BACK TO INDEX

Publications of F. Cuppens
Articles in journal or book chapters
  1. F. Cuppens, L. Cholvy, C. Saurel, and J. Carrère. Merging regulations : analysis of a practical example. International Journal of Intelligent Systems, 16(11), November 2001.


  2. F. Cuppens and A. Gabillon. Cover Story Management. Data and Knowledge Engineering, 37:177--201, 2001.


  3. F. Cuppens and A. Gabillon. Logical Foundations of Multilevel Databases. Data and Knowledge Engineering, 29(3):259--291, March 1999.


  4. P. Bieber and F. Cuppens. A Logical View of Secure Dependencies. Journal of Computer Security, 1(1):99--129, 1992.


Conference articles
  1. A. Abou El Kalam, R. El Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miège, C. Saurel, and G. Trouessin. Organization Based Access Control. In Policy'2003, Como, Italie, June 2003.


  2. F. Cuppens and A. Miège. Alert Correlation in a Cooperative Intrusion Detection Framework. In IEEE Symposium on Security and Privacy, Oakland, USA, 2002.


  3. F. Cuppens. Managing Alerts in a Multi-Intrusion Detection Environment. In 17th Annual Computer Security Applications Conference New-Orleans, New-Orleans, USA, December 2001.


  4. F. Cuppens and R. Ortalo. LAMBDA: A Language to Model a Database for Detection of Attacks. In Third International Workshop on the Recent Advances in Intrusion Detection (RAID'2000), Toulouse, France, October 2000.


  5. F. Cuppens and C. Saurel. Towards a formalization of availability and denial of service. In Information Systems Technology Panel Symposium on Protecting Nato Information Systems in the 21st Century, Washington, 1999.


  6. L. Cholvy and F. Cuppens. Analyzing Consistency of Security Policies. In IEEE Symposium on Security and Privacy, Oakland, 1997.


  7. F. Cuppens and R. Demolombe. A modal logical framework for security policies. In Foundations of Intelligent Systems. 10th International Symposium ISMIS'97. LNAI 1325, 1997. Springer.


  8. N. Boulahia-Cuppens and F. Cuppens. Asynchronous composition and required security condition. In IEEE Symposium on Security and Privacy, Oakland, 1994.


  9. N. Boulahia-Cuppens, F. Cuppens, A. Gabillon, and K. Yazdanian. Decomposition of Multilevel Objects in an Object-Oriented Database. In European symposium on research in computer security, Brighton, UK, 1994. Springer Verlag.


  10. F. Cuppens. A Logical Analysis of Authorized and Prohibited Information Flows. In IEEE Symposium on Security and Privacy, Oakland, 1993.


Internal reports
  1. C. Saurel and F. Cuppens. Modélisation du concept de disponibilité. Technical report 1/3740.00 DTIM, ONERA DTIM, January 1999.



BACK TO INDEX




Disclaimer:

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All person copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Les documents contenus dans ces répertoires sont rendus disponibles par les auteurs qui y ont contribué en vue d'assurer la diffusion à temps de travaux savants et techniques sur une base non-commerciale. Les droits de copie et autres droits sont gardés par les auteurs et par les détenteurs du copyright, en dépit du fait qu'ils présentent ici leurs travaux sous forme électronique. Les personnes copiant ces informations doivent adhérer aux termes et contraintes couverts par le copyright de chaque auteur. Ces travaux ne peuvent pas être rendus disponibles ailleurs sans la permission explicite du détenteur du copyright.




Last modified: Wed Oct 29 14:44:30 2003
Author: jensen.


This document was translated from BibTEX by bibtex2html