Jocelyn Aubert
Jocelyn Aubert
Email verificata su
TitoloCitata daAnno
Towards cloud computing SLA risk management: issues and challenges
JH Morin, J Aubert, B Gateau
2012 45th Hawaii International Conference on System Sciences, 5509-5514, 2012
Improving resilience of interdependent critical infrastructures via an on-line alerting system
P Capodieci, S Diblasi, E Ciancamerla, M Minichino, C Foglietta, ...
2010 Complexity in Engineering, 88-90, 2010
Risk-based methodology for real-time security monitoring of interdependent services in critical infrastructures
J Aubert, T Schaberreiter, C Incoul, D Khadraoui, B Gateau
2010 International Conference on Availability, Reliability and Security, 262-267, 2010
An integrated conceptual model for information system security risk management supported by enterprise architecture management
N Mayer, J Aubert, E Grandry, C Feltus, E Goettelmann, R Wieringa
Software & Systems Modeling 18 (3), 2285-2312, 2019
A security decision-reaction architecture for heterogeneous distributed network
C Feltus, D Khadraoui, J Aubert
2010 International Conference on Availability, Reliability and Security, 1-8, 2010
Design and implementation of a mediation system enabling secure communication among Critical Infrastructures
M Castrucci, A Neri, F Caldeira, J Aubert, D Khadraoui, M Aubigny, ...
International journal of critical infrastructure protection 5 (2), 86-97, 2012
Sector-based improvement of the information security risk management process in the context of telecommunications regulation
N Mayer, J Aubert, H Cholez, E Grandry
European Conference on Software Process Improvement, 13-24, 2013
Trust based interdependency weighting for on-line risk monitoring in interdependent critical infrastructures
F Caldeira, T Schaberreiter, S Varrette, E Monteiro, P Sim§es, P Bouvry, ...
International Journal of Secure Software Engineering (IJSSE) 4 (4), 47-69, 2013
Real-time security monitoring of interdependent services in critical infrastructures. case study of a risk-based approach
J Aubert, T Schaberreiter, C Incoul, D Khadraoui
21th European Safety and Reliability Conference, ESREL, 2010
Programming electronic institutions with utopia
P Schmitt, C Bonhomme, J Aubert, B GÔteau
International Conference on Advanced Information Systems Engineering, 122-135, 2010
An agent-based framework for identity management: The unsuspected relation with ISO/IEC 15504
B Gateau, C Feltus, J Aubert, C Incoul
2008 Second International Conference on Research Challenges in Informationá…, 2008
Critical infrastructure security modelling and resci-monitor: A risk based critical infrastructure model
T Schaberreiter, J Aubert, D Khadraoui
2011 IST-Africa Conference Proceedings, 1-8, 2011
Support tool development for real-time risk prediction in interdependent critical infrastructures
T Schaberreiter, C Bonhomme, J Aubert, C Incoul, D Khadraoui
IEEE Int’l Symposium on Sofware Reliability Engineering, 2009
Methodology to Align Business and IT Policies: Use Case from an IT Company
C Feltus, C Incoul, J Aubert, B Gateau, A Adelsbach, M Camy
2009 International Conference on Availability, Reliability and Security, 762-767, 2009
Assurance and trust indicators to evaluate accuracy of on-line risk in critical infrastructures
T Schaberreiter, F Caldeira, J Aubert, E Monteiro, D Khadraoui, P Sim§es
International Workshop on Critical Information Infrastructures Security, 30-41, 2011
SIM: an innovative business-oriented approach for a distributed access management
J Aubert, B Gateau, C Incoul, C Feltus
2008 3rd International Conference on Information and Communicationá…, 2008
An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF
N Mayer, J Aubert, E Grandry, C Feltus
IFIP Working Conference on The Practice of Enterprise Modeling, 353-361, 2016
Sector-Specific Tool for Information Security Risk Management in the Context of Telecommunications Regulation (Tool demo)
N Mayer, J Aubert
Proceedings of the 7th International Conference on Security of Informationá…, 2014
Preliminary requirements on trusted third parties for service transactions in cloud environments
K Stamou, J Aubert, B Gateau, JH Morin
2013 46th Hawaii International Conference on System Sciences, 4976-4983, 2013
Coalition-OrBAC: an agent-based access control model for dynamic coalitions
IB Abdelkrim, A Baina, C Feltus, J Aubert, M Bellafkih, D Khadraoui
World Conference on Information Systems and Technologies, 1060-1070, 2018
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20