High level conflict management strategies in advanced access control models F Cuppens, N Cuppens-Boulahia, M Ben Ghorbel Electronic Notes in Theoretical Computer Science 186, 3-26, 2007 | 152 | 2007 |
Tuple-Based Access Control: a Provenance-Based Information Flow Control for Relational Data R Thion, F Lesueur, M Ben Ghorbel-Talbi 30th ACM/SIGAPP Symposium On Applied Computing (security track SEC@SAC), 2015 | 50* | 2015 |
Managing delegation in access control models MB Ghorbel-Talbi, F Cuppens, N Cuppens-Boulahia, A Bouhoula 15th International Conference on Advanced Computing and Communications …, 2007 | 43 | 2007 |
A delegation model for extended RBAC M Ben-Ghorbel-Talbi, F Cuppens, N Cuppens-Boulahia, A Bouhoula International Journal of Information Security 9 (3), 209-236, 2010 | 36 | 2010 |
An extended role-based access control model for delegating obligations M Ben Ghorbel-Talbi, F Cuppens, N Cuppens-Boulahia, A Bouhoula Trust, Privacy and Security in Digital Business, 127-137, 2009 | 17 | 2009 |
Smatch: Formal dynamic session management model for RBAC F Cuppens, N Cuppens-Boulahia, M Ben Ghorbel-Talbi, S Morucci, ... Journal of Information Security and Applications 18 (1), 30-44, 2013 | 10 | 2013 |
Delegation of Obligations and Responsibility M Ben-Ghorbel-Talbi, F Cuppens, N Cuppens-Boulahia, D Le Métayer, ... IFIP Advances in Information and Communication Technology, International …, 2011 | 10 | 2011 |
Revocation schemes for delegation licences M Ben-Ghorbel-Talbi, F Cuppens, N Cuppens-Boulahia, A Bouhoula Information and Communications Security: 10th International Conference …, 2008 | 10 | 2008 |
Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic M Ben Ghorbel, M Talbi, M Mejri The Second International Conference on Availability, Reliability and …, 2007 | 6 | 2007 |
Palpable Privacy through Declarative Information Flows Tracking for Smart Buildings F Lesueur, S Surdu, R Thion, Y Gripay, M Ben Ghorbel-Talbi The International Conference on Availability, Reliability and Security (ARES), 2014 | 4 | 2014 |
Intrusion Detection Prototype Based on ADM-Logic M Talbi, M Ben Ghorbel-Talbi, M Mejri Journal of Software 3 (2), 15-22, 2008 | 4 | 2008 |
Information Flow Control on a Multi-Paradigm Web Application for SQL Injection Prevention M Talbi, F Lesueur, G Perrin Foundations & Practice of Security, 2015 | 1* | 2015 |
Negotiating and delegating obligations M Ben-Ghorbel-Talbi, F Cuppens, N Cuppens-Boulahia Proceedings of the International Conference on Management of Emergent …, 2010 | 1 | 2010 |
Analysis of Otolith Shape as a Tool for Discriminating Stocks of Cassava Croaker (Pseudotolithus senegalensis) in Beninese Waters M Houeto, M Sounouvou, M Tazarki, N Andrialovanirina, M Mejri, ... Open Journal of Marine Science 14 (4), 96-114, 2024 | | 2024 |
Contrôle d’accès tangible dans les bâtiments intelligents par suivi de flux déclaratifs F Lesueur, S Surdu, R Thion, Y Gripay, M Ben Ghorbel-Talbi SARSSI 2014, 2014 | | 2014 |
A Decentralized Administration Model for Delegating and Negotiating Obligations MB Ghorbel, F Cuppens, N Cuppens-Boulahia Journal of Multimedia Processing and Technologies, ., 2012 | | 2012 |
Towards Session-Aware RBAC Delegation: Function Switch M Ben Ghorbel-Talbi, F Cuppens, N Cuppens-Boulahia, S Morucci Data Privacy Management and Autonomous Spontaneous Security, 287-302, 2012 | | 2012 |
Managing Revocation in Role Based Access Control Models Using Delegation Licences M Ben-Ghorbel-Talbi, F Cuppens, N Cuppens-Boulahia, A Bouhoula Sar Ssi 2008, 241, 2008 | | 2008 |