Suivre
Christophe Feltus
Titre
Citée par
Citée par
Année
An integrated conceptual model for information system security risk management supported by enterprise architecture management
N Mayer, J Aubert, E Grandry, C Feltus, E Goettelmann, R Wieringa
Software & Systems Modeling 18, 2285-2312, 2019
1082019
Enhancing the ArchiMate® standard with a responsibility modeling language for access rights management
C Feltus, E Dubois, E Proper, I Band, M Petit
Proceedings of the Fifth International Conference on Security of Information …, 2012
95*2012
Conceptual integration of enterprise architecture management and security risk management
E Grandry, C Feltus, E Dubois
2013 17th IEEE International Enterprise Distributed Object Computing …, 2013
812013
Strengthening employee's responsibility to enhance governance of IT: COBIT RACI chart case study
C Feltus, M Petit, E Dubois
Proceedings of the first ACM workshop on Information security governance, 23-32, 2009
782009
Refining the notion of responsibility in enterprise engineering to support corporate governance of IT
C Feltus, M Petit, F Vernadat
IFAC Proceedings Volumes 42 (4), 924-929, 2009
60*2009
Modeling enterprise risk management and security with the ArchiMate language
I Band, W Engelsman, C Feltus, S González Paredes, J Hietala, ...
The Open Group, 2015
53*2015
Building a responsibility model including accountability, capability and commitment
C Feltus, M Petit
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
472009
Coalition-OrBAC: an agent-based access control model for dynamic coalitions
I Ben Abdelkrim, A Baina, C Feltus, J Aubert, M Bellafkih, D Khadraoui
Trends and Advances in Information Systems and Technologies: Volume 1 6 …, 2018
39*2018
Aligning access rights to governance needs with the responsibility metamodel (ReMMo) in the frame of enterprise architecture (Doctoral dissertation, University of Namur-Public …
C Feltus
352014
Evaluation of the risk and security overlay of archimate to model information system security risks
N Mayer, C Feltus
2017 IEEE 21st International Enterprise Distributed Object Computing …, 2017
282017
Improving operational risk management systems by formalizing the Basel II regulation with goal models and the ISO/IEC 15504 approach
A Rifaut, C Feltus
In Proceedings of the CAISE 06 Workshop on Regulations Modelling and their …, 2006
28*2006
Model-driven approach for privacy management in business ecosystem
C Feltus, E Grandry, T Kupper, JN Colin
MODELSWARD 2017-Proceedings of the 5th International Conference on Model …, 2017
262017
Towards cyber-security protection of critical infrastructures by generating security policy for SCADA systems
C Feltus, M Ouedraogo, D Khadraoui
2014 1st International Conference on Information and Communication …, 2014
262014
Blockchain: Analysis of the new technological components as opportunity to solve the trust issues in supply chain management
A Imeri, N Agoulmine, C Feltus, D Khadraoui
Intelligent Computing: Proceedings of the 2019 Computing Conference, Volume …, 2019
252019
Towards the ENTRI framework: security risk management enhanced by the use of enterprise architectures
N Mayer, E Grandry, C Feltus, E Goettelmann
Advanced Information Systems Engineering Workshops: CAiSE 2015 International …, 2015
242015
Preliminary literature review of policy engineering methods; toward responsibility concept
C Feltus
2008 3rd International Conference on Information and Communication …, 2008
222008
Business Gouvernance based Policy regulation for Security Incident Response
C Feltus, D Khadraoui, B de Rémont, A Rifaut
IEEE GIIS 2007 Global Infrastructure Symposium 6, 2007
222007
An ontology for requirements analysis of managers’ policies in Financial Institutions
C Feltus, A Rifaut
Enterprise Interoperability II: New Challenges and Approaches, 27-38, 2007
22*2007
Service specification and service compliance: How to consider the responsibility dimension?
A Khadraoui, C Feltus
Journal of Service Science Research 4, 123-142, 2012
212012
Learning algorithm recommendation framework for IS and CPS security: Analysis of the RNN, LSTM, and GRU contributions
C Feltus
International Journal of Systems and Software Security and Protection …, 2022
202022
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20