Designing Security Properties-Centric Communication Protocols using a Component-Based Approach

N Nobelis, K Boudaoud, C Delettre… - International Journal of …, 2012 - igi-global.com
Numerous communication protocols have been designed offering a set of security properties
through the use of cryptographic tools to secure electronic document transfer. However …

Access control policies and companies data transmission management

Y Bertrand - 2017 - theses.hal.science
The main objective of this thesis is to solve the problem of unintentional data leakage within
companies. These leaks can be caused by the use of both Access Control (AC) and …