Folgen
Christophe Feltus
Christophe Feltus
Bestätigte E-Mail-Adresse bei list.lu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
An integrated conceptual model for information system security risk management supported by enterprise architecture management
N Mayer, J Aubert, E Grandry, C Feltus, E Goettelmann, R Wieringa
Software & Systems Modeling 18 (3), 2285-2312, 2019
732019
Enhancing the ArchiMate® standard with a responsibility modeling language for access rights management
C Feltus, E Dubois, E Proper, I Band, M Petit
Proceedings of the Fifth International Conference on Security of Information …, 2012
702012
Strengthening employee's responsibility to enhance governance of IT: COBIT RACI chart case study
C Feltus, M Petit, E Dubois
Proceedings of the first ACM workshop on Information security governance, 23-32, 2009
692009
Conceptual integration of enterprise architecture management and security risk management
E Grandry, C Feltus, E Dubois
2013 17th IEEE International Enterprise Distributed Object Computing …, 2013
672013
Refining the notion of responsibility in enterprise engineering to support corporate governance of IT
C Feltus, M Petit, F Vernadat
IFAC Proceedings Volumes 42 (4), 924-929, 2009
58*2009
Modeling enterprise risk management and security with the ArchiMate language
I Band, W Engelsman, C Feltus, S González Paredes, J Hietala, ...
The Open Group, 2015
49*2015
Building a responsibility model including accountability, capability and commitment
C Feltus, M Petit
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
452009
Aligning access rights to governance needs with the responsibility metamodel (ReMMo) in the frame of enterprise architecture (Doctoral dissertation, University of Namur-Public …
C Feltus
32*2014
Enhancement of business it alignment by including responsibility components in RBAC
C Feltus, M Petit, M Sloman
Proceedings of the CAiSE 2010 Workshop Business/IT Alignment and …, 2010
312010
Improving Operational Risk Management Systems by Formalizing the Basel II Regulation with Goal Models and the ISO/IEC 15504 Approach.
A Rifaut, C Feltus
ReMo2V, 2006
26*2006
Evaluation of the risk and security overlay of archimate to model information system security risks
N Mayer, C Feltus
2017 IEEE 21st International Enterprise Distributed Object Computing …, 2017
252017
Towards cyber-security protection of critical infrastructures by generating security policy for SCADA systems
C Feltus, M Ouedraogo, D Khadraoui
2014 1st International Conference on Information and Communication …, 2014
242014
Model-driven Approach for Privacy Management in Business Ecosystem.
C Feltus, E Grandry, T Kupper, JN Colin
MODELSWARD, 392-400, 2017
222017
Towards the ENTRI framework: security risk management enhanced by the use of enterprise architectures
N Mayer, E Grandry, C Feltus, E Goettelmann
International Conference on Advanced Information Systems Engineering, 459-469, 2015
222015
Preliminary literature review of policy engineering methods; toward responsibility concept
C Feltus
2008 3rd International Conference on Information and Communication …, 2008
222008
Business Gouvernance based Policy regulation for Security Incident Response
C Feltus, D Khadraoui, B de Rémont, A Rifaut
IEEE GIIS 2007 Global Infrastructure Symposium 6, 2007
212007
Coalition-OrBAC: an agent-based access control model for dynamic coalitions
I Ben Abdelkrim, A Baina, C Feltus, J Aubert, M Bellafkih, D Khadraoui
World Conference on Information Systems and Technologies, 1060-1070, 2018
20*2018
Service specification and service compliance: How to consider the responsibility dimension?
A Khadraoui, C Feltus
Journal of Service Science Research 4 (1), 123-142, 2012
202012
Multi-agents system service based platform in telecommunication security incident reaction
B Gâteau, D Khadraoui, C Feltus
2009 Global Information Infrastructure Symposium, 1-6, 2009
202009
A Security Decision-Reaction Architecture for Heterogeneous Distributed Network.
C Feltus, D Khadraoui, J Aubert
2012 Seventh International conference on Conference on Availability …, 0
20*
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20