A formal approach to specify and deploy a network security policy F Cuppens, N Cuppens-Boulahia, T Sans, A Miège IFIP World Computer Congress, TC 1, 203-218, 2004 | 171 | 2004 |
Nomad: A security model with non atomic actions and deadlines F Cuppens, N Cuppens-Boulahia, T Sans 18th IEEE Computer Security Foundations Workshop (CSFW'05), 186-196, 2005 | 116 | 2005 |
Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection network F Cuppens, F Autrel, Y Bouzida, J Garcia‐alfaro, S Gombault, T Sans Annals of Telecommunications-annales des télécommunications 61 (1-2), 197-217, 2006 | 43 | 2006 |
Selecting appropriate counter-measures in an intrusion detection framework F Cuppens, S Gombault, T Sans Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 78-87, 2004 | 31 | 2004 |
Security policy compliance with violation management J Brunel, F Cuppens, N Cuppens, T Sans, JP Bodeveix Proceedings of the 2007 ACM workshop on Formal methods in security …, 2007 | 29 | 2007 |
Protection of Relationships in XML Documents with the XML-BB Model F Cuppens, N Cuppens-Boulahia, T Sans International Conference on Information Systems Security, 148-163, 2005 | 20 | 2005 |
QWeS2T for Type-Safe Web Programming. T Sans, I Cervesato LAM@ LICS, 96-112, 2010 | 14 | 2010 |
A framework to enforce access control, usage control and obligations T Sans, F Cuppens, N Cuppens-Boulahia Annals of Telecommunications 11 (62), 1329-1352, 2007 | 10 | 2007 |
Getting CS undergraduates to communicate effectively A Karatsolis, I Cervasato, K Harras, Y Cooper, K Oflazer, N Abu-Ghazaleh, ... Proceedings of the 16th annual joint conference on Innovation and technology …, 2011 | 8 | 2011 |
OPA: Onion Policy Administration Model—Another approach to manage rights in DRM T Sans, F Cuppens, N Cuppens-Boulahia New Approaches for Security, Privacy and Trust in Complex Environments …, 2007 | 8 | 2007 |
Form: A federated rights expression model for open drm frameworks T Sans, F Cuppens, N Cuppens-Boulahia Annual Asian Computing Science Conference, 45-59, 2006 | 7 | 2006 |
A flexible and distributed architecture to enforce dynamic access control T Sans, F Cuppens, N Cuppens-Boulahia IFIP International Information Security Conference, 183-195, 2006 | 7 | 2006 |
Mì ege F Cuppens, N Cuppens-Boulahia, T Sans A.: A formal approach to specify and deploy a network security policy. In …, 2004 | 6 | 2004 |
Type-Safe Web Programming in QWeS2T T Sans, I Cervesato Technical Report CMU-CS-10-125, Department of Computer Science, Carnegie …, 2010 | 2 | 2010 |
A formal approach to specify and deploy a network security policy N Sans, F Cuppens, A Mige Second FAST Workshop, Toulouse, France, 2004 | 2 | 2004 |
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings N Cuppens-Boulahia, F Cuppens, S Jajodia, A Abou El Kalam, T Sans Springer, 2014 | 1 | 2014 |
Substructural meta-theory of a type-safe language for web programming I Cervesato, T Sans Fundamenta Informaticae 130 (1), 67-97, 2014 | 1 | 2014 |
XML-BB: A model to handle relationships protection in XML documents F Cuppens, N Cuppens-Boulahia, T Sans International Conference on Knowledge-Based and Intelligent Information and …, 2007 | 1 | 2007 |
29th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (SEC 2014), Marrakech, Morocco N Boulahia Cuppens, F Cuppens, S Jajodia, AAE Kalam, T Sans Springer, 2014 | | 2014 |
An Authorization Model For The Web Programming Language Qwel LA El-Matbouly, T Sans, S Hussein | | 2013 |