Yehia ElRakaiby
Citado por
Citado por
Formal enforcement and management of obligation policies
Y Elrakaiby, F Cuppens, N Cuppens-Boulahia
Data & Knowledge Engineering 71 (1), 127-147, 2012
Semantic context aware security policy deployment
S Preda, F Cuppens, N Cuppens-Boulahia, JG Alfaro, L Toutain, ...
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
Formalization and management of group obligations
Y El Rakaiby, F Cuppens, N Cuppens-Boulahia
2009 IEEE International Symposium on Policies for Distributed Systems and …, 2009
Testing obligation policy enforcement using mutation analysis
Y Elrakaiby, T Mouelhi, Y Le Traon
2012 IEEE Fifth International Conference on Software Testing, Verification …, 2012
Using argumentation to explain ambiguity in requirements elicitation interviews
Y Elrakaiby, A Ferrari, P Spoletini, S Gnesi, B Nuseibeh
2017 IEEE 25th International Requirements Engineering Conference (RE), 51-60, 2017
From contextual permission to dynamic pre-obligation: An integrated approach
Y Elrakaiby, F Cuppens, N Cuppens-Boulahia
2010 International Conference on Availability, Reliability and Security, 70-78, 2010
Normative reasoning and consequence
J Broersen, S Cranefield, Y Elrakaiby, D Gabbay, D Grossi, E Lorini, ...
Dagstuhl Follow-Ups 4, 2013
Security@Runtime: A Flexible MDE Approach to Enforce Fine-grained Security Policies
Y Elrakaiby, M Amrani, Y Le Traon
International Symposium on Engineering Secure Software and Systems, 19-34, 2014
Formal specification and management of security policies with collective group obligations
F Cuppens, N Cuppens-Boulahia, Y Elrakaiby
Journal of computer security 21 (1), 149-190, 2013
Care: A refinement calculus for requirements engineering based on argumentation semantics
Y Elrakaiby, A Ferrari, J Mylopoulos
2018 IEEE 26th International Requirements Engineering Conference (RE), 364-369, 2018
From state-based to event-based contextual security policies
Y El Rakaiby, F Cuppens, N Cuppens-Boulahia
2009 Fourth International Conference on Digital Information Management, 1-7, 2009
Automatic derivation of context descriptions
C Jung, D Feth, Y Elrakaiby
2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods …, 2015
Access control enforcement testing
D El Kateb, Y El Rakaiby, T Mouelhi, Y Le Traon
2013 8th International Workshop on Automation of Software Test (AST), 64-70, 2013
Interactivity for reactive access control
Y ElRakaiby, F Cuppens, N Cuppens-Boulahia
Sar Ssi 257, 2008
Dynamic analysis of usage control policies
Y Elrakaiby, J Pang
2014 11th International Conference on Security and Cryptography (SECRYPT), 1-13, 2014
Towards a Full Support of Obligations In XACML
D El Kateb, Y ElRakaiby, T Mouelhi, I Rubab, Y Le Traon
International Conference on Risks and Security of Internet and Systems, 213-221, 2014
Reasoning on robot knowledge from discrete and asynchronous observations
P Ziafati, Y Elrakaiby, M van Zee, M Dastani, JJ Meyer, L van der Torre, ...
2014 AAAI Spring Symposium Series, 2014
From state-based to event-based security policies
Y El Rakaiby, F Cuppens, N Cuppens-Boulahia
3rd International Workshop on Context Modeling and Management for Smart …, 2009
Optimal by Design: Model-Driven Synthesis of Adaptation Strategies for Autonomous Systems
Y Elrakaiby, P Spoletini, B Nuseibeh
arXiv preprint arXiv:2001.08525, 2020
A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications
Y Elrakaiby, Y Le Traon
2013 International Conference on Availability, Reliability and Security, 367-374, 2013
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20