SAP, Eurecom
Verified email at
Cited by
Cited by
Reputation management using evolving reputation scores
S Trabelsi, M Bezzi, G Montagnon
US Patent App. 13/471,078, 2013
Primelife policy language
CA Ardagna, L Bussard, S De Capitani di Vimercati, G Neven, E Pedrini, ...
W3C Workshop on Access Control Application Scenarios, 2009
Privacy and identity management for life
J Camenisch, S Fischer-Hübner, K Rannenberg
Springer Science & Business Media, 2011
PPL engine: A symmetric architecture for privacy policy handling
S Trabelsi, A Njeh, L Bussard, G Neven
W3C Workshop on Privacy and data usage control 4 (5), 2010
Secure Web service discovery: overcoming challenges of ubiquitous computing
S Trabelsi, JC Pazzaglia, Y Roudier
2006 European Conference on Web Services (ECOWS'06), 35-43, 2006
Secure Web service discovery: overcoming challenges of ubiquitous computing
S Trabelsi, JC Pazzaglia, Y Roudier
2006 European Conference on Web Services (ECOWS'06), 35-43, 2006
Sticky policies for data control in the cloud
S Trabelsi, J Sendor
2012 Tenth Annual International Conference on Privacy, Security and Trust, 75-80, 2012
Ppl: Primelife privacy policy engine
S Trabelsi, J Sendor, S Reinicke
2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011
Enabling secure discovery in a pervasive environment
S Trabelsi, JC Pazzaglia, Y Roudier
International Conference on Security in Pervasive Computing, 18-31, 2006
A flexible architecture for privacy-aware trust management
K Böhm, S Etalle, J Den Hartog, C Hütter, S Trabelsi, D Trivellato, ...
Journal of theoretical and applied electronic commerce research 5 (2), 77-96, 2010
Data disclosure risk evaluation
S Trabelsi, V Salzgeber, M Bezzi, G Montagnon
2009 Fourth International Conference on Risks and Security of Internet and …, 2009
Expandable tubular having improved polished bore receptacle protection
PG Maguire, RJ Coon, JE Lauritzen, K Tran, NAA Simpson, AC Mackay
US Patent 6,688,395, 2004
Deriving business processes with service level agreements from early requirements
G Frankova, M Séguran, F Gilcher, S Trabelsi, J Dörflinger, M Aiello
Journal of Systems and Software 84 (8), 1351-1363, 2011
Context-aware security policy for the service discovery
S Trabelsi, L Gomez, Y Roudier
21st International Conference on Advanced Information Networking and …, 2007
Sticky policies for mobile devices
F Di Cerbo, S Trabelsi, T Steingruber, G Dodero, M Bezzi
Proceedings of the 18th ACM symposium on Access control models and …, 2013
Mining social networks for software vulnerabilities monitoring
S Trabelsi, H Plate, A Abida, MMB Aoun, A Zouaoui, C Missaoui, S Gharbi, ...
2015 7th International Conference on New Technologies, Mobility and Security …, 2015
Password protection using personal information
L Gomez, S Trabelsi, A Mouelhi
US Patent 8,539,599, 2013
Revocation of credentials in secret handshake protocols
A Sorniotti, M Bezzi, G Montagnon, S Short, S Trabelsi
US Patent 8,533,464, 2013
Fi-ware security: Future internet security core
AG Vázquez, P Soria-Rodriguez, P Bisson, D Gidoin, S Trabelsi, G Serme
European Conference on a Service-Based Internet, 144-152, 2011
PPL v2.0: Uniform Data Access and Usage Control on Cloud and Mobile
F Di Cerbo, DF Some, L Gomez, S Trabelsi
TELERISE: 1st International Workshop on TEchnical and LEgal aspects of data …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20