-
1Academic Journal
المؤلفون: Romain Laborde, Sravani Teja Bulusu, Ahmad Samer Wazan, Arnaud Oglaza, Abdelmalek Benzekri
المصدر: Journal of Cybersecurity and Privacy, Vol 1, Iss 3, Pp 422-452 (2021)
مصطلحات موضوعية: security requirement engineering, network security, KAOS, STS, SEPP, SABSA, Technology (General), T1-995
وصف الملف: electronic resource
-
2
المؤلفون: Ahmad Samer Wazan, Frédéric Cuppens
المصدر: Annals of Telecommunications. 78:133-134
مصطلحات موضوعية: Electrical and Electronic Engineering
-
3
المؤلفون: Ahmad Samer Wazan, David W Chadwick, Remi Venant, Eddie Billoir, Romain Laborde, Liza Ahmad, Mustafa Kaiiali
مصطلحات موضوعية: General Computer Science, Privilege escalation, Sudo/su, Access control, Linux capabilities, Law
وصف الملف: application/pdf
-
4
المؤلفون: Ahmad Samer Wazan, Abdelmalek Benzekri, Arnaud Oglaza, Romain Laborde, Sravani Teja Bulusu
المساهمون: Service IntEgration and netwoRk Administration (IRIT-SIERA), Institut de recherche en informatique de Toulouse (IRIT), Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, Sopra Steria (Colomiers, France), Sopra Steria (FRANCE), Abu Dhabi University (ADU)
المصدر: Journal of Cybersecurity and Privacy, Vol 1, Iss 22, Pp 422-452 (2021)
Journal of Cybersecurity and Privacy
Journal of Cybersecurity and Privacy, MDPI, 2021, 1 (3), pp.422-452. ⟨10.3390/jcp1030022⟩
Volume 1
Issue 3
Pages 22-452مصطلحات موضوعية: Business requirements, Requirements engineering, SEPP, Network security, business.industry, Computer science, Process (engineering), Sherwood Applied Business Security Architecture, SABSA, 020206 networking & telecommunications, 020207 software engineering, Context (language use), 02 engineering and technology, security requirement engineering, STS, Engineering management, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI], KAOS, 0202 electrical engineering, electronic engineering, information engineering, network security, T1-995, business, Technology (General)
وصف الملف: application/pdf
-
5Academic Journal
المؤلفون: Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, Francois Barrere, Abdelmalek Benzekri, Mustafa Kaiiali, Adib Habbal
المصدر: Security and Communication Networks, Vol 2017 (2017)
مصطلحات موضوعية: Technology (General), T1-995, Science (General), Q1-390
Relation: http://dx.doi.org/10.1155/2017/6907146; https://doaj.org/toc/1939-0114; https://doaj.org/toc/1939-0122; https://doaj.org/article/7fa0dec95f6a470fa84551ec6aebbd99
-
6
المساهمون: Zayed University, Service IntEgration and netwoRk Administration (IRIT-SIERA), Institut de recherche en informatique de Toulouse (IRIT), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Toulouse Mind & Brain Institut (TMBI), Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT), University of Kent [Canterbury], Le Mans Université (UM), IFIP : International Federation for Information Processing, Audun Jøsang, Lynn Futcher, Janne Hagen, TC 11, European Project: 830929,CyberSec4Europe, Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées
المصدر: SEC 2021: ICT Systems Security and Privacy Protection
36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC 2021)
36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC 2021), IFIP : International Federation for Information Processing, Jun 2021, Oslo, Norway. pp.196-209, ⟨10.1007/978-3-030-78120-0_13⟩
ICT Systems Security and Privacy Protection ISBN: 9783030781194
SEC
ICT Systems Security and Privacy Protection: 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings ; ISBN 978-3-030-78119-4
36th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2021)
36th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2021), Jun 2021, Oslo, Norway. pp.196-209, ⟨10.1007/978-3-030-78120-0_13⟩مصطلحات موضوعية: Software_OPERATINGSYSTEMS, Computer science, Control (management), Principle of least privilege, sudo/su commands, Access control, 02 engineering and technology, Computer security, computer.software_genre, Task (project management), Set (abstract data type), [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI], 020204 information systems, Privilege escalation, 0202 electrical engineering, electronic engineering, information engineering, Role-based access control, [INFO]Computer Science [cs], Linux capabilities, business.industry, Context (computing), 020207 software engineering, business, computer
-
7
المؤلفون: Kadhim Hayawi, Mohammad Amin Kuhail, Rémi Venant, Ahmad Samer Wazan
المصدر: EDUCON
مصطلحات موضوعية: Computer science, business.industry, 05 social sciences, 050301 education, Context (language use), 02 engineering and technology, Virtualization, computer.software_genre, Engineering management, Software, Installation, 020204 information systems, ComputingMilieux_COMPUTERSANDEDUCATION, 0202 electrical engineering, electronic engineering, information engineering, Online teaching, Activity-based costing, business, 0503 education, computer, Online setting
-
8
المؤلفون: Abdelmalek Benzekri, Romain Laborde, Arnaud Oglaza, François Barrère, Sravani Teja Bulusu, Afonso Ferreira, Ahmad Samer Wazan
المساهمون: Service IntEgration and netwoRk Administration (IRIT-SIERA), Institut de recherche en informatique de Toulouse (IRIT), Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, Centre National de la Recherche Scientifique (CNRS), Ferreira, Afonso
المصدر: Handbook of Internet of Things
Handbook of Internet of Things, Springer, In press
HALمصطلحات موضوعية: risk analysis, designer’s view, business view, SRE Methodology, Anti-STS, [INFO] Computer Science [cs], STS, KAOS, Layer-based approach, [INFO]Computer Science [cs], IOT Security, Security Requirement Engineering, architect’s view, ISA/IEC 62443
-
9
المؤلفون: Omar Alfandi, Abdelmalek Benzekri, Ahmad Samer Wazan, David W. Chadwick, Eddie Billoir, Rémi Venant, Romain Laborde
المساهمون: Service IntEgration and netwoRk Administration (IRIT-SIERA), Institut de recherche en informatique de Toulouse (IRIT), Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, University of Kent [Canterbury], Université Toulouse III - Paul Sabatier (UT3), Zayed University
المصدر: IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing, Institute of Electrical and Electronics Engineers, 2020, pp.1-1. ⟨10.1109/TDSC.2020.3000595⟩مصطلحات موضوعية: Protocol (science), Web server, X509 Certificate, Transport Layer Security, Database, Computer science, business.industry, OCSP Stapling, Web PKI, OCSP stapling, computer.software_genre, Certificate, Automation, X.509, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], Confidentiality, Electrical and Electronic Engineering, business, computer, Certificate Validation
-
10
المؤلفون: Fatima Alqubaisi, David W. Chadwick, Ahmad Samer Wazan, Liza Ahmad
المصدر: 2020 12th Annual Undergraduate Research Conference on Applied Computing (URC).
مصطلحات موضوعية: Password, Authentication, Computer science, business.industry, Single factor, Usability, Computer security, computer.software_genre, Set (abstract data type), ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, Server, Threat model, Identity (object-oriented programming), business, computer
-
11
المساهمون: Service IntEgration and netwoRk Administration (IRIT-SIERA), Institut de recherche en informatique de Toulouse (IRIT), Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, Université Toulouse III - Paul Sabatier (UT3), Institut National Polytechnique de Toulouse - Toulouse INP (FRANCE), Centre National de la Recherche Scientifique - CNRS (FRANCE), Université Toulouse III - Paul Sabatier - UT3 (FRANCE), Université Toulouse - Jean Jaurès - UT2J (FRANCE), Université Toulouse 1 Capitole - UT1 (FRANCE), Institut National Polytechnique de Toulouse - INPT (FRANCE)
المصدر: Annals of Telecommunications-annales des télécommunications
Annals of Telecommunications-annales des télécommunications, Springer, 2019, 74 (3-4), pp.185-196. ⟨10.1007/s12243-018-0673-0⟩مصطلحات موضوعية: [INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR], Situation awareness, Computer science, Système d'exploitation, Réseaux et télécommunications, Complex event processing, 02 engineering and technology, Security policy, Attribute-based access control, [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI], Architectures Matérielles, 0202 electrical engineering, electronic engineering, information engineering, XACMLv3, Security management, Electrical and Electronic Engineering, business.industry, Event (computing), 020206 networking & telecommunications, Modular design, Systèmes embarqués, Dynamic security management, Risk analysis (engineering), Product life-cycle management, 020201 artificial intelligence & image processing, [INFO.INFO-ES]Computer Science [cs]/Embedded Systems, [INFO.INFO-OS]Computer Science [cs]/Operating Systems [cs.OS], business, Policy-based management
وصف الملف: application/pdf
-
12
المؤلفون: Ahmad Samer Wazan, Francois Barrere, Abdelmalek Benzekri, Romain Laborde, Sravani Teja Bulusu
المساهمون: Institut National Polytechnique de Toulouse - Toulouse INP (FRANCE), Centre National de la Recherche Scientifique - CNRS (FRANCE), Université Toulouse III - Paul Sabatier - UT3 (FRANCE), Université Toulouse - Jean Jaurès - UT2J (FRANCE), Université Toulouse 1 Capitole - UT1 (FRANCE), Service IntEgration and netwoRk Administration (IRIT-SIERA), Institut de recherche en informatique de Toulouse (IRIT), Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, Université Toulouse III - Paul Sabatier (UT3), Institut National Polytechnique de Toulouse - INPT (FRANCE)
المصدر: SAC
Proceedings of SAC 2019
34th ACM/SIGAPP Symposium on Applied Computing (SAC 2019)
34th ACM/SIGAPP Symposium on Applied Computing (SAC 2019), Apr 2019, Limassol, Cyprus. pp.1610-1619
HALمصطلحات موضوعية: 021110 strategic, defence & security studies, Network security requirements, Network security, business.industry, Computer science, Process (engineering), 0211 other engineering and technologies, Answer set programming, Réseaux et télécommunications, 020206 networking & telecommunications, 02 engineering and technology, Requirements elicitation, Set (abstract data type), [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI], Mediation, 0202 electrical engineering, electronic engineering, information engineering, Cryptographie et sécurité, Enterprise private network, Verifiable secret sharing, Integrity model, business, Software engineering, Security zoning
وصف الملف: application/pdf
-
13
المؤلفون: Abdelmalek Benzekri, Ahmad Samer Wazan, Francois Barrere, Romain Laborde, Sravani Teja Bulusu
المساهمون: Institut National Polytechnique de Toulouse - Toulouse INP (FRANCE), Centre National de la Recherche Scientifique - CNRS (FRANCE), Université Toulouse III - Paul Sabatier - UT3 (FRANCE), Université Toulouse - Jean Jaurès - UT2J (FRANCE), Université Toulouse 1 Capitole - UT1 (FRANCE)
المصدر: Advances in Intelligent Systems and Computing ISBN: 9783319770277
مصطلحات موضوعية: Requirements engineering, Network security, business.industry, Computer science, Multitude, Système d'exploitation, Réseaux et télécommunications, 020207 software engineering, Context (language use), 02 engineering and technology, Security critical systems, Security requirements engineering, Systèmes embarqués, Work (electrical), Risk analysis (engineering), Architectures Matérielles, 020204 information systems, 0202 electrical engineering, electronic engineering, information engineering, Evaluation methodology, KAOS, business
وصف الملف: application/pdf
-
14
المؤلفون: Ahmad Samer Wazan, Bebo White, R.Les Cottrell, Fatima Binta Adamu, Mustafa Kaiiali, Adib Habbal, Suhaidi Hassan
المصدر: TENCON 2017 - 2017 IEEE Region 10 Conference.
مصطلحات موضوعية: Big data processing, Computer science, business.industry, 05 social sciences, Search engine indexing, Big data, 050301 education, 02 engineering and technology, computer.software_genre, Data set, Parallel processing (DSP implementation), 020204 information systems, 0202 electrical engineering, electronic engineering, information engineering, Data mining, business, 0503 education, computer
-
15
المؤلفون: Abdelmalek Benzekri, Ahmad Samer Wazan, Francois Barrere, Romain Laborde, Sravani Teja Bulusu
المساهمون: Service IntEgration and netwoRk Administration (IRIT-SIERA), Institut de recherche en informatique de Toulouse (IRIT), Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, Université Toulouse III - Paul Sabatier (UT3), Institut National Polytechnique de Toulouse - Toulouse INP (FRANCE), Centre National de la Recherche Scientifique - CNRS (FRANCE), Université Toulouse III - Paul Sabatier - UT3 (FRANCE), Université Toulouse - Jean Jaurès - UT2J (FRANCE), Université Toulouse 1 Capitole - UT1 (FRANCE)
المصدر: 2017 1st Cyber Security in Networking Conference (CSNet)
Cyber Security in Networking Conference (CSNet)
Cyber Security in Networking Conference (CSNet), Oct 2017, Rio de Janeiro, Brazil. pp.0, ⟨10.1109/CSNET.2017.8241997⟩
CSNetمصطلحات موضوعية: [INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR], Advanced persistent threat, Computer science, Système d'exploitation, Réseaux et télécommunications, 0102 computer and information sciences, 02 engineering and technology, Système multi-agents, computer.software_genre, Computer security, 01 natural sciences, [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI], Architectures Matérielles, Server, 0202 electrical engineering, electronic engineering, information engineering, Requirements analysis, Multi-agentsystems, Reusability, Attack trees, Multi-agent system, Multi-agent systems, 020207 software engineering, Systèmes embarqués, Advanced Persistent Threats, 010201 computation theory & mathematics, Software security assurance, [INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA], Malware, [INFO.INFO-ES]Computer Science [cs]/Embedded Systems, [INFO.INFO-OS]Computer Science [cs]/Operating Systems [cs.OS], computer, Natural language
وصف الملف: application/pdf
-
16
المؤلفون: Francois Barrere, Abdelmalek Benzekri, Ahmad Samer Wazan, Romain Laborde, Sravani Teja Bulusu
المساهمون: Service IntEgration and netwoRk Administration (IRIT-SIERA), Institut de recherche en informatique de Toulouse (IRIT), Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, Université Toulouse III - Paul Sabatier (UT3), Institut National Polytechnique de Toulouse - Toulouse INP (FRANCE), Centre National de la Recherche Scientifique - CNRS (FRANCE), Université Toulouse III - Paul Sabatier - UT3 (FRANCE), Université Toulouse - Jean Jaurès - UT2J (FRANCE), Université Toulouse 1 Capitole - UT1 (FRANCE), Institut National Polytechnique de Toulouse - INPT (FRANCE)
المصدر: ARES
ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security
12th International Conference on Availability, Reliability and Security (ARES 2017)
12th International Conference on Availability, Reliability and Security (ARES 2017), Aug 2017, Reggio Calabria, Italy. pp.1-6
HALمصطلحات موضوعية: [INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR], Requirements management, Requirement, Non-functional requirement, Requirements engineering, Computer science, Système d'exploitation, Réseaux et télécommunications, 020207 software engineering, 02 engineering and technology, Requirements elicitation, Security requirements engineering, Systèmes embarqués, [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI], Security engineering, Goal modeling, Risk analysis (engineering), Architectures Matérielles, 020204 information systems, Evaluation methodology, 0202 electrical engineering, electronic engineering, information engineering, [INFO.INFO-ES]Computer Science [cs]/Embedded Systems, [INFO.INFO-OS]Computer Science [cs]/Operating Systems [cs.OS], Requirements analysis
وصف الملف: application/pdf
-
17
المؤلفون: Romain Laborde, Ahmad Samer Wazan, David W. Chadwick, Francois Barrere, Abdelmalek Benzekri, Mustafa Kaiiali, Adib Habbal
المساهمون: Centre National de la Recherche Scientifique - CNRS (FRANCE), Institut National Polytechnique de Toulouse - Toulouse INP (FRANCE), University of Kent (UNITED KINGDOM), Université Toulouse III - Paul Sabatier - UT3 (FRANCE), Université Toulouse - Jean Jaurès - UT2J (FRANCE), Université Toulouse 1 Capitole - UT1 (FRANCE), Universiti Utara Malaysia - UUM (MALAYSIA), Institut National Polytechnique de Toulouse - INPT (FRANCE), Service IntEgration and netwoRk Administration (IRIT-SIERA), Institut de recherche en informatique de Toulouse (IRIT), Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, University of Kent [Canterbury], Université Toulouse III - Paul Sabatier (UT3), Queen's University [Belfast] (QUB), Universiti Utara Malaysia (UUM)
المصدر: Security and Communication Networks, Vol 2017 (2017)
Security and Communication Networks
Security and Communication Networks, 2017, Vol. 2017 (ID 6907146), pp. 1-23. ⟨10.1155/2017/6907146⟩
Wazan, A S, Laborde, R, Chadwick, D W, Barrere, F, Benzekri, A, Kaiiali, M & Habbal, A 2017, ' Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker ', Wiley Security and Communication Networks Journal . https://doi.org/10.1155/2017/6907146مصطلحات موضوعية: [INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR], QA75, Article Subject, Computer Networks and Communications, Computer science, Internet privacy, Système d'exploitation, Trust Broker, Réseaux et télécommunications, 02 engineering and technology, Computer security, computer.software_genre, [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI], Web of trust, Architectures Matérielles, Certificate authority, lcsh:Technology (General), 0202 electrical engineering, electronic engineering, information engineering, Trust management (information system), lcsh:Science (General), QA76.76, business.industry, 020206 networking & telecommunications, Trusted third party, Chain of trust, Systèmes embarqués, Certification Practice Statement, Trust anchor, lcsh:T1-995, 020201 artificial intelligence & image processing, [INFO.INFO-ES]Computer Science [cs]/Embedded Systems, Computational trust, [INFO.INFO-OS]Computer Science [cs]/Operating Systems [cs.OS], business, computer, Information Systems, lcsh:Q1-390
وصف الملف: application/pdf; text/xhtml
-
18
المؤلفون: Abdelmalek Benzekri, Ahmad Samer Wazan, Romain Laborde, Sravani Teja Bulusu, Francois Barrere
المساهمون: Institut National Polytechnique de Toulouse - Toulouse INP (FRANCE), Centre National de la Recherche Scientifique - CNRS (FRANCE), Université Toulouse III - Paul Sabatier - UT3 (FRANCE), Université Toulouse - Jean Jaurès - UT2J (FRANCE), Université Toulouse 1 Capitole - UT1 (FRANCE), Service IntEgration and netwoRk Administration (IRIT-SIERA), Institut de recherche en informatique de Toulouse (IRIT), Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, Université Toulouse III - Paul Sabatier (UT3), Institut National Polytechnique de Toulouse - INPT (FRANCE)
المصدر: Lecture Notes in Computer Science ISBN: 9783319548753
CRiSIS
CRiSIS 2016: Risks and Security of Internet and Systems
International Conference on Risks and Security of Internet and Systems (CRISIS 2016)
International Conference on Risks and Security of Internet and Systems (CRISIS 2016), Sep 2016, Roscoff, France. pp. 60-74
HALمصطلحات موضوعية: [INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR], Computer science, media_common.quotation_subject, Système d'exploitation, Réseaux et télécommunications, 02 engineering and technology, Security requirements engineering, Computer security, computer.software_genre, Task (project management), [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI], Architectures Matérielles, Order (exchange), 020204 information systems, 0202 electrical engineering, electronic engineering, information engineering, Quality (business), Quality characteristics, Weaving, Requirements analysis, Quality characteristics of security requirements, media_common, Requirement errors, Requirements engineering, Requirement analysis, 020207 software engineering, Systèmes embarqués, Work (electrical), Risk analysis (engineering), [INFO.INFO-ES]Computer Science [cs]/Embedded Systems, [INFO.INFO-OS]Computer Science [cs]/Operating Systems [cs.OS], computer
وصف الملف: application/pdf
-
19
المؤلفون: Abdelmalek Benzekri, Ahmad Samer Wazan, Francois Barrere, Romain Laborde, David W. Chadwick
المساهمون: Centre National de la Recherche Scientifique - CNRS (FRANCE), Institut National Polytechnique de Toulouse - INPT (FRANCE), University of Kent (UNITED KINGDOM), Université Toulouse III - Paul Sabatier - UT3 (FRANCE), Université Toulouse - Jean Jaurès - UT2J (FRANCE), Université Toulouse 1 Capitole - UT1 (FRANCE), Service IntEgration and netwoRk Administration (IRIT-SIERA), Institut de recherche en informatique de Toulouse (IRIT), Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, University of Kent [Canterbury], Université Toulouse III - Paul Sabatier (UT3), Institut National Polytechnique de Toulouse - Toulouse INP (FRANCE)
المصدر: HAL
Proceedings of COMPSAC 2017
41st IEEE Annual Computer Software and Applications Conference (COMPSAC 2017)
41st IEEE Annual Computer Software and Applications Conference (COMPSAC 2017), Jul 2017, Turin, Italy. pp. 665-674
COMPSAC (1)مصطلحات موضوعية: Web standards, [INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR], Engineering, Web development, Internet privacy, 0211 other engineering and technologies, Navigation bar, Système d'exploitation, Réseaux et télécommunications, 02 engineering and technology, Web API, World Wide Web, [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI], Architectures Matérielles, Web design, Web page, 0202 electrical engineering, electronic engineering, information engineering, Data Web, 021110 strategic, defence & security studies, business.industry, 020206 networking & telecommunications, Certificate validation, Systèmes embarqués, Web Accessibility Initiative, [INFO.INFO-ES]Computer Science [cs]/Embedded Systems, [INFO.INFO-OS]Computer Science [cs]/Operating Systems [cs.OS], X.509 certificate, business, Web browsers
وصف الملف: application/pdf
-
20
المؤلفون: Ibrahim Yonis Omar, Ahmad Samer Wazan, Francois Barrere, Romain Laborde, Abdelmalek Benzekri
المساهمون: Institut National Polytechnique de Toulouse - Toulouse INP (FRANCE), Centre National de la Recherche Scientifique - CNRS (FRANCE), Université Toulouse III - Paul Sabatier - UT3 (FRANCE), Université Toulouse - Jean Jaurès - UT2J (FRANCE), Université Toulouse 1 Capitole - UT1 (FRANCE), Institut National Polytechnique de Toulouse - INPT (FRANCE)
المصدر: ISNCC
مصطلحات موضوعية: Computer science, business.industry, Système d'exploitation, XACML, Réseaux et télécommunications, Context (language use), Access control, Cloud computing, Transparency (human–computer interaction), Computer security, computer.software_genre, Systèmes embarqués, G-Cloud, Architectures Matérielles, E-services security, Component (UML), Key (cryptography), E-Government, business, computer, computer.programming_language, Openstack
وصف الملف: application/pdf