Interactive mapping specification with exemplar tuples A Bonifati, U Comignani, E Coquery, R Thion ACM Transactions on Database Systems (TODS) 44 (3), 1-44, 2019 | 48 | 2019 |
Query-based linked data anonymization R Delanaux, A Bonifati, MC Rousset, R Thion The Semantic Web–ISWC 2018: 17th International Semantic Web Conference …, 2018 | 35 | 2018 |
Access control models R Thion Cyber warfare and cyber terrorism, 318-326, 2007 | 20 | 2007 |
FLAVOR: A formal language for a posteriori verification of legal rules R Thion, D Le Métayer 2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011 | 19 | 2011 |
RDF graph anonymization robust to data linkage R Delanaux, A Bonifati, MC Rousset, R Thion Web Information Systems Engineering–WISE 2019: 20th International Conference …, 2019 | 16 | 2019 |
Inference leakage detection for authorization policies over RDF data T Sayah, E Coquery, R Thion, MS Hacid Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015 | 11 | 2015 |
A relational database integrity framework for access control policies R Thion, S Coulondre Journal of Intelligent Information Systems 38, 131-159, 2012 | 11 | 2012 |
Representation and reasoning on role-based access control policies with conceptual graphs R Thion, S Coulondre International Conference on Conceptual Structures, 427-440, 2006 | 10 | 2006 |
Refactoring multi-layered access control policies through (de) composition MM Casalino, R Thion Proceedings of the 9th International Conference on Network and Service …, 2013 | 7 | 2013 |
Seamless access to healthcare folders with strong privacy guarantees T Allard, N Anciaux, L Bouganim, P Pucheral, R Thion Healthcare Delivery Reform and New Technologies: Organizational Initiatives …, 2011 | 7 | 2011 |
Trustworthiness of pervasive healthcare folders T Allard, N Anciaux, L Bouganim, P Pucheral, R Thion Pervasive and Smart Technologies for Healthcare: Ubiquitous Methodologies …, 2010 | 7 | 2010 |
STRUCTURATION RELATIONNELLE DES POLITIQUES DE CONTRÔLE D’ACCÈS REPRÉSENTATION, RAISONNEMENT ET VÉRIFICATION LOGIQUES R Thion Université Paul Sabatier Toulouse, 2008 | 6 | 2008 |
Detection of conflicting Compliance rules F Hantry, MS Hacid, R Thion 2011 IEEE 15th International Enterprise Distributed Object Computing …, 2011 | 5 | 2011 |
Palpable Privacy through Declarative Information Flows Tracking for Smart Buildings F Lesueur, S Surdu, R Thion, Y Gripay, MB Ghorbel-Talbi 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 4 | 2014 |
Découverte automatisée de hiérarchies de rôles pour les politiques de contrôle d'accès R Thion, S Coulondre Revue des Sciences et Technologies de l'Information-Série ISI: Ingénierie …, 2008 | 4 | 2008 |
Integration of access control in information systems: From role engineering to implementation T Romuald, C Stéphane Informatica 30 (1), 2006 | 4 | 2006 |
Access control enforcement for selective disclosure of linked data T Sayah, E Coquery, R Thion, MS Hacid Security and Trust Management: 12th International Workshop, STM 2016 …, 2016 | 3 | 2016 |
Tuple-based access control: a provenance-based information flow control for relational data R Thion, F Lesueur, M Talbi Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2165-2170, 2015 | 3 | 2015 |
Network-Based Passive Information Gathering R Thion Cyber Warfare and Cyber Terrorism, 120-128, 2007 | 3 | 2007 |
Modeling and inferring on role-based access control policies using data dependencies R Thion, S Coulondre International Conference on Database and Expert Systems Applications, 914-923, 2006 | 3 | 2006 |