@inproceedings{GuemkamFSBKG11, title = {Reputation Based Dynamic Responsibility to Agent Assignement for Critical Infrastructure}, author = {Guy Guemkam and Christophe Feltus and Pierre Schmitt and Cédric Bonhomme and Djamel Khadraoui and Zahia Guessoum}, year = {2011}, doi = {10.1109/WI-IAT.2011.194}, url = {http://doi.ieeecomputersociety.org/10.1109/WI-IAT.2011.194}, researchr = {https://researchr.org/publication/GuemkamFSBKG11}, cites = {0}, citedby = {0}, pages = {272-275}, booktitle = {Proceedings of the 2011 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT 2011, Campus Scientifique de la Doua, Lyon, France, August 22-27, 2011}, editor = {Olivier Boissier and Jeffrey Bradshaw and Longbing Cao and Klaus Fischer and Mohand-Said Hacid}, publisher = {IEEE Computer Society}, isbn = {978-0-7695-4513-4}, } @article{RenzoFF04, title = {Méthode d évaluation NOEMI. Une méthode d évaluation de la qualité des processus informatiques en petites et moyennes entreprises}, author = {Bernard Di Renzo and Matthieu Farcot and Christophe Feltus}, year = {2004}, researchr = {https://researchr.org/publication/RenzoFF04}, cites = {0}, citedby = {0}, journal = {Ingénierie des Systèmes d Information}, volume = {9}, number = {5-6}, pages = {51-68}, } @inproceedings{Feltus0P10, title = {Conceptualizing a responsibility based approach for elaborating and verifying RBAC policies conforming with CobiT framework requirements}, author = {Christophe Feltus and Eric Dubois 0001 and Michaël Petit}, year = {2010}, doi = {10.1109/RELAW.2010.5625355}, url = {http://dx.doi.org/10.1109/RELAW.2010.5625355}, researchr = {https://researchr.org/publication/Feltus0P10}, cites = {0}, citedby = {0}, pages = {34-43}, booktitle = {Third International Workshop on Requirements Engineering and Law, RELAW 2010, Sydney, NSW, Australia, September 28, 2010}, publisher = {IEEE}, } @inproceedings{FeltusR07, title = {An Ontology for Requirements Analysis of Managers Policies in Financial Institutions}, author = {Christophe Feltus and André Rifaut}, year = {2007}, doi = {10.1007/978-1-84628-858-6_3}, url = {http://dx.doi.org/10.1007/978-1-84628-858-6_3}, tags = {ontologies, ontology, analysis}, researchr = {https://researchr.org/publication/FeltusR07}, cites = {0}, citedby = {0}, pages = {27-38}, booktitle = {Enterprise Interoperability II - New Challenges and Industrial Approaches, Proceedings of the 3th International Conference on Interoperability for Enterprise Software and Applications, IESA 2007, March 27-30, 2007, Funchal, Madeira Island, Portugal}, editor = {Ricardo Jardim-Gonçalves and Jörg P. Müller and Kai Mertins and Martin Zelm}, publisher = {Springer}, isbn = {978-1-84628-857-9}, } @inproceedings{FeltusP09, title = {Building a Responsibility Model Including Accountability, Capability and Commitment}, author = {Christophe Feltus and Michaël Petit}, year = {2009}, doi = {10.1109/ARES.2009.45}, url = {http://dx.doi.org/10.1109/ARES.2009.45}, researchr = {https://researchr.org/publication/FeltusP09}, cites = {0}, citedby = {0}, pages = {412-419}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan}, publisher = {IEEE Computer Society}, } @inproceedings{Feltus0PBP12, title = {Enhancing the ArchiMate® standard with a responsibility modeling language for access rights management}, author = {Christophe Feltus and Eric Dubois 0001 and Erik Proper and Iver Band and Michaël Petit}, year = {2012}, doi = {10.1145/2388576.2388577}, url = {http://doi.acm.org/10.1145/2388576.2388577}, researchr = {https://researchr.org/publication/Feltus0PBP12}, cites = {0}, citedby = {0}, pages = {12-19}, booktitle = {5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012}, editor = {Manoj Singh Gaur and Atilla Elçi and Oleg B. Makarevich and Mehmet A. Orgun and Virendra Singh}, publisher = {ACM}, isbn = {978-1-4503-1668-2}, } @article{KhadraouiF12, title = {Service specification and service compliance: How to consider the responsibility dimension?}, author = {Abdelaziz Khadraoui and Christophe Feltus}, year = {2012}, doi = {10.1007/s12927-012-0005-2}, url = {http://dx.doi.org/10.1007/s12927-012-0005-2}, researchr = {https://researchr.org/publication/KhadraouiF12}, cites = {0}, citedby = {0}, journal = {JoSSR}, volume = {4}, number = {1}, pages = {123-142}, } @inproceedings{FeltusP09-0, title = {Building a responsibility model using modal logic - towards Accountability, Aapability and Commitment concepts}, author = {Christophe Feltus and Michaël Petit}, year = {2009}, doi = {10.1109/AICCSA.2009.5069353}, url = {http://doi.ieeecomputersociety.org/10.1109/AICCSA.2009.5069353}, researchr = {https://researchr.org/publication/FeltusP09-0}, cites = {0}, citedby = {0}, pages = {386-391}, booktitle = {The 7th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2009, Rabat, Morocco, May 10-13, 2009}, editor = {El Mostapha Aboulhamid and José Luis Sevillano}, publisher = {IEEE}, isbn = {978-1-4244-3807-5}, } @inproceedings{BonhommeFK10, title = {A multi-agent based decision mechanism for incident reaction in telecommunication network}, author = {Cédric Bonhomme and Christophe Feltus and Djamel Khadraoui}, year = {2010}, doi = {10.1109/AICCSA.2010.5587036}, url = {http://doi.ieeecomputersociety.org/10.1109/AICCSA.2010.5587036}, tags = {rule-based}, researchr = {https://researchr.org/publication/BonhommeFK10}, cites = {0}, citedby = {0}, pages = {1-2}, booktitle = {The 8th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2010, Hammamet, Tunisia, May 16-19, 2010}, publisher = {IEEE}, } @inproceedings{FeltusPD11, title = {ReMoLa: Responsibility model language to align access rights with business process requirements}, author = {Christophe Feltus and Michaël Petit and Eric Dubois 0001}, year = {2011}, doi = {10.1109/RCIS.2011.6006828}, url = {http://dx.doi.org/10.1109/RCIS.2011.6006828}, researchr = {https://researchr.org/publication/FeltusPD11}, cites = {0}, citedby = {0}, pages = {1-6}, booktitle = {Proceedings of the Fifth IEEE International Conference on Research Challenges in Information Science, RCIS 2011, Gosier, Guadeloupe, France, 19-21 May, 2011}, publisher = {IEEE}, isbn = {978-1-4244-8670-0}, } @inproceedings{FeltusKA10, title = {A Security Decision-Reaction Architecture for Heterogeneous Distributed Network}, author = {Christophe Feltus and Djamel Khadraoui and Jocelyn Aubert}, year = {2010}, doi = {10.1109/ARES.2010.57}, url = {http://doi.ieeecomputersociety.org/10.1109/ARES.2010.57}, tags = {architecture, security}, researchr = {https://researchr.org/publication/FeltusKA10}, cites = {0}, citedby = {0}, pages = {1-8}, booktitle = {ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, publisher = {IEEE Computer Society}, isbn = {978-0-7695-3965-2}, } @inproceedings{IncoulGABF08, title = {If only I can trust my police! SIM : An agent-based audit solution of access right deployment through open network}, author = {Christophe Incoul and Benjamin Gåteau and Jocelyn Aubert and Nicolas Bounoughaz and Christophe Feltus}, year = {2008}, doi = {10.1109/CRISIS.2008.4757467}, url = {http://dx.doi.org/10.1109/CRISIS.2008.4757467}, tags = {deployment, source-to-source, open-source}, researchr = {https://researchr.org/publication/IncoulGABF08}, cites = {0}, citedby = {0}, pages = {85-92}, booktitle = {CRiSIS 08, Third International Conference on Risks and Security of Internet and Systems, Tozeur, Tunesia, October 28-30, 2008}, editor = {Mohamed Jmaiel and Mohamed Mosbah}, publisher = {IEEE}, isbn = {978-1-4244-3309-4}, } @inproceedings{BonhommeFP11, title = {Dynamic Responsibilities Assignment in Critical Electronic Institutions - A Context-Aware Solution for in Crisis Access Right Management}, author = {Cédric Bonhomme and Christophe Feltus and Michaël Petit}, year = {2011}, doi = {10.1109/ARES.2011.43}, url = {http://doi.ieeecomputersociety.org/10.1109/ARES.2011.43}, researchr = {https://researchr.org/publication/BonhommeFP11}, cites = {0}, citedby = {0}, pages = {248-253}, booktitle = {Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011}, publisher = {IEEE}, isbn = {978-1-4577-0979-1}, } @inproceedings{PetitFV12, title = {Enterprise Architecture Enhanced with Responsibility to Manage Access Rights - Case Study in an EU Institution}, author = {Michaël Petit and Christophe Feltus and François Vernadat}, year = {2012}, doi = {10.1007/978-3-642-34549-4_10}, url = {http://dx.doi.org/10.1007/978-3-642-34549-4_10}, researchr = {https://researchr.org/publication/PetitFV12}, cites = {0}, citedby = {0}, pages = {132-147}, booktitle = {The Practice of Enterprise Modeling - 5th IFIP WG 8.1 Working Conference, PoEM 2012, Rostock, Germany, November 7-8, 2012. Proceedings}, editor = {Kurt Sandkuhl and Ulf Seigerroth and Janis Stirna}, volume = {134}, series = {Lecture Notes in Business Information Processing}, publisher = {Springer}, isbn = {978-3-642-34548-7}, } @inproceedings{GateauFAI08, title = {An agent-based framework for identity management: The unsuspected relation with ISO/IEC 15504}, author = {Benjamin Gateau and Christophe Feltus and Jocelyn Aubert and Christophe Incoul}, year = {2008}, doi = {10.1109/RCIS.2008.4632091}, url = {http://dx.doi.org/10.1109/RCIS.2008.4632091}, tags = {rule-based}, researchr = {https://researchr.org/publication/GateauFAI08}, cites = {0}, citedby = {0}, pages = {35-44}, booktitle = {Proceedings of the IEEE International Conference on Research Challenges in Information Science, RCIS 2008, Marrakech, Morocco, June 3-6, 2008}, editor = {Oscar Pastor and André Flory and Jean-Louis Cavarero}, publisher = {IEEE}, isbn = {978-1-4244-1677-6}, } @inproceedings{FeltusIAGAC09, title = {Methodology to Align Business and IT Policies: Use Case from an IT Company}, author = {Christophe Feltus and Christophe Incoul and Jocelyn Aubert and Benjamin Gâteau and André Adelsbach and Marc Camy}, year = {2009}, doi = {10.1109/ARES.2009.47}, url = {http://dx.doi.org/10.1109/ARES.2009.47}, researchr = {https://researchr.org/publication/FeltusIAGAC09}, cites = {0}, citedby = {0}, pages = {762-767}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan}, publisher = {IEEE Computer Society}, } @inproceedings{RifautF06, title = {Improving Operational Risk Management Systems by Formalizing the Basel II Regulation with Goal Models and the ISO/IEC 15504 Approach}, author = {André Rifaut and Christophe Feltus}, year = {2006}, url = {http://ceur-ws.org/Vol-241/paper8.pdf}, tags = {systematic-approach}, researchr = {https://researchr.org/publication/RifautF06}, cites = {0}, citedby = {0}, booktitle = {Proceedings of the CAISE*06 Workshop on Regulations Modelling and their Validation and Verification ReMo2V 06, Luxemburg, June 5-9, 2006}, editor = {Régine Laleau and Michel Lemoine}, volume = {241}, series = {CEUR Workshop Proceedings}, publisher = {CEUR-WS.org}, }