CRiSIS C

34 papers

YearTitle / Authors
2008A Byzantine solution to early detect massive attacks.
Khaled Barbaria, Belhassen Zouari
2008A comparative study of secret code variants in terms of keystroke dynamics.
Narainsamy Pavaday, K. M. S. Soyjaudah
2008A formal security framework for mobile agent systems: Specification and verification.
Monia Loulou, Ahmed Hadj Kacem, Mohamed Jmaiel, Mohamed Mosbah
2008A new covert channel in WIFI networks.
Lilia Frikha, Zouheir Trabelsi
2008A new timestamping schema in the Bounded Storage Model.
Assia Ben Shil, Kaouthar Blibech, Riadh Robbana
2008Access control for cooperative systems: A comparative analysis.
Amine Baïna, Yves Deswarte, Anas Abou El Kalam, Mohamed Kaâniche
2008An algebraic-functional framework for distributed access control.
Clara Bertolissi, Maribel Fernández
2008An ontology-based approach to react to network attacks.
Nora Cuppens-Boulahia, Frédéric Cuppens, Jorge E. López de Vergara, Enrique Vázquez, Javier Guerra, Hervé Debar
2008Analysis of Peer-to-Peer networks from a dependability perspective.
Hakem Beitollahi, Geert Deconinck
2008Anomaly-based intrusion detection using distributed intelligent systems.
Benoit Morel
2008Application framework for high security requirements in R&D environments based on quantum cryptography.
Christian Kollmitzer, Oliver Maurhart, Stefan Schauer, Stefan Rass
2008Apport de la cryptographie elliptique dans le vote électronique.
Souheib Yousfi, Alexis Bonnecaze, Riadh Robbana
2008Aspect-based enforcement of formal delegation policies.
Slim Kallel, Anis Charfi, Mira Mezini, Mohamed Jmaiel
2008Automated reaction based on risk analysis and attackers skills in intrusion detection systems.
Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, José Araujo
2008CRiSIS '08, Third International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia, October 28-30, 2008
Mohamed Jmaiel, Mohamed Mosbah
2008Case study: Using digital signatures for the archival of medical records in hospitals.
Sebastian Sageder, Johannes Sametinger, Andreas Wiesauer
2008Comparing Chord, CAN, and Pastry overlay networks for resistance to DoS attacks.
Hakem Beitollahi, Geert Deconinck
2008EESP: A Security protocol that supports QoS management.
Mahmoud Mostafa, Anas Abou El Kalam, Christian Fraboul
2008Economic-based vs. nature-inspired intruder detection in sensor networks.
Fatma Mili, Swapna Ghanekar, Nancy Alrajei
2008Efficient detection of DDoS attacks with important attributes.
Wei Wang, Sylvain Gombault
2008Extended UML activity diagram for composing Grid services workflows.
Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed
2008Firewalls anomalies' detection system based on web services / mobile agents interactions.
Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala
2008Formal procedural security modeling and analysis.
Komminist Weldemariam, Adolfo Villafiorita
2008If only I can trust my police! SIM : An agent-based audit solution of access right deployment through open network.
Christophe Incoul, Benjamin Gâteau, Jocelyn Aubert, Nicolas Bounoughaz, Christophe Feltus
2008Policy-based intrusion detection in Web applications by monitoring Java information flows.
Guillaume Hiet, Valérie Viet Triem Tong, Ludovic Mé, Benjamin Morin
2008Quality assurance of Grid service provisioning by risk aware managing of resource failures.
Axel Keller, Kerstin Voß, Dominic Battré, Matthias Hovestadt, Odej Kao
2008Reputation based clustering algorithm for security management in ad hoc networks with liars.
Mohamed Elhoucine Elhdhili, Lamia Ben Azzouz, Farouk Kamoun
2008Revisiting enforceable security policies.
Naoyuki Nagatou
2008Security analysis of the Dependability, Security Reconfigurability framework.
Tim Hartog, Geert Kleinhuis
2008Towards a new user Anonymity Preserving Protocol (APP) for MANETs.
Nadia Chalabi, Abdallah Mhamed, Belhadri Messabih
2008Towards a robust privacy and anonymity preserving architecture for ubiquitous computing.
Pierre E. Abi-Char, Mounir Mokhtari, Abdallah Mhamed, Bachar El-Hassan
2008Towards an automated firewall security policies validation process.
Ryma Abassi, Sihem Guemara El Fatmi
2008Verification of Workflow processes under multilevel security considerations.
Kamel Barkaoui, Rahma Ben Ayed, Hanifa Boucheneb, Awatef Hicheur
2008VisAA: Visual analyzer for assembler.
Philippe Andouard, Olivier Ly, Davy Rouillard