On the Validation of Web X.509 Certificates by TLS Interception Products | 0 | 0.34 | 2022 |
Know Your Customer: Opening A New Bank Account Online Using Uaaf | 0 | 0.34 | 2020 |
A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework | 0 | 0.34 | 2020 |
Foundations and Practice of Security - 12th International Symposium, FPS 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers | 0 | 0.34 | 2020 |
Detecting abnormal DNS traffic using unsupervised machine learning | 0 | 0.34 | 2020 |
Improved Identity Management with Verifiable Credentials and FIDO | 1 | 0.40 | 2019 |
A situation-driven framework for dynamic security management | 2 | 0.46 | 2019 |
Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situations | 0 | 0.34 | 2019 |
Logic-based methodology to help security architects in eliciting high-level network security requirements. | 0 | 0.34 | 2019 |
Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies. | 0 | 0.34 | 2018 |
A new approach for managing Android permissions: learning users' preferences. | 0 | 0.34 | 2017 |
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker. | 2 | 0.43 | 2017 |
Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach | 1 | 0.43 | 2017 |
Tls Connection Validation By Web Browsers: Why Do Web Browsers Still Not Agree? | 0 | 0.34 | 2017 |
Demonstration of KAPUER: A privacy policy manager on Android | 1 | 0.48 | 2016 |
Towards the Weaving of the Characteristics of Good Security Requirements. | 0 | 0.34 | 2016 |
A Recommender-Based System for Assisting Non-technical Users in Managing Android Permissions. | 0 | 0.34 | 2016 |
Le projet ANR INCOME, processus et outils logiciels pour des gestionnaires de contexte au dessus de l'Internet des objets. | 0 | 0.34 | 2016 |
Difficulties to enforce your privacy preferences on Android? Kapuer will help you | 0 | 0.34 | 2016 |
How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches | 0 | 0.34 | 2016 |
G-Cloud on Openstack: Adressing access control and regulation requirements | 3 | 0.42 | 2015 |
KAPUER : un assistant à l'écriture de politiques d'autorisation pour la protection de la vie privée. | 0 | 0.34 | 2014 |
Kapuer: A Decision Support System for Protecting Privacy. | 0 | 0.34 | 2014 |
A data flow-oriented specification method for analysing network security configurations | 0 | 0.34 | 2014 |
An Adaptive XACMLv3 Policy Enforcement Point | 2 | 0.40 | 2014 |
A survey on addressing privacy together with quality of context for context management in the Internet of Things. | 5 | 0.49 | 2014 |
Specification and Enforcement of Dynamic Authorization Policies Oriented by Situations | 5 | 0.55 | 2014 |
A specification method for analyzing fine grained network security mechanism configurations. | 0 | 0.34 | 2013 |
Toward authorization as a service: a study of the XACML standard | 3 | 0.44 | 2013 |
Authorization Policies: Using Decision Support System for Context-Aware Protection of User's Private Data | 6 | 0.71 | 2013 |
PKI Interoperability: Still an Issue? A Solution in the X.509 Realm. | 0 | 0.34 | 2013 |
INCOME - Multi-scale Context Management for the Internet of Things. | 12 | 0.77 | 2012 |
A formal model of trust for calculating the quality of X.509 certificate. | 8 | 0.76 | 2011 |
A Generic Data Flow Security Model. | 0 | 0.34 | 2011 |
Toward Self-Contained Authorization Policies | 1 | 0.36 | 2010 |
A secure collaborative web-based environment for virtual organisations | 3 | 0.58 | 2009 |
Which Web Browsers Process SSL Certificates in a Standardized Way? | 4 | 0.63 | 2009 |
An Extensible XACML Authorization Web Service: Application to Dynamic Web Sites Access Control | 2 | 0.41 | 2009 |
An organizational pattern for contributing to the deployment of secure Virtual Enterprises | 0 | 0.34 | 2009 |
Validating X.509 Certificates Based on their Quality | 1 | 0.38 | 2008 |
Coordinating access control in grid services | 11 | 1.20 | 2008 |
A best practices-oriented approach for establishing trust chains within Virtual Organisations | 3 | 0.48 | 2008 |
A trust-based virtual collaborative environment | 2 | 0.37 | 2008 |
PERMIS: a modular authorization infrastructure | 20 | 1.41 | 2008 |
Authentication in Virtual Organizations: A Reputation Based PKI Interconnection Model | 0 | 0.34 | 2008 |
The X.509 certificate quality | 0 | 0.34 | 2008 |
PEP = Point to Enhance Particularly | 4 | 0.53 | 2008 |
An Extension of XACML to Improve the Performance of Decision Making Processes When Dealing with Stable Conditions | 1 | 0.38 | 2008 |
Implementation of a Formal Security Policy Refinement Process in WBEM Architecture | 5 | 0.48 | 2007 |
Dealing with Stable Environmental Conditions in XACML Systems | 1 | 0.37 | 2007 |