Thierry Sans
Title
Cited by
Cited by
Year
A formal approach to specify and deploy a network security policy
F Cuppens, N Cuppens-Boulahia, T Sans, A Miège
IFIP World Computer Congress, TC 1, 203-218, 2004
1612004
Nomad: A security model with non atomic actions and deadlines
F Cuppens, N Cuppens-Boulahia, T Sans
18th IEEE Computer Security Foundations Workshop (CSFW'05), 186-196, 2005
1122005
Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework
F Cuppens, F Autrel, Y Bouzida, J Garcia, S Gombault, T Sans
Annales des télécommunications 61 (1), 197-217, 2006
402006
Selecting appropriate counter-measures in an intrusion detection framework
F Cuppens, S Gombault, T Sans
Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 78-87, 2004
292004
Security policy compliance with violation management
J Brunel, F Cuppens, N Cuppens, T Sans, JP Bodeveix
Proceedings of the 2007 ACM workshop on Formal methods in security …, 2007
272007
Protection of Relationships in XML Documents with the XML-BB Model
F Cuppens, N Cuppens-Boulahia, T Sans
International Conference on Information Systems Security, 148-163, 2005
182005
QWeS2T for Type-Safe Web Programming.
T Sans, I Cervesato
LAM@ LICS, 96-112, 2010
142010
A framework to enforce access control, usage control and obligations
T Sans, F Cuppens, N Cuppens-Boulahia
Annales des télécommunications 62 (11), 1329-1352, 2007
102007
OPA: Onion Policy Administration Model—Another approach to manage rights in DRM
T Sans, F Cuppens, N Cuppens-Boulahia
IFIP International Information Security Conference, 349-360, 2007
82007
Getting CS undergraduates to communicate effectively
A Karatsolis, I Cervasato, K Harras, Y Cooper, K Oflazer, N Abu-Ghazaleh, ...
Proceedings of the 16th annual joint conference on Innovation and technology …, 2011
72011
Form: A federated rights expression model for open drm frameworks
T Sans, F Cuppens, N Cuppens-Boulahia
Annual Asian Computing Science Conference, 45-59, 2006
72006
A flexible and distributed architecture to enforce dynamic access control
T Sans, F Cuppens, N Cuppens-Boulahia
IFIP International Information Security Conference, 183-195, 2006
62006
Miege,"
F Cuppens, N Cuppens-Boulahia, T Sans
A formal approach to specifY and deploy a network security policy," In Proc …, 2004
62004
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings
N Cuppens-Boulahia, F Cuppens, S Jajodia, A Abou El Kalam, T Sans
Springer, 2014
22014
Type-Safe Web Programming in QWeS2T
T Sans, I Cervesato
Technical Report CMU-CS-10-125, Department of Computer Science, Carnegie …, 2010
22010
A formal approach to specify and deploy a network security policy
T Sans
22004
Substructural meta-theory of a type-safe language for web programming
I Cervesato, T Sans
Fundamenta Informaticae 130 (1), 67-97, 2014
12014
XML-BB: A model to handle relationships protection in XML documents
F Cuppens, N Cuppens-Boulahia, T Sans
International Conference on Knowledge-Based and Intelligent Information and …, 2007
12007
Ict Systems Security and Privacy Protection
IFIP TC11 INTERNATIONAL INFORMATION SECURITY CONFE.
SPRINGER, 2014
2014
Controlling Data Flow with a Policy-Based Programming Language for the Web
T Sans, I Cervesato, S Hussein
Nordic Conference on Secure IT Systems, 215-230, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–20