His primary scientific interests are in Computer security, Security policy, Access control, Computer security model and Intrusion detection system. His research in Computer security intersects with topics in Dependency and Service. His Security policy study incorporates themes from Programming language, State, Deontic logic and The Internet.
His work on Role-based access control is typically connected to Delegation as part of general Access control study, connecting several disciplines of science. In his research, Dependency theory, Modal operator, Confidentiality and Theoretical computer science is intimately related to Permission, which falls under the overarching field of Computer security model. His Intrusion detection system research also works with subjects such as
His main research concerns Computer security, Access control, Security policy, Computer security model and Intrusion detection system. The various areas that Frédéric Cuppens examines in his Computer security study include Security information and event management and Cloud computing security. His Access control study integrates concerns from other disciplines, such as Distributed computing, Workflow and Interoperability.
His work carried out in the field of Security policy brings together such families of science as Control, Deontic logic, Software deployment and Permission. His work deals with themes such as Information security, Information security standards and Security engineering, which intersect with Computer security model. His Security service research is multidisciplinary, relying on both Security through obscurity and Security testing.
Frédéric Cuppens spends much of his time researching Computer security, Access control, Computer network, Security policy and Cloud computing security. His Computer security research is multidisciplinary, incorporating elements of Android and Situation calculus. The Role-based access control research he does as part of his general Access control study is frequently linked to other disciplines of science, such as RDF query language and SPARQL, therefore creating a link between diverse domains of science.
His Security policy research includes elements of Data security, Network service, Argumentative, Intrusion response and Provisioning. In Cloud computing security, Frédéric Cuppens works on issues like Security service, which are connected to Security through obscurity and Security information and event management. His Computer security model research integrates issues from Information security standards and Security convergence.
The scientist’s investigation covers issues in Computer security, Access control, Computer network, Security policy and Encryption. His Computer security model and Stateful firewall study in the realm of Computer security connects with subjects such as SCADA. His biological study spans a wide range of topics, including Security service, Network security policy, Cloud computing security, Argumentative and Intrusion response.
He has included themes like Rewriting, Instrumentation and Privacy software in his Access control study. The various areas that Frédéric Cuppens examines in his Computer network study include The Internet and Upgrade. His Security policy research includes elements of Data security and File format.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Alert correlation in a cooperative intrusion detection framework
F. Cuppens;A. Miege.
ieee symposium on security and privacy (2002)
Organization based access control
A.A.E. Kalam;R.E. Baida;P. Balbiani;S. Benferhat.
ieee international workshop on policies for distributed systems and networks (2003)
LAMBDA: A Language to Model a Database for Detection of Attacks
Frédéric Cuppens;Rodolphe Ortalo.
recent advances in intrusion detection (2000)
Managing alerts in a multi-intrusion detection environment
F. Cuppens.
annual computer security applications conference (2001)
Modelling contexts in the Or-BAC model
F. Cuppens;A. Miege.
annual computer security applications conference (2003)
Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting
G. Coatrieux;Wei Pan;N. Cuppens-Boulahia;F. Cuppens.
IEEE Transactions on Information Forensics and Security (2013)
Fusion: General concepts and characteristics
Isabelle Bloch;Anthony A. Hunter;Alain A. Appriou;Andr A. Ayoun.
International Journal of Intelligent Systems (2001)
Analyzing consistency of security policies
L. Cholvy;F. Cuppens.
ieee symposium on security and privacy (1997)
Cooperative Answering: A Methodology to Provide Intelligent Access to databases.
Frédéric Cuppens;Robert Demolombe.
Expert Database Conf. (1988)
Modeling contextual security policies
Frédéric Cuppens;Nora Cuppens-Boulahia.
International Journal of Information Security (2008)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Télécom SudParis
Artois University
George Mason University
Concordia University
Colorado State University
Örebro University
University of Granada
Université Catholique de Louvain
Paul Sabatier University
Télécom ParisTech
City College of New York
Air Force Institute of Technology
Northwestern University
Université Catholique de Louvain
University of California, San Diego
Tulane University
University of Hannover
Cancer Research UK London Research Institute
The Francis Crick Institute
MIT
University of Granada
Vrije Universiteit Amsterdam
Leibniz Association
Chinese Academy of Sciences
Harvard University
Beth Israel Deaconess Medical Center