, ACF
, ACF
, ACF
, ACF
, ACF
, ACF
, ACF
, ACF
Security engineering: a guide to building dependable distributed systems, 2010. ,
In Module 4 : La gestion de la cybersécurité au sein d'une organisation, 2017. ,
Integrity considerations for secure computer systems, 1977. ,
DALculus-theory and tool for development assurance level allocation, International Conference on Computer Safety, Reliability, and Security, pp.43-56, 2011. ,
Towards the weaving of the characteristics of good security requirements, International Conference on Risks and Security of Internet and Systems, pp.60-74, 2016. ,
Which security requirements engineering methodology should i choose?: Towards a requirements engineering-based evaluation approach, Proceedings of the 12th International Conference on Availability, Reliability and Security, p.29, 2017. ,
A Requirements Engineering-Based Approach for Evaluating Security Requirements Engineering Methodologies, Information Technology -New Generations (Advances in Intelligent Systems and Computing), pp.517-525, 2018. ,
Applying a Requirement Engineering Based Approach to Evaluate the Security Requirements Engineering Methodologies, Proceedings of the 33rd Annual ACM Symposium on Applied Computing (SAC '18), pp.1316-1318, 2018. ,
A comparison of commercial and military computer security policies, Security and Privacy, pp.184-184, 1987. ,
Baseline Security Requirements for Network Security Zones in the Government of Canada, 2007. ,
Security requirements engineering: designing secure socio-technical systems, 2016. ,
A Formal Data Flow-Oriented Model For Distributed Network Security Conflicts Detection, The Eighth International Conference on Networking and Services, pp.20-27, 2012. ,
Specification for Data Assurance Levels. EUROPEAN ORGANISATION FOR THE SAFETY OF AIR NAVIGATION, 2018. ,
Answer set solving in practice, Synthesis Lectures on Artificial Intelligence and Machine Learning, vol.6, pp.1-238, 2012. ,
, Clingo= ASP+ control: Preliminary report, 2014.
Blueprint for Cyber Security Zone Modeling, INFORMATION TECHNOLOGY IN INDUSTRY, vol.3, pp.38-45, 2015. ,
P2CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language, IEEE Transactions on Dependable and Secure Computing, vol.12, pp.626-639, 2015. ,
User Requirements Notation (URN) -Language definition, 2012. ,
Toward authorization as a service: a study of the XACML standard, Proceedings of the 16th Communications & Networking Symposium, p.9, 2013. ,
Implementation of a Formal Security Policy Refinement Process in WBEM Architecture, Journal of Network and Systems Management, vol.15, pp.241-266, 2007. ,
Enterprise IT security architecture security zones: Network security zone standards, 2012. ,
What is the Windows Integrity Mechanism?, 2018. ,
Further refinements to the foundations of cyber zone defense, Military Communications Conference (MILCOM), MILCOM 2017-2017 IEEE, pp.823-828, 2017. ,
True Planning guidance for estimating the cost impacts of ARP-4754, DO-254 and DO-178b/c certification, 2015. ,
Towards Automated Identification of Security Zone Classification in Enterprise Networks, Hot-ICE, 2011. ,
The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, pp.1278-1308, 1975. ,
Logical Security Zone Pattern ,
Framework for improving critical infrastructure cybersecurity, 2014. ,
Toward Automated Information-Flow Integrity Verification for Security-Critical Applications, NDSS, 2006. ,