Search

Your search keyword '"Cuppens-Bouhlahia, Nora"' showing total 32 results

Search Constraints

Start Over You searched for: Author "Cuppens-Bouhlahia, Nora" Remove constraint Author: "Cuppens-Bouhlahia, Nora"
32 results on '"Cuppens-Bouhlahia, Nora"'

Search Results

1. Risks and security of internet and systems : 12th international conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, revised selected papers

2. Interoperability, Safety and Security in IoT: Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings

3. Foundations and practice of security : 9th International Symposium, FPS 2016, Québec City, QC, Canada, October 24-25, 2016, Revised Selected Papers

4. Analysis of ICS and Corporate system Integration vulnerabilities

5. Data quality evaluation in medical database watermarking

6. Adapted Quantization Index Modulation for Database Watermarking

7. A French Anonymization Experiment with Health Data

8. MPEG-21 Based Approach to Secure Digital Contents Using DC Metadata

9. New IPv6 Identification Paradigm: Spreading of Addresses Over Time

10. Data Privacy Management and Autonomous Spontaneous Security : DPM 2013 : 8th International Workshop, SETOP 2013 : 6th International Workshop, Ehgam, UK, September 12-13, 2013 - Revised Selected Papers

11. Détection de flux de contrôle illégaux dans les Smartphones

12. Define privacy-preserving setbase drawer size standard: A ∊-closeness perspective

13. Tatouage Robuste et Réversible pour la Traçabilité de Bases de Données Relationnelles en Santé

14. FPS 2012 : 5th International Symposium on Foundations and Practice of Security

15. Policy Mining: a Bottom-Up Approach Toward a Model Based Firewall Management

16. Foundations and practice of security

17. CRiSIS 2013 : 8th International Conference on Risks and Security of Internet and Systems, 23-25 October 2013, La Rochelle, France

18. PST 2012 : tenth Annual International Conference on Privacy, Security and Trust Privacy, Security and Trust, Paris, July 16-18

19. Towards a Temporal Response Taxonomy

20. Consistency Policies for Dynamic Information Systems with Declassification Flows

21. Declassification policy management in dynamic information systems

22. An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations

23. A posteriori access and usage control policy in healthcare environment

24. Cover Story

25. Expression and enforcement of confidentiality policy in active databases

26. Spécification et gestion des obligations pour le besoin de contrôle d’usage (un aperçu)

27. Secure interoperability with O2O contracts

28. fQuery : réécriture de requêtes SPARQL pour assurer la confidentialité des données

29. Data Privacy Management and Autonomous Spontaneous Security : DPM 2009 : 4th International Workshop and SETOP 2009 : second International Workshop, St. Malo, France, September 24-25, 2009 - Revised Selected Papers

30. Formal framework to specify and deploy reaction policies

31. Automated reaction based on risk analysis and attackers skills

32. SARSSI 2008 : 3rd Conference on Security in Network Architectures and Information Systems, Loctudy, France, 13-14 October 2008

Catalog

Books, media, physical & digital resources