A formal approach to specify and deploy a network security policy F Cuppens, N Cuppens-Boulahia, T Sans, A Miège Formal Aspects in Security and Trust: IFIP TC1 WG1. 7 Workshop on Formal …, 2005 | 171 | 2005 |
Nomad: A security model with non atomic actions and deadlines F Cuppens, N Cuppens-Boulahia, T Sans 18th IEEE Computer Security Foundations Workshop (CSFW'05), 186-196, 2005 | 114 | 2005 |
Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection network F Cuppens, F Autrel, Y Bouzida, J Garcia‐alfaro, S Gombault, T Sans Annals of Telecommunications-annales des télécommunications 61 (1-2), 197-217, 2006 | 42 | 2006 |
Selecting appropriate counter-measures in an intrusion detection framework F Cuppens, S Gombault, T Sans Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 78-87, 2004 | 31 | 2004 |
Security policy compliance with violation management J Brunel, F Cuppens, N Cuppens, T Sans, JP Bodeveix Proceedings of the 2007 ACM workshop on Formal methods in security …, 2007 | 28 | 2007 |
Protection of Relationships in XML Documents with the XML-BB Model F Cuppens, N Cuppens-Boulahia, T Sans Information Systems Security: First International Conference, ICISS 2005 …, 2005 | 20 | 2005 |
QWeS2T for Type-Safe Web Programming. T Sans, I Cervesato LAM@ LICS, 96-112, 2010 | 14 | 2010 |
A framework to enforce access control, usage control and obligations T Sans, F Cuppens, N Cuppens-Boulahia Annals of Telecommunications 11 (62), 1329-1352, 2007 | 10 | 2007 |
OPA: Onion Policy Administration Model—Another approach to manage rights in DRM T Sans, F Cuppens, N Cuppens-Boulahia New Approaches for Security, Privacy and Trust in Complex Environments …, 2007 | 8 | 2007 |
Getting CS undergraduates to communicate effectively A Karatsolis, I Cervasato, K Harras, Y Cooper, K Oflazer, N Abu-Ghazaleh, ... Proceedings of the 16th annual joint conference on Innovation and technology …, 2011 | 7 | 2011 |
Form: A federated rights expression model for open drm frameworks T Sans, F Cuppens, N Cuppens-Boulahia Advances in Computer Science-ASIAN 2006. Secure Software and Related Issues …, 2007 | 7 | 2007 |
A flexible and distributed architecture to enforce dynamic access control T Sans, F Cuppens, N Cuppens-Boulahia Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 …, 2006 | 6 | 2006 |
Miege," F Cuppens, N Cuppens-Boulahia, T Sans A formal approach to specifY and deploy a network security policy," In Proc …, 2004 | 6 | 2004 |
Type-Safe Web Programming in QWeS2T T Sans, I Cervesato Technical Report CMU-CS-10-125, Department of Computer Science, Carnegie …, 2010 | 2 | 2010 |
A formal approach to specify and deploy a network security policy N Sans, F Cuppens, A Mige Second FAST Workshop, Toulouse, France, 2004 | 2 | 2004 |
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings N Cuppens-Boulahia, F Cuppens, S Jajodia, A Abou El Kalam, T Sans Springer, 2014 | 1 | 2014 |
Substructural meta-theory of a type-safe language for web programming I Cervesato, T Sans Fundamenta Informaticae 130 (1), 67-97, 2014 | 1 | 2014 |
XML-BB: A model to handle relationships protection in XML documents F Cuppens, N Cuppens-Boulahia, T Sans Knowledge-Based Intelligent Information and Engineering Systems: 11th …, 2007 | 1 | 2007 |
An Authorization Model For The Web Programming Language Qwel LA El-Matbouly, T Sans, S Hussein | | 2013 |
Controlling Data Flow with a Policy-Based Programming Language for the Web T Sans, I Cervesato, S Hussein Secure IT Systems: 18th Nordic Conference, NordSec 2013, Ilulissat …, 2013 | | 2013 |