An integrated conceptual model for information system security risk management supported by enterprise architecture management N Mayer, J Aubert, E Grandry, C Feltus, E Goettelmann, R Wieringa Software & Systems Modeling 18, 2285-2312, 2019 | 110 | 2019 |
Enhancing the ArchiMate® standard with a responsibility modeling language for access rights management C Feltus, E Dubois, E Proper, I Band, M Petit Proceedings of the Fifth International Conference on Security of Information …, 2012 | 94* | 2012 |
Conceptual integration of enterprise architecture management and security risk management E Grandry, C Feltus, E Dubois 2013 17th IEEE International Enterprise Distributed Object Computing …, 2013 | 80 | 2013 |
Strengthening employee's responsibility to enhance governance of IT: COBIT RACI chart case study C Feltus, M Petit, E Dubois Proceedings of the first ACM workshop on Information security governance, 23-32, 2009 | 76 | 2009 |
Refining the notion of responsibility in enterprise engineering to support corporate governance of IT C Feltus, M Petit, F Vernadat IFAC Proceedings Volumes 42 (4), 924-929, 2009 | 61* | 2009 |
Modeling enterprise risk management and security with the ArchiMate language I Band, W Engelsman, C Feltus, S González Paredes, J Hietala, ... The Open Group, 2015 | 54* | 2015 |
Building a responsibility model including accountability, capability and commitment C Feltus, M Petit Availability, Reliability and Security, 2009. ARES'09. International …, 2009 | 47 | 2009 |
Coalition-OrBAC: an agent-based access control model for dynamic coalitions I Ben Abdelkrim, A Baina, C Feltus, J Aubert, M Bellafkih, D Khadraoui Trends and Advances in Information Systems and Technologies: Volume 1 6 …, 2018 | 43* | 2018 |
Aligning access rights to governance needs with the responsibility metamodel (ReMMo) in the frame of enterprise architecture (Doctoral dissertation, University of Namur-Public … C Feltus | 35 | 2014 |
Evaluation of the risk and security overlay of archimate to model information system security risks N Mayer, C Feltus 2017 IEEE 21st International Enterprise Distributed Object Computing …, 2017 | 29 | 2017 |
Improving operational risk management systems by formalizing the Basel II regulation with goal models and the ISO/IEC 15504 approach A Rifaut, C Feltus In Proceedings of the CAISE 06 Workshop on Regulations Modelling and their …, 2006 | 28* | 2006 |
Model-driven approach for privacy management in business ecosystem C Feltus, E Grandry, T Kupper, JN Colin MODELSWARD 2017-Proceedings of the 5th International Conference on Model …, 2017 | 27 | 2017 |
Towards cyber-security protection of critical infrastructures by generating security policy for SCADA systems C Feltus, M Ouedraogo, D Khadraoui 2014 1st International Conference on Information and Communication …, 2014 | 26 | 2014 |
Blockchain: Analysis of the new technological components as opportunity to solve the trust issues in supply chain management A Imeri, N Agoulmine, C Feltus, D Khadraoui Intelligent Computing: Proceedings of the 2019 Computing Conference, Volume …, 2019 | 25 | 2019 |
Towards the ENTRI framework: security risk management enhanced by the use of enterprise architectures N Mayer, E Grandry, C Feltus, E Goettelmann Advanced Information Systems Engineering Workshops: CAiSE 2015 International …, 2015 | 25 | 2015 |
Preliminary literature review of policy engineering methods; toward responsibility concept C Feltus 2008 3rd International Conference on Information and Communication …, 2008 | 22 | 2008 |
Business Gouvernance based Policy regulation for Security Incident Response C Feltus, D Khadraoui, B de Rémont, A Rifaut IEEE GIIS 2007 Global Infrastructure Symposium 6, 2007 | 22 | 2007 |
An ontology for requirements analysis of managers’ policies in Financial Institutions C Feltus, A Rifaut Enterprise Interoperability II: New Challenges and Approaches, 27-38, 2007 | 22* | 2007 |
Service specification and service compliance: How to consider the responsibility dimension? A Khadraoui, C Feltus Journal of Service Science Research 4, 123-142, 2012 | 21 | 2012 |
Learning algorithm recommendation framework for IS and CPS security: Analysis of the RNN, LSTM, and GRU contributions C Feltus International Journal of Systems and Software Security and Protection …, 2022 | 20 | 2022 |