Filtrer vos résultats
- 30
- 2
- 22
- 5
- 3
- 1
- 1
- 2
- 32
- 1
- 1
- 3
- 3
- 2
- 6
- 3
- 5
- 1
- 4
- 2
- 1
- 27
- 5
- 31
- 3
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 32
- 13
- 8
- 7
- 7
- 7
- 6
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
32 résultats
|
|
triés par
|
Trust and privacy in attribute based access control for collaboration environmentsiiWAS 2009, Dec 2009, Kuala Lumpur, Malaysia. pp.47-53
Communication dans un congrès
hal-00466305v1
|
|||
Cloud Resources Placement Based on Functional and Non-Functional RequirementsSECRYPT, Jul 2015, Colmar, France
Communication dans un congrès
hal-01158134v1
|
|||
SPTrack: Visual Analysis of Information Flows within SELinux Policies and Attack LogsActive Media Technology, Dec 2012, Chengdu, China. pp.596-605, ⟨10.1007/978-3-642-35236-2_60⟩
Communication dans un congrès
hal-00766721v1
|
|||
Trust and privacy in attribute based access control for collaboration environmentsiiWAS 2009, Dec 2009, Kuala Lumpur, Malaysia. pp.47-53
Communication dans un congrès
hal-03226321v1
|
|||
An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OSInternational Journal On Advances in Software, 2011, 4 (1&2), pp.34-45
Article dans une revue
hal-00658000v1
|
|||
A Multi-Agent and Multi-Level Architecture to Secure Distributed SystemsFirst International Workshop on Privacy and Security in Agent-based Collaborative Environments, 2006, Hakodate, Japan
Communication dans un congrès
hal-00083356v1
|
|||
Toward a real MLS/SELinux system for end users: an empirical studyWorkshop on Collaboration and Security (COLSEC'10), May 2009, Baltimore, United States. pp.209-216, ⟨10.1109/CTS.2009.5067483⟩
Communication dans un congrès
hal-00466351v1
|
|||
An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OSSECURWARE'10, Jul 2010, Venise, Italy. pp.11-16
Communication dans un congrès
hal-00474156v1
|
|||
Amélioration de la sécurité des grands réseaux par une infrastructure de méta-politique11ème Colloque Francophone sur l'Ingénierie des Protocoles (CFIP'2005), Mar 2005, Bordeaux, France. pp.517-530
Communication dans un congrès
hal-00083402v1
|
|||
HoneyCloud: elastic honeypots - On-attack provisioning of high-interaction honeypotsSECRYPT 2012, Jul 2012, Rome, Italy. pp.434-439
Communication dans un congrès
hal-00721415v1
|
|||
Honeypot forensics for system and network SIEM designGuillermo Suárez de Tangil and Esther Palomar. Advances in Security Information Management: Perceptions and Outcomes, Nova Science Publishers, pp.181-216, 2013, Computer Science, Technology and Applications, Computer Networks, 978-1-62417-221-2
Chapitre d'ouvrage
hal-00677340v1
|
|||
De la sécurité de la virtualisation à la sécurité des CloudsColloque International sur la Sécurité des Systèmes d'Information, Mar 2014, Kenitra, Maroc
Communication dans un congrès
hal-00980796v1
|
|||
From a Generic Framework for Expressing Integrity Properties to a Dynamic MAC Enforcement for Operating SystemsTransactions on Computational Science, 2010, pp._
Article dans une revue
hal-00511130v1
|
|||
Security and Virtualization: a Survey[Research Report] INSA CVL - Institut National des Sciences Appliquées - Centre Val de Loire; LIFO, Université d'Orléans, INSA Centre Val de Loire. 2011
Rapport
hal-03226336v1
|
|||
Hardening large-scale networks security through a meta-policy framework3rd Workshop on the Internet, Telecommunications and Signal Processing (WITSP'04), Dec 2004, Adelaïde, Australia. pp.132-137
Communication dans un congrès
hal-00083400v1
|
|||
Access Control and Security Properties Requirements Specification for Clouds' SecLAsCloudCom 2013, Dec 2013, Bristol, United Kingdom. pp.723-729
Communication dans un congrès
hal-03226333v1
|
|||
A Collaborative Approach for Access Control, Intrusion Detection and Security Testing2006, pp.270-278
Communication dans un congrès
hal-00083350v1
|
|||
|
From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut, P. Clemente, J.-F. Lalande, J. Rouzaud-Cornabas[Research Report] INSA CVL - Institut National des Sciences Appliquées - Centre Val de Loire; LIFO, Université d'Orléans, INSA Centre Val de Loire. 2011
Rapport
hal-00995211v1
|
||
Classification of malicious distributed SELinux activitiesJournal of Computers (JCP), 2009, 4 (5), pp.423-432. ⟨10.4304/jcp.4.5.423-432⟩
Article dans une revue
hal-00459817v1
|
|||
An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OSInternational Journal On Advances in Software, 2011, 4 (1&2), pp.34-45
Article dans une revue
hal-03226326v1
|
|||
A Multi-Agent and Multi-Level Architecture to Secure Distributed SystemsFirst International Workshop on Privacy and Security in Agent-based Collaborative Environments, 2006, Hakodate, Japan
Communication dans un congrès
hal-03226172v1
|
|||
Systèmes de confiance et détection d'intrusion répartisLes Journées Informatique de la Région Centre, Jun 2005, Blois, France
Communication dans un congrès
hal-00459971v1
|
|||
Les systèmes d'authentification biométriques cardiaquesRendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2023, Neuvy-sur-Barangeon, France
Poster de conférence
hal-04249662v1
|
|||
Correlation of system events: High performance classification of selinux activities and scenariosWorkshop on Security and High Performance Computing Systems, Jun 2008, Cyprus, Cyprus. pp.171-177
Communication dans un congrès
hal-00459822v1
|
|||
Access Control and Security Properties Requirements Specification for Clouds' SecLAsCloudCom 2013, Dec 2013, Bristol, United Kingdom. pp.723-729
Communication dans un congrès
hal-00920768v1
|
|||
|
SYNEMA: visual monitoring of network and system security sensorsSECRYPT 2011, Jul 2011, Séville, Spain. pp.375-378, ⟨10.5220/0003516203750378⟩
Communication dans un congrès
hal-00596893v1
|
||
An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management systemFuture Generation Computer Systems, 2014, 31, pp.147-168. ⟨10.1016/j.future.2013.05.010⟩
Article dans une revue
hal-00835887v1
|
|||
|
Security and Virtualization: a Survey2011
Rapport
hal-00995214v1
|
||
An integrity security property based on information flows : Application to the enforcement of a classical operating systemJournée Informatique de la Région Centre 2009, Jan 2010, Blois, France. pp.1
Communication dans un congrès
hal-00459827v1
|
|||
Toward a real MLS/SELinux system for end users: an empirical studyWorkshop on Collaboration and Security (COLSEC'10), May 2009, Baltimore, United States. pp.209-216, ⟨10.1109/CTS.2009.5067483⟩
Communication dans un congrès
hal-03226176v1
|
- 1
- 2