default search action
Solange Ghernaouti-Helie
Person information
- affiliation: University of Lausanne, Switzerland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [e2]Romain Laborde, Nadjib Aitsaadi, Solange Ghernaouti, Abdelmalek Benzekri, Joaquín García-Alfaro:
4th Cyber Security in Networking Conference, CSNet 2020, Lausanne, Switzerland, October 21-23, 2020. IEEE 2020, ISBN 978-1-6654-0458-7 [contents]
2010 – 2019
- 2019
- [c31]Solange Ghernaouti, Léonore Cellier, Bastien Wanner:
Information sharing in cybersecurity : Enhancing security, trust and privacy by capacity building. CSNet 2019: 58-62 - [c30]Léonore Cellier, Solange Ghernaouti:
An interdisciplinary approach for security, privacy and trust in the electronic medical record : A pragmatic legal perspective. HealthCom 2019: 1-6 - 2018
- [e1]Patrick Hebrard, Solange Ghernaouti:
2nd Cyber Security in Networking Conference, CSNet 2018, Paris, France, October 24-26, 2018. IEEE 2018, ISBN 978-1-5386-7045-3 [contents] - 2016
- [c29]Thomas Länger, Henrich C. Pöhls, Solange Ghernaouti:
Selected Cloud Security Patterns to Improve End User Security and Privacy in Public Clouds. APF 2016: 115-132 - [c28]Alain Mermoud, Marcus Matthias Keupp, Solange Ghernaouti, Dimitri Percia David:
Using Incentives to Foster Security Information Sharing and Cooperation: A General Theory and Application to Critical Infrastructure Protection. CRITIS 2016: 150-162 - [c27]Dimitri Percia David, Marcus Matthias Keupp, Solange Ghernaouti, Alain Mermoud:
Cyber Security Investment in the Context of Disruptive Technologies: Extension of the Gordon-Loeb Model and Application to Critical Infrastructure Protection. CRITIS 2016: 296-301 - 2013
- [c26]David Simms, Solange Ghernaouti-Helie:
Structured and Unstructured Data in the Cloud: A Swiss Perspective on Readiness and Internal Controls. AINA Workshops 2013: 643-648 - 2012
- [c25]Ghazi Ben Ayed, Solange Ghernaouti-Helie:
Processes View Modeling of Identity-related Privacy Business Interoperability: Considering User-Supremacy Federated Identity Technical Model and Identity Contract Negotiation. ASONAM 2012: 906-913 - [c24]Solange Ghernaouti-Helie:
Going Digital - Rethinking Cybersecurity and Confidence in a Connected World: A Challenge for Society. EST 2012: 8-11 - [c23]Ghazi Ben Ayed, Solange Ghernaouti-Helie:
Disassembling Digital Identity-Related Privacy into a Set of Services: SoaML-Based Services Design. IESS 2012: 44-57 - [c22]Ghazi Ben Ayed, Solange Ghernaouti-Helie:
Service-Oriented Digital Identity-Related Privacy Interoperability: Implementation Framework of Privacy-as-a-Set-of-Services (PaaSS). IWEI 2012: 193-200 - [c21]Ghazi Ben Ayed, Solange Ghernaouti-Helie:
Architecting Interoperable Privacy within User-Centric Federated Digital Identity Systems: Overview of a Service-Oriented Implementation Framework. NDT (2) 2012: 165-177 - [i3]Solange Ghernaouti-Helie:
The Cybercrime Ecosystem & Privacy Issues - Main Challenges and Perspectives from a Societal Perspective. ERCIM News 2012(90) (2012) - [i2]Solange Ghernaouti-Helie, Jens Tölle, Jean-Jacques Quisquater:
Cybercrime and Privacy Issues - Introduction to the Special Theme. ERCIM News 2012(90) (2012) - 2011
- [c20]Solange Ghernaouti-Helie, Igli Tashi, David Simms:
Optimizing Security Efficiency through Effective Risk Management. AINA Workshops 2011: 613-619 - [c19]Ghazi Ben Ayed, Solange Ghernaouti-Helie:
Privacy requirements specification for digital identity management systems implementation: Towards a digital society of privacy. ICITST 2011: 602-607 - [c18]Ghazi Ben Ayed, Solange Ghernaouti-Helie:
Digital Identity Management within Networked Information Systems: From Vertical Silos View into Horizontal User-Supremacy Processes Management. NBiS 2011: 98-103 - [c17]Solange Ghernaouti-Helie, David Simms, Igli Tashi:
Protecting Information in a Connected World: A Question of Security and of Confidence in Security. NBiS 2011: 208-212 - 2010
- [c16]Solange Ghernaouti-Helie, Igli Tashi, David Simms:
A Multi-stage Methodology for Ensuring Appropriate Security Culture and Governance. ARES 2010: 353-360 - [c15]Solange Ghernaouti-Helie:
A National Strategy for an Effective Cybersecurity Approach and Culture. ARES 2010: 370-373 - [c14]Alessandro E. P. Villa, Javier Iglesias, Solange Ghernaouti-Helie:
OpenAdap.net: a Community-Based Sharing System. IICS 2010: 321-328
2000 – 2009
- 2009
- [c13]Solange Ghernaouti-Helie:
An Inclusive Information Society Needs a Global Approach of Information Security. ARES 2009: 658-662 - [c12]Igli Tashi, Solange Ghernaouti-Helie:
A Security Management Assurance Model to Holistically Assess the Information Security Posture. ARES 2009: 756-761 - [c11]Solange Ghernaouti-Helie, David Simms, Igli Tashi:
Reasonable Security by Effective Risk Management Practices: From Theory to Practice. NBiS 2009: 226-233 - [i1]Solange Ghernaouti-Helie, Igli Tashi, Thomas Laenger, Christian Monyk:
SECOQC Business White Paper. CoRR abs/0904.4073 (2009) - 2008
- [c10]Stefan Rass, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie, Kyandoghere Kyamakya:
Secure Message Relay over Networks with QKD-Links. ICQNM 2008: 10-15 - 2007
- [c9]Igli Tashi, Solange Ghernaouti-Helie:
ISO Security Standards as a Leverage on IT Security Management. AMCIS 2007: 63 - [c8]Solange Ghernaouti-Helie, Mohamed Ali Sfaxi:
Sharing information using quantum cryptography to reach the unconditional security. RIVF 2007: 175-180 - 2006
- [j1]Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie:
802.11i Encryption Key Distribution Using Quantum Cryptography. J. Networks 1(5): 9-20 (2006) - [c7]Thi Mai Trang Nguyen, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie:
Integration of Quantum Cryptography in 802.11 Networks. ARES 2006: 116-123 - [c6]Hend Madhour, Mohamed Ali Sfaxi, Maia Wentland Forte, Solange Ghernaouti-Helie:
Ownership Detection and Protection for Learning Objects. ICALT 2006: 784-788 - [c5]Stefan Rass, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie:
Achieving Unconditional Security in Existing Networks Using Quantum Cryptography. SECRYPT 2006: 207-210 - 2005
- [c4]Solange Ghernaouti-Helie, Mohamed Ali Sfaxi:
Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment. ICETE (Selected Papers) 2005: 139-149 - [c3]Solange Ghernaouti-Helie, Mohamed Ali Sfaxi:
Guaranteerring security of financial transaction by using quantum cryptography in banking environment. ICETE 2005: 268-274 - [c2]Solange Ghernaouti-Helie, Mohamed Ali Sfaxi:
Upgrading PPP security by Quantum Key Distribution. Net-Con 2005: 45-59 - 2003
- [c1]Solange Ghernaouti-Helie:
From Security Culture to Effective E-Security Solutions. IICIS 2003: 209-218
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint