2009 | ||
---|---|---|
49 | Mohammed Gadelrab, Anas Abou El Kalam, Yves Deswarte: Manipulation of Network Traffic Traces for Security Evaluation. AINA Workshops 2009: 1124-1129 | |
48 | Ayda Saïdane, Vincent Nicomette, Yves Deswarte: The Design of a Generic Intrusion-Tolerant Architecture for Web Servers. IEEE Trans. Dependable Sec. Comput. 6(1): 45-58 (2009) | |
47 | Carlos Aguilar Melchor, Yves Deswarte: Trustable Relays for Anonymous Communication. Transactions on Data Privacy 2(2): 101-130 (2009) | |
2008 | ||
46 | Anas Abou El Kalam, Yves Deswarte: Critical Infrastructures Security Modeling, Enforcement and Runtime Checking. CRITIS 2008: 95-108 | |
45 | Youssef Laarouchi, Yves Deswarte, David Powell, Jean Arlat: Safety and Security Architectures for Avionics. DCSOFT 2008: 46-52 | |
44 | Mohammed Gadelrab, Anas Abou El Kalam, Yves Deswarte: Execution Patterns in Automatic Malware and Human-Centric Attacks. NCA 2008: 29-36 | |
43 | Francesc Sebé, Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Yves Deswarte, Jean-Jacques Quisquater: Efficient Remote Data Possession Checking in Critical Information Infrastructures. IEEE Trans. Knowl. Data Eng. 20(8): 1034-1038 (2008) | |
2007 | ||
42 | Carlos Aguilar Melchor, Yves Deswarte, Julien Iguchi-Cartigny: Closed-Circuit Unobservable Voice over IP. ACSAC 2007: 119-128 | |
41 | Anas Abou El Kalam, Yves Deswarte, Amine Baïna, Mohamed Kaâniche: Access Control for Collaborative Systems: A Web Services Based Approach. ICWS 2007: 1064-1071 | |
40 | Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte: Defining categories to select representative attack test-cases. QoP 2007: 40-42 | |
39 | Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia, Yves Deswarte, Anas Abou El Kalam, Andrea Bondavalli, Alessandro Daidone: The CRUTIAL Architecture for Critical Information Infrastructures. WADS 2007: 1-27 | |
38 | Mohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette: Empirical analysis and statistical modeling of attack processes based on honeypots CoRR abs/0704.0861: (2007) | |
2006 | ||
37 | Carlos Aguilar Melchor, Yves Deswarte: From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications. NCA 2006: 163-172 | |
36 | Carlos Aguilar Melchor, Yves Deswarte: Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases. Privacy in Statistical Databases 2006: 257-265 | |
35 | Yves Deswarte, Carlos Aguilar Melchor: Current and future privacy enhancing technologies for the Internet. Annales des Télécommunications 61(3-4): 399-417 (2006) | |
34 | Paulo Veríssimo, Nuno Ferreira Neves, Christian Cachin, Jonathan A. Poritz, David Powell, Yves Deswarte, Robert J. Stroud, Ian Welch: Intrusion-tolerant middleware: the road to automatic security. IEEE Security & Privacy 4(4): 54-62 (2006) | |
2005 | ||
33 | Anas Abou El Kalam, Yves Deswarte: Privacy Requirements Implemented with a JavaCard. ACSAC 2005: 527-536 | |
32 | Carlos Aguilar Melchor, Yves Deswarte: pMIX: Untraceability for Small Hiding Groups. NCA 2005: 29-40 | |
2004 | ||
31 | Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France Kluwer 2004 | |
30 | Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France Kluwer 2004 | |
29 | Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, Anas Abou El Kalam: Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8/WG8.8 & TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France Kluwer 2004 | |
28 | Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier: Smartcard-based Anonymization. CARDIS 2004: 49-66 | |
27 | Yves Deswarte, David Powell: Intrusion tolerance for Internet applications. IFIP Congress Topical Sessions 2004: 241-256 | |
26 | Yves Deswarte, David Powell: Intrusion Tolerance for Internet Applications. NCA 2004: 35-36 | |
25 | Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier: A generic approach for healthcare data anonymization. WPES 2004: 31-32 | |
24 | Yves Deswarte, Anas Abou El Kalam: Modèle de sécurité pour le secteur de la santé. Technique et Science Informatiques 23(3): 291-321 (2004) | |
2003 | ||
23 | Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe: Dependable Intrusion Tolerance: Technology Demo. DISCEX (2) 2003: 128-130 | |
22 | Anas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida, Frédéric Cuppens, Claire Saurel, Philippe Balbiani, Yves Deswarte, Gilles Trouessin: Organization based access contro. POLICY 2003: 120- | |
21 | Anas Abou El Kalam, Yves Deswarte: Security Model for Health Care Computing and Communication Systems. SEC 2003: 277-288 | |
2002 | ||
20 | Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe: An Architecture for an Adaptive Intrusion-Tolerant Server. Security Protocols Workshop 2002: 158-178 | |
2001 | ||
19 | Yves Deswarte, Noreddine Abghour, Vincent Nicomette, David Powell: An Internet Authorization Scheme Using Smart-Card-Based Security Kernels. E-smart 2001: 71-82 | |
2000 | ||
18 | Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings Springer 2000 | |
1999 | ||
17 | Yves Deswarte, Mohamed Kaâniche, Pierre Corneillie, John Goodson: SQUALE Dependability Assessment Criteria. SAFECOMP 1999: 27-38 | |
16 | Rodolphe Ortalo, Yves Deswarte, Mohamed Kaâniche: Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. IEEE Trans. Software Eng. 25(5): 633-650 (1999) | |
1998 | ||
15 | Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings Springer 1998 | |
14 | Eric Totel, Jean-Paul Blanquart, Yves Deswarte, David Powell: Supporting Multiple Levels of Criticality. FTCS 1998: 70-79 | |
1997 | ||
13 | Yves Deswarte: Internet Security Despite Untrustworthy Agents and Components. FTDCS 1997: 218-219 | |
12 | Vincent Nicomette, Yves Deswarte: An Authorization Scheme For Distributed Object Systems. IEEE Symposium on Security and Privacy 1997: 21-30 | |
1996 | ||
11 | Vincent Nicomette, Yves Deswarte: Symbolic Rights and Vouchers for Access Control in Distributed Object Systems. ASIAN 1996: 192-203 | |
10 | Vincent Nicomette, Yves Deswarte: A Multilevel Security Model for Distributed Object Systems. ESORICS 1996: 80-98 | |
9 | Marc Dacier, Yves Deswarte, Mohamed Kaâniche: Models and tools for quantitative assessment of operational security. SEC 1996: 177-186 | |
1994 | ||
8 | Jean-Charles Fabre, Yves Deswarte, Brian Randell: Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach. EDCC 1994: 21-38 | |
7 | Marc Dacier, Yves Deswarte: Privilege Graph: an Extension to the Typed Access Matrix Model. ESORICS 1994: 319-334 | |
1992 | ||
6 | Yves Deswarte, Gérard Eizenberg, Jean-Jacques Quisquater: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings Springer 1992 | |
1991 | ||
5 | Yves Deswarte, Laurent Blain, Jean-Charles Fabre: Intrusion Tolerance in Distributed Computing Systems. IEEE Symposium on Security and Privacy 1991: 110-121 | |
1990 | ||
4 | Laurent Blain, Yves Deswarte: An Intrusion-Tolerant Security Server for an Open Distributed System. ESORICS 1990: 97-104 | |
1986 | ||
3 | J.-M. Fray, Yves Deswarte, David Powell: Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering. IEEE Symposium on Security and Privacy 1986: 194-203 | |
2 | Yves Deswarte, Jean-Charles Fabre, Jean-Claude Laprie, David Powell: A Saturation Network to Tolerate Faults and Intrusions. Symposium on Reliability in Distributed Software and Database Systems 1986: 74-81 | |
1982 | ||
1 | J. Abadir, Yves Deswarte: Run-Time Program for Self-Checking Single Board Computer. ITC 1982: 205-213 |