全部文献期刊学位论文会议报纸专利标准年鉴图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Nora Cuppens-Boulahia , Frédéric Cuppens
来源:[J].World Wide Web(IF 1.196), 2016, Vol.19 (1), pp.41-68Springer
摘要:Abstract(#br)Radio Frequency IDentification (RFID) technology offers a new way of automating the identification and storing of information in RFID tags. The emerging opportunities for the use of RFID technology in human centric applications like monitoring and indoor guidance sys...
作者:Nora Cuppens-Boulahia , Frédéric Cuppens ...
来源:[J].annals of telecommunications - annales des télécommunications(IF 0.567), 2014, Vol.69 (1-2), pp.3-19Springer
摘要:Abstract(#br)In this paper, we present an approach to instrument a Simple Protocol And RDF Query Language query rewriting algorithm enforcing privacy preferences. The term instrument is used to mean supplying appropriate constraints. We show how to design a real and effective ins...
作者:Nora Cuppens-Boulahia , Joaquin Garcia-Alfaro ...
来源:[J].Journal of Network and Computer Applications(IF 1.467), 2014, Vol.39, pp.152-166Elsevier
摘要:Abstract(#br)The EPC Class-1 Generation-2 (Gen2 for short) is a Radio Frequency IDentification (RFID) technology that is gaining a prominent place in several domains. However, the Gen2 standard lacks of verifiable security functionalities. Eavesdropping attacks can, for instance,...
作者:... Frédéric Cuppens , Nora Cuppens-Boulahia , Anas Abou El Kalam
来源:[J].EURASIP Journal on Information Security, 2014, Vol.2014 (1), pp.1-16Springer
摘要:Abstract(#br)Many papers have already provided models to formally specify security policies. In this paper, security policies are modeled using deontic concepts of permission and obligation. Permission rules are used to specify access control policies, while obligation rules are ...
作者:Thierry Sans , Frédéric Cuppens , Nora Cuppens-Boulahia
来源:[J].Annales Des Télécommunications(IF 0.567), 2007, Vol.62 (11-12), pp.1329-1352Springer
摘要:Abstract(#br)In this paper, we define a core language to express access control, usage control and obligation policies and we specify a policy controller in charge of evaluating such policies. This policy language can be used to specify security requirements of many applicat...
作者:Nora Cuppens-Boulahia , Frédéric Cuppens ...
来源:[J].International Journal of Information Security(IF 0.48), 2015, Vol.14 (5), pp.471-483Springer
摘要:Abstract(#br)In healthcare information management, privacy and confidentiality are two major concerns usually satisfied by access control means. Traditional access control mechanisms prevent illegal access by controlling access right before executing an action. They have som...
作者:Nora Cuppens-Boulahia , Salvador Martinez
来源:[J].Computers & Security(IF 1.158), 2013, Vol.39, pp.64-85Elsevier
摘要:Abstract(#br)Firewall configurations are evolving into dynamic policies that depend on protocol states. As a result, stateful configurations tend to be much more error prone. Some errors occur on configurations that only contain stateful rules. Others may affect those holding bot...
作者:... Iakovos S. Venieris , Frédéric Cuppens , Nora Cuppens-Boulahia
来源:[J].Computers and Electrical Engineering(IF 0.928), 2013, Vol.39 (7), pp.2263-2281Elsevier
摘要:Abstract(#br)In this paper, we introduce a new access control model that aims at addressing the privacy implications surrounding network monitoring. In fact, despite its importance, network monitoring is natively leakage-prone and, moreover, this is exacerbated due to the complex...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×