default search action
3rd CRiSIS 2008: Tozeur, Tunisia
- Mohamed Jmaiel, Mohamed Mosbah:
CRiSIS '08, Third International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia, October 28-30, 2008. IEEE 2008, ISBN 978-1-4244-3309-4 - Clara Bertolissi, Maribel Fernández:
An algebraic-functional framework for distributed access control. 1-8 - Slim Kallel, Anis Charfi, Mira Mezini, Mohamed Jmaiel:
Aspect-based enforcement of formal delegation policies. 9-17 - Amine Baïna, Yves Deswarte, Anas Abou El Kalam, Mohamed Kaâniche:
Access control for cooperative systems: A comparative analysis. 19-26 - Nora Cuppens-Boulahia, Frédéric Cuppens, Jorge E. López de Vergara, Enrique Vázquez, Javier Guerra, Hervé Debar:
An ontology-based approach to react to network attacks. 27-35 - Benoit Morel:
Anomaly-based intrusion detection using distributed intelligent systems. 37-44 - Guillaume Hiet, Valérie Viet Triem Tong, Ludovic Mé, Benjamin Morin:
Policy-based intrusion detection in Web applications by monitoring Java information flows. 53-60 - Wei Wang, Sylvain Gombault:
Efficient detection of DDoS attacks with important attributes. 61-67 - Monia Loulou, Ahmed Hadj Kacem, Mohamed Jmaiel, Mohamed Mosbah:
A formal security framework for mobile agent systems: Specification and verification. 69-76 - Kamel Barkaoui, Rahma Ben Ayed, Hanifa Boucheneb, Awatef Hicheur:
Verification of Workflow processes under multilevel security considerations. 77-84 - Christophe Incoul, Benjamin Gâteau, Jocelyn Aubert, Nicolas Bounoughaz, Christophe Feltus:
If only I can trust my police! SIM : An agent-based audit solution of access right deployment through open network. 85-92 - Tim Hartog, Geert Kleinhuis:
Security analysis of the Dependability, Security Reconfigurability framework. 93-100 - Hakem Beitollahi, Geert Deconinck:
Analysis of Peer-to-Peer networks from a dependability perspective. 101-108 - Khaled Barbaria, Belhassen Zouari:
A Byzantine solution to early detect massive attacks. 109-116 - Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, José Araujo:
Automated reaction based on risk analysis and attackers skills in intrusion detection systems. 117-124 - Pierre E. Abi-Char, Mounir Mokhtari, Abdallah Mhamed, Bachar El-Hassan:
Towards a robust privacy and anonymity preserving architecture for ubiquitous computing. 125-132 - Narainsamy Pavaday, K. M. S. Soyjaudah:
A comparative study of secret code variants in terms of keystroke dynamics. 133-140 - Mohamed Elhoucine Elhdhili, Lamia Ben Azzouz, Farouk Kamoun:
Reputation based clustering algorithm for security management in ad hoc networks with liars. 141-148 - Axel Keller, Kerstin Voß, Dominic Battré, Matthias Hovestadt, Odej Kao:
Quality assurance of Grid service provisioning by risk aware managing of resource failures. 149-157 - Mahmoud Mostafa, Anas Abou El Kalam, Christian Fraboul:
EESP: A Security protocol that supports QoS management. 159-167 - Fatma Mili, Swapna Ghanekar, Nancy Alrajei:
Economic-based vs. nature-inspired intruder detection in sensor networks. 177-184 - Souheib Yousfi, Alexis Bonnecaze, Riadh Robbana:
Apport de la cryptographie elliptique dans le vote électronique. CRiSIS 2008: 185-192 - Christian Kollmitzer, Oliver Maurhart, Stefan Schauer, Stefan Rass:
Application framework for high security requirements in R&D environments based on quantum cryptography. 193-197 - Assia Ben Shil, Kaouthar Blibech, Riadh Robbana:
A new timestamping schema in the Bounded Storage Model. 199-205 - Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed:
Extended UML activity diagram for composing Grid services workflows. 207-212 - Sebastian Sageder, Johannes Sametinger, Andreas Wiesauer:
Case study: Using digital signatures for the archival of medical records in hospitals. 213-220 - Philippe Andouard, Olivier Ly, Davy Rouillard:
VisAA: Visual analyzer for assembler. 221-225 - Naoyuki Nagatou:
Revisiting enforceable security policies. 227-234 - Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala:
Firewalls anomalies' detection system based on web services / mobile agents interactions. 235-241 - Nadia Chalabi, Abdallah Mhamed, Belhadri Messabih:
Towards a new user Anonymity Preserving Protocol (APP) for MANETs. 243-248 - Komminist Weldemariam, Adolfo Villafiorita:
Formal procedural security modeling and analysis. 249-254 - Lilia Frikha, Zouheir Trabelsi:
A new covert channel in WIFI networks. 255-260 - Hakem Beitollahi, Geert Deconinck:
Comparing Chord, CAN, and Pastry overlay networks for resistance to DoS attacks. 261-266 - Ryma Abassi, Sihem Guemara El Fatmi:
Towards an automated firewall security policies validation process. 267-272
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.