Follow
Jocelyn Aubert
Jocelyn Aubert
Verified email at list.lu
Title
Cited by
Cited by
Year
An integrated conceptual model for information system security risk management supported by enterprise architecture management
N Mayer, J Aubert, E Grandry, C Feltus, E Goettelmann, R Wieringa
Software & Systems Modeling 18, 2285-2312, 2019
1022019
Towards cloud computing SLA risk management: issues and challenges
JH Morin, J Aubert, B Gateau
2012 45th Hawaii International Conference on System Sciences, 5509-5514, 2012
932012
Improving resilience of interdependent critical infrastructures via an on-line alerting system
P Capodieci, S Diblasi, E Ciancamerla, M Minichino, C Foglietta, ...
2010 Complexity in Engineering, 88-90, 2010
432010
Design and implementation of a mediation system enabling secure communication among Critical Infrastructures
M Castrucci, A Neri, F Caldeira, J Aubert, D Khadraoui, M Aubigny, ...
International Journal of Critical Infrastructure Protection 5 (2), 86-97, 2012
302012
Risk-based methodology for real-time security monitoring of interdependent services in critical infrastructures
J Aubert, T Schaberreiter, C Incoul, D Khadraoui, B Gateau
2010 International Conference on Availability, Reliability and Security, 262-267, 2010
232010
Sector-based improvement of the information security risk management process in the context of telecommunications regulation
N Mayer, J Aubert, H Cholez, E Grandry
European Conference on Software Process Improvement, 13-24, 2013
182013
An agent-based framework for identity management: The unsuspected relation with ISO/IEC 15504
B Gateau, C Feltus, J Aubert, C Incoul
2008 Second International Conference on Research Challenges in Information …, 2008
182008
A security decision-reaction architecture for heterogeneous distributed network
C Feltus, D Khadraoui, J Aubert
2010 International Conference on Availability, Reliability and Security, 1-8, 2010
142010
Trust based interdependency weighting for on-line risk monitoring in interdependent critical infrastructures
F Caldeira, T Schaberreiter, S Varrette, E Monteiro, P Simões, P Bouvry, ...
International Journal of Secure Software Engineering (IJSSE) 4 (4), 47-69, 2013
132013
An integrated conceptual model for information system security risk management and enterprise architecture management based on togaf
N Mayer, J Aubert, E Grandry, C Feltus
The Practice of Enterprise Modeling: 9th IFIP WG 8.1. Working Conference …, 2016
122016
Real-time security monitoring of interdependent services in critical infrastructures. case study of a risk-based approach
J Aubert, T Schaberreiter, C Incoul, D Khadraoui
21th European Safety and Reliability Conference, ESREL, 2010
122010
Critical infrastructure security modelling and resci-monitor: A risk based critical infrastructure model
T Schaberreiter, J Aubert, D Khadraoui
2011 IST-Africa Conference Proceedings, 1-8, 2011
112011
Programming electronic institutions with utopia
P Schmitt, C Bonhomme, J Aubert, B Gâteau
Information Systems Evolution: CAiSE Forum 2010, Hammamet, Tunisia, June 7-9 …, 2011
102011
Support tool development for real-time risk prediction in interdependent critical infrastructures
T Schaberreiter, C Bonhomme, J Aubert, C Incoul, D Khadraoui
IEEE Int’l Symposium on Sofware Reliability Engineering, 2009
102009
Service Level Agreements as a Service-Towards Security Risks Aware SLA Management.
K Stamou, JH Morin, B Gateau, J Aubert
CLOSER, 663-669, 2012
92012
A risk management framework for security and integrity of networks and services
N Mayer, J Aubert
Journal of Risk Research 24 (8), 987-998, 2021
82021
Coalition-OrBAC: an agent-based access control model for dynamic coalitions
I Ben Abdelkrim, A Baina, C Feltus, J Aubert, M Bellafkih, D Khadraoui
Trends and Advances in Information Systems and Technologies: Volume 1 6 …, 2018
72018
Smart-X: an adaptive multi-agent platform for smart-topics
J Aubert, C Feltus, A Kostakis, D Khadraoui
Procedia Computer Science 109, 943-948, 2017
62017
Assurance and trust indicators to evaluate accuracy of on-line risk in critical infrastructures
T Schaberreiter, F Caldeira, J Aubert, E Monteiro, D Khadraoui, P Simões
Critical Information Infrastructure Security: 6th International Workshop …, 2013
62013
Methodology to Align Business and IT Policies: Use Case from an IT Company
C Feltus, C Incoul, J Aubert, B Gateau, A Adelsbach, M Camy
2009 International Conference on Availability, Reliability and Security, 762-767, 2009
62009
The system can't perform the operation now. Try again later.
Articles 1–20