Patrice Clemente

According to our database1, Patrice Clemente authored at least 13 papers between 2005 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Cloud Resources Placement based on Functional and Non-functional Requirements.
Proceedings of the SECRYPT 2015, 2015

2014
An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system.
Future Gener. Comput. Syst., 2014

2013
Access Control and Security Properties Requirements Specification for Clouds' SecLAs.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots.
Proceedings of the SECRYPT 2012, 2012

SPTrack: Visual Analysis of Information Flows within SELinux Policies and Attack Logs.
Proceedings of the Active Media Technology - 8th International Conference, 2012

2011
SYNEMA: Visual Monitoring of Network and System Security Sensors.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

2010
From a Generic Framework for Expressing Integrity Properties to a Dynamic mac Enforcement for Operating Systems.
Trans. Comput. Sci., 2010

An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OS.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

2009
Classification of Malicious Distributed SELinux Activities.
J. Comput., 2009

Trust and privacy in attribute based access control for collaboration environments.
Proceedings of the iiWAS'2009, 2009

Toward a real MLS/SELinux system for end users: An empirical study.
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009

2006
A Collaborative Approach for Access Control, Intrusion Detection and Security Testing.
Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, 2006

2005
Taking into Account Usersa^EUR^(TM) (Dis-)Abilities within a Formal Theory of Rational Interaction.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2005


  Loading...