default search action
Jocelyn Aubert
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Djibrilla Amadou Kountché, Jocelyn Aubert, Manh-Dung Nguyen, Natalia Kalfa, Nicola Gregorio Durante, Cristiano Passerini, Stéphane Kuding:
The PRECINCT Ecosystem Platform for Critical Infrastructure Protection: Architecture, Deployment and Transferability. ARES 2024: 167:1-167:8 - 2022
- [c22]Jocelyn Aubert, Hervé Cholez:
A Participative and Collaborative Approach for Security Risk Management Modelling in the Context of Essential Services. WorldCIST (3) 2022: 132-141
2010 – 2019
- 2019
- [j2]Nicolas Mayer, Jocelyn Aubert, Eric Grandry, Christophe Feltus, Elio Goettelmann, Roel J. Wieringa:
An integrated conceptual model for information system security risk management supported by enterprise architecture management. Softw. Syst. Model. 18(3): 2285-2312 (2019) - 2018
- [c21]Jean-Michel Remiche, Jocelyn Aubert, Nicolas Mayer, David Petrocelli:
Evaluation of Cloud Computing Offers through Security Risks - An Industrial Case Study. CLOSER 2018: 338-345 - [c20]Iman Ben Abdelkrim, Amine Baïna, Christophe Feltus, Jocelyn Aubert, Mostafa Bellafkih, Djamel Khadraoui:
Coalition-OrBAC: An Agent-Based Access Control Model for Dynamic Coalitions. WorldCIST (1) 2018: 1060-1070 - 2017
- [c19]Jocelyn Aubert, Christophe Feltus, Andrea Kostakis, Djamel Khadraoui:
Smart-X: an Adaptive Multi-Agent Platform for Smart-Topics. ANT/SEIT 2017: 943-948 - [i3]Nicolas Mayer, Jocelyn Aubert, Eric Grandry, Christophe Feltus, Elio Goettelmann:
An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management based on TOGAF, ArchiMate, IAF and DoDAF. CoRR abs/1701.01664 (2017) - 2016
- [c18]Nicolas Mayer, Jocelyn Aubert, Eric Grandry, Christophe Feltus:
An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF. PoEM 2016: 353-361 - [c17]Yves Le Bray, Nicolas Mayer, Jocelyn Aubert:
Defining measurements for analyzing information security risk reports in the telecommunications sector. SAC 2016: 2189-2194 - [i2]Nicolas Mayer, Jocelyn Aubert, Hervé Cholez, Eric Grandry, Eric Dubois:
The TISRIM-Telco Toolset - An IT Regulatory Framework to Support Security Compliance in the Telecommunications Sector. ERCIM News 2016(107) (2016) - 2015
- [c16]Lou Schwartz, Eric Grandry, Jocelyn Aubert, Marie-Laure Watrinet, Hervé Cholez:
Participative Design of a Security Risk Reference Model: an Experience in the Healthcare Sector. PoEM (Short Papers) 2015: 1-10 - 2014
- [c15]Nicolas Mayer, Jocelyn Aubert:
Sector-Specific Tool for Information Security Risk Management in the Context of Telecommunications Regulation (Tool demo). SIN 2014: 85 - 2013
- [c14]Nicolas Mayer, Jocelyn Aubert, Hervé Cholez, Eric Grandry:
Sector-Based Improvement of the Information Security Risk Management Process in the Context of Telecommunications Regulation. EuroSPI 2013: 13-24 - [c13]Katerina Stamou, Jocelyn Aubert, Benjamin Gâteau, Jean-Henry Morin:
Preliminary Requirements on Trusted Third Parties for Service Transactions in Cloud Environments. HICSS 2013: 4976-4983 - 2012
- [j1]Marco Castrucci, Alessandro Neri, Filipe Caldeira, Jocelyn Aubert, Djamel Khadraoui, Matthieu Aubigny, Carlo Harpes, Paulo Simões, Vincenzo Suraci, Paolo Capodieci:
Design and implementation of a mediation system enabling secure communication among Critical Infrastructures. Int. J. Crit. Infrastructure Prot. 5(2): 86-97 (2012) - [c12]Katerina Stamou, Jean-Henry Morin, Benjamin Gâteau, Jocelyn Aubert:
Service Level Agreements as a Service - Towards Security Risks Aware SLA Management. CLOSER 2012: 663-669 - [c11]Jean-Henry Morin, Jocelyn Aubert, Benjamin Gâteau:
Towards Cloud Computing SLA Risk Management: Issues and Challenges. HICSS 2012: 5509-5514 - 2011
- [c10]Filipe Caldeira, Thomas Schaberreiter, Edmundo Monteiro, Jocelyn Aubert, Paulo Simões, Djamel Khadraoui:
Trust based interdependency weighting for on-line risk monitoring in interdependent critical infrastructures. CRiSIS 2011: 40-46 - [c9]Thomas Schaberreiter, Filipe Caldeira, Jocelyn Aubert, Edmundo Monteiro, Djamel Khadraoui, Paulo Simões:
Assurance and Trust Indicators to Evaluate Accuracy of On-line Risk in Critical Infrastructures. CRITIS 2011: 30-41 - 2010
- [c8]Christophe Feltus, Djamel Khadraoui, Jocelyn Aubert:
A Security Decision-Reaction Architecture for Heterogeneous Distributed Network. ARES 2010: 1-8 - [c7]Jocelyn Aubert, Thomas Schaberreiter, Christophe Incoul, Djamel Khadraoui, Benjamin Gâteau:
Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures. ARES 2010: 262-267 - [c6]Pierre Schmitt, Cédric Bonhomme, Jocelyn Aubert, Benjamin Gâteau:
Programming Electronic Institutions with Utopia. CAiSE Forum (Selected Papers) 2010: 122-135 - [c5]Pierre Schmitt, Cédric Bonhomme, Jocelyn Aubert, Benjamin Gâteau:
Programming Electronic Institutions with Utopia. CAiSE Forum 2010 - [c4]Paolo Capodieci, Stefano Diblasi, Ester Ciancamerla, Michele Minichino, Chiara Foglietta, Davide Lefevre, Gabriele Oliva, Stefano Panzieri, Roberto Setola, Stefano De Porcellinis, Francesco Delli Priscoli, Marco Castrucci, Vincenzo Suraci, Leonid Lev, Yosi Shneck, Djamel Khadraoui, Jocelyn Aubert, Serguei Iassinovski, Jianmin Jiang, Paulo Simões, Filipe Caldeira, Agnieszka Spronska, Carlo Harpes, Matthieu Aubigny:
Improving Resilience of Interdependent Critical Infrastructures via an On-Line Alerting System. COMPENG 2010: 88-90 - [i1]Jocelyn Aubert, Christophe Incoul, Djamel Khadraoui:
IT Security: Risk-Based Prediction Tool and Method for Critical Infrastructures. ERCIM News 2010(81) (2010)
2000 – 2009
- 2009
- [c3]Christophe Feltus, Christophe Incoul, Jocelyn Aubert, Benjamin Gâteau, André Adelsbach, Marc Camy:
Methodology to Align Business and IT Policies: Use Case from an IT Company. ARES 2009: 762-767 - 2008
- [c2]Christophe Incoul, Benjamin Gâteau, Jocelyn Aubert, Nicolas Bounoughaz, Christophe Feltus:
If only I can trust my police! SIM : An agent-based audit solution of access right deployment through open network. CRiSIS 2008: 85-92 - [c1]Benjamin Gâteau, Christophe Feltus, Jocelyn Aubert, Christophe Incoul:
An agent-based framework for identity management: The unsuspected relation with ISO/IEC 15504. RCIS 2008: 35-44
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-28 21:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint