bieber, Frédéric Cuppens: Secure Dependencies with Dynamic Level Assignments. CSFW 1992: 63-75
10 Pierre Bieber, Frédéric Cuppens: A Logical View of Secure Dependencies. Journal of Computer Security 1(1): 99-130 (1992)
1991
9 Pierre Bieber, Frédéric Cuppens: A Definition of Secure Dependencies Using the Logic of Security. CSFW 1991: 2-11
8 Frédéric Cuppens, Kioumars Yazdanian: Logic Hints and Security in Relational Databases. DBSec 1991: 227-238
7 Frédéric Cuppens: A Modal Logic Framework to Solve Aggregation Problems. DBSec 1991: 315-332
1990
6 Frédéric Cuppens: An Epistemic and Deontic Logic for Reasoning about Computer Security. ESORICS 1990: 135-145
1989
5 Frédéric Cuppens: Un langage de requêtes pour obtenir des résponses intelligentes. BDA 1989: 249-
4 Frédéric Cuppens, Robert Demolombe: How to recognize interesting topics to provide cooperative answering. Inf. Syst. 14(2): 163-173 (1989)
1988
3 Frédéric Cuppens, Robert Demolombe: Comment reconnaître les centres d'intérêt pour fournir des réponses coopératives. BDA 1988: 257-
2 Frédéric Cuppens, Robert Demolombe: Cooperative Answering: A Methodology to Provide Intelligent Access to databases. Expert Database Conf. 1988: 621-643
1 Frédéric Cuppens, Robert Demolombe: A Prolog-Relational DBMS Interface Using Delayed Evaluation. JCDKB 1988: 135-148

Coauthor Index

1Abdeslam Ali-Laouar [49]
2Alain Appriou [36]
3Fabien Autrel [40] [44] [47] [50] [55] [59] [96]
4Samiha Ayed [79] [91]
5André Ayoun [36]
6Rania El Baida [41] [42] [45]
7Philippe Balbiani [42]
8Meriam Ben-Ghorbel-Talbi (Meriam Ben Ghorbel) [70] [87] [94]
9Salem Benferhat [36] [40] [41] [42] [44] [45] [47]
10Elisa Bertino [58]
11Philippe Besnard [36]
12Pierre Bieber [9] [10] [11]
13Isabelle Bloch [36]
14Jean-Paul Bodeveix [78]
15Joan Borrell [50] [55]
16Adel Bouhoula [87] [94]
17Yacine Bouzida [59] [61]
18Julien Brunel [78]
19Jérôme Carrère [29] [30] [33] [35]
20Jordi Castellà-Roca [55]
21Sergio Castillo [50]
22Ana R. Cavalli [74] [90]
23Laurence Cholvy [16] [17] [25] [26] [30] [35] [36]
24Céline Coma [64] [90]
25Roger Cooke [36]
26Nora Cuppens-Boulahia (Nora Boulahia-Cuppens) [12] [15] [51] [56] [57] [60] [62] [63] [64] [65] [66] [67] [68] [69] [70] [71] [72] [73] [74] [75] [76] [77] [78] [79] [80] [81] [82] [83] [84] [85] [86] [87] [88] [89] [90] [91] [92] [93] [94] [95] [96] [97]
27Hervé Debar [47] [58] [60] [66] [69] [77] [85] [93] [95]
28Robert Demolombe [1] [2] [3] [4] [20] [24]
29Yves Deswarte [34] [42] [53] [54]
30Didier Dubois [36]
31Mireille Ducassé [47]
32Yehia Elrakaiby [84] [97]
33Hélène Fargier [36]
34Alban Gabillon [12] [15] [18] [21] [23] [28] [31] [37]
35Joaquín García (Joaquín García-Alfaro) [50] [55] [59] [63] [65] [71] [72] [80] [82] [83] [92] [97]
36Dieter Gollmann [34]
37Sylvain Gombault [52] [59]
38Michel Grabisch [36]
39Diala Abi Haidar [60] [77] [85] [93]
40Anthony Hunter [36]
41Sushil Jajodia [53] [54]
42Souhila Kaci [49]
43Anas Abou El Kalam [42]
44Nizar Kheir [95]
45Rudolf Kruse [36]
46Jérôme Lang [36]
47Cam Tu Phan Le [89]
48Patrick Maillé [89]
49Wissam Mallouli [74]
50Ludovic Mé [47]
51Alexandre Miège [39] [40] [42] [43] [46] [48] [51]
52Serafín Moral [36]
53Benjamin Morin [47]
54Guillermo Navarro-Arribas (Guillermo Navarro) [50] [55]
55Jean-Marie Orset [74]
56Rodolphe Ortalo [32] [47]
57Jose A. Ortega-Ruiz [55]
58Henri Prade [36]
59Stere Preda [71] [92] [97]
60Tony Ramard [68] [75]
61Alessandro Saffiotti [36]
62Thierry Sans [51] [52] [56] [57] [59] [62] [67] [73] [76] [78]
63Claire Saurel [22] [26] [27] [29] [30] [33] [35] [42]
64Philippe Smets [36]
65Claudio Sossai [36]
66Julien A. Thomas [75] [86]
67Yohann Thomas [66] [69]
68Laurent Toutain [71] [92] [97]
69Gilles Trouessin [14] [42]
70Jouni Viinikka [95]
71Bernard Vivinis [47]
72Michael Waidner [34]
73Lingyu Wang [53] [54]
74Kioumars Yazdanian [8] [12] [15]

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)