Follow
Patrice CLEMENTE
Patrice CLEMENTE
Associate Professor
Verified email at insa-cvl.fr
Title
Cited by
Cited by
Year
An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system
WW Smari, P Clemente, JF Lalande
Future Generation Computer Systems 31, 147-168, 2014
1132014
Trust and privacy in attribute based access control for collaboration environments
WW Smari, J Zhu, P Clemente
Proceedings of the 11th international conference on information integration …, 2009
242009
Sptrack: Visual analysis of information flows within selinux policies and attack logs
P Clemente, B Kaba, J Rouzaud-Cornabas, M Alexandre, G Aujay
Active Media Technology: 8th International Conference, AMT 2012, Macau …, 2012
202012
A collaborative approach for access control, intrusion detection and security testing
M Blanc, J Briffaut, P Clemente, MG El Rab, C Toinard
International Symposium on Collaborative Technologies and Systems (CTS'06 …, 2006
202006
Access control and security properties requirements specification for clouds' seclas
A Guesmi, P Clemente
2013 IEEE 5th International Conference on Cloud Computing Technology and …, 2013
122013
From a Generic Framework for Expressing Integrity Properties to a Dynamic mac Enforcement for Operating Systems
P Clemente, J Rouzaud-Cornabas, C Toinard
Transactions on Computational Science XI: Special Issue on Security in …, 2010
112010
Hardening large-scale networks security through a meta-policy framework
M Blanc, P Clemente, P Courtieu, S Franche, L Oudot, C Toinard, ...
Wysocki, BJ et Wysocki, TA, éditeurs: Third Workshop on the Internet …, 2004
112004
An information flow approach for preventing race conditions: Dynamic protection of the Linux OS
J Rouzaud-Cornabas, P Clemente, C Toinard
2010 Fourth International Conference on Emerging Security Information …, 2010
82010
Cloud resources placement based on functional and non-functional requirements
A Guesmi, P Clemente, F Loulergue, P Berthomé
2015 12th International Joint Conference on e-Business and …, 2015
72015
HoneyCloud: elastic honeypots-On-attack provisioning of high-interaction honeypots
P Clemente, JF Lalande, J Rouzaud-Cornabas
International Conference on Security and Cryptography 2, 434-439, 2012
62012
Classification of Malicious Distributed SELinux Activities.
M Blanc, P Clemente, J Rouzaud-Cornabas, C Toinard
J. Comput. 4 (5), 423-432, 2009
62009
SYNEMA: Visual monitoring of network and system security sensors
A Bousquet, P Clemente, JF Lalande
Proceedings of the International Conference on Security and Cryptography …, 2011
52011
A multi-agent and multi-level architecture to secure distributed systems
M Blanc, J Briffaut, P Clemente, MG El Rab, C Toinard
First International Workshop on Privacy and Security in Agent-based …, 2006
52006
Vers la formalisation des capacités multimodales d’un agent rationnel dialoguant
P Clémente
Université de Franche-Comté, Besançon, 2004
42004
From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers’ Profiles
J Briffaut, P Clemente, JF Lalande, J Rouzaud-Cornabas
Université d’Orléans, 2011
32011
Honeypot forensics for system and network SIEM design
J Briffaut, P Clemente, JF Lalande, J Rouzaud-Cornabas
Advances in Security Information Management: Perceptions and Outcomes, 2012
22012
Security and Virtualization: a Survey
P Clemente, J Rouzaud-Cornabas
22011
Toward a real MLS/SELinux system for end users: An empirical study
M Blanc, P Clemente, SW Kissi
2009 International Symposium on Collaborative Technologies and Systems, 209-216, 2009
22009
Correlation of system events: High performance classification of selinux activities and scenarios
J Rouzaud-Cornabas, P Clemente, C Toinard
Workshop on Security and High Performance Computing Systems, 171-177, 2008
22008
Amélioration de la sécurité des grands réseaux par une infrastructure de méta-politique
M Blanc, P Clemente, P Courtieu, S Franche, L Oudot, C Toinard, ...
11ème Colloque Francophone sur l'Ingénierie des Protocoles (CFIP'2005), 517-530, 2005
22005
The system can't perform the operation now. Try again later.
Articles 1–20