Nora Cuppens
Nora Cuppens
Directrice de Recherche, IMT Atlantique (ex Telecom Bretagne)
Verified email at imt-atlantique.fr
TitleCited byYear
Modeling contextual security policies
F Cuppens, N Cuppens-Boulahia
International Journal of Information Security 7 (4), 285-305, 2008
1632008
Reversible watermarking based on invariant image classification and dynamic histogram shifting
G Coatrieux, W Pan, N Cuppens-Boulahia, F Cuppens, C Roux
IEEE Transactions on information forensics and security 8 (1), 111-120, 2012
1582012
Complete analysis of configuration rules to guarantee reliable network security policies
JG Alfaro, N Boulahia-Cuppens, F Cuppens
International Journal of Information Security 7 (2), 103-122, 2008
1462008
A formal approach to specify and deploy a network security policy
F Cuppens, N Cuppens-Boulahia, T Sans, A Miège
IFIP World Computer Congress, TC 1, 203-218, 2004
1432004
High level conflict management strategies in advanced access control models
F Cuppens, N Cuppens-Boulahia, MB Ghorbel
Electronic Notes in Theoretical Computer Science 186, 3-26, 2007
1372007
A service dependency model for cost-sensitive intrusion response
N Kheir, N Cuppens-Boulahia, F Cuppens, H Debar
European Symposium on Research in Computer Security, 626-642, 2010
1172010
Nomad: A security model with non atomic actions and deadlines
F Cuppens, N Cuppens-Boulahia, T Sans
18th IEEE Computer Security Foundations Workshop (CSFW'05), 186-196, 2005
1052005
Efficient intrusion detection using principal component analysis
Y Bouzida, F Cuppens, N Cuppens-Boulahia, S Gombault
3éme Conférence sur la Sécurité et Architectures Réseaux (SAR), La Londe …, 2004
952004
Inheritance hierarchies in the Or-BAC Model and application in a network environment
F Cuppens, N Cuppens-Boulahia, A Miège
Proc. Foundations of Computer Security (FCS04), 41-60, 2004
822004
Detection and removal of firewall misconfiguration
F Cuppens, N Cuppens-Boulahia, J Garcia-Alfaro
Proceedings of the 2005 IASTED International Conference on Communication …, 2005
712005
MotOrBAC 2: a security policy tool
F Autrel, F Cuppens, N Cuppens-Boulahia, C Coma
3rd Conference on Security in Network Architectures and Information Systems …, 2008
642008
An extended RBAC profile of XACML
D Abi Haidar, N Cuppens-Boulahia, F Cuppens, H Debar
Proceedings of the 3rd ACM workshop on Secure web services, 13-22, 2006
632006
O2O: Virtual private organizations to manage security policy interoperability
F Cuppens, N Cuppens-Boulahia, C Coma
International Conference on Information Systems Security, 101-115, 2006
582006
An ontology-based approach to react to network attacks
N Cuppens-Boulahia, F Cuppens, JEL de Vergara, E Vázquez, J Guerra, ...
2008 Third International Conference on Risks and Security of Internet and …, 2008
572008
A formal approach for testing security rules
W Mallouli, JM Orset, A Cavalli, N Cuppens, F Cuppens
Proceedings of the 12th ACM symposium on Access control models and …, 2007
572007
Medical image integrity control combining digital signature and lossless watermarking
W Pan, G Coatrieux, N Cuppens-Boulahia, F Cuppens, C Roux
Data privacy management and autonomous spontaneous security, 153-162, 2009
552009
Analysis of policy anomalies on distributed network security setups
JG Alfaro, F Cuppens, N Cuppens-Boulahia
European Symposium on Research in Computer Security, 496-511, 2006
512006
Enabling automated threat response through the use of a dynamic security policy
H Debar, Y Thomas, F Cuppens, N Cuppens-Boulahia
Journal in Computer Virology 3 (3), 195-210, 2007
482007
Cost evaluation for intrusion response using dependency graphs
N Kheir, H Debar, N Cuppens-Boulahia, F Cuppens, J Viinikka
2009 International Conference on Network and Service Security, 1-6, 2009
462009
Formal enforcement and management of obligation policies
Y Elrakaiby, F Cuppens, N Cuppens-Boulahia
Data & Knowledge Engineering 71 (1), 127-147, 2012
452012
The system can't perform the operation now. Try again later.
Articles 1–20