dblp.uni-trier.dewww.uni-trier.de

Yves Deswarte Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
48EEAyda Saïdane, Vincent Nicomette, Yves Deswarte: The Design of a Generic Intrusion-Tolerant Architecture for Web Servers. IEEE Trans. Dependable Sec. Comput. 6(1): 45-58 (2009)
47EECarlos Aguilar Melchor, Yves Deswarte: Trustable Relays for Anonymous Communication. Transactions on Data Privacy 2(2): 101-130 (2009)
2008
46EEAnas Abou El Kalam, Yves Deswarte: Critical Infrastructures Security Modeling, Enforcement and Runtime Checking. CRITIS 2008: 95-108
45 Youssef Laarouchi, Yves Deswarte, David Powell, Jean Arlat: Safety and Security Architectures for Avionics. DCSOFT 2008: 46-52
44EEMohammed Gadelrab, Anas Abou El Kalam, Yves Deswarte: Execution Patterns in Automatic Malware and Human-Centric Attacks. NCA 2008: 29-36
43EEFrancesc Sebé, Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Yves Deswarte, Jean-Jacques Quisquater: Efficient Remote Data Possession Checking in Critical Information Infrastructures. IEEE Trans. Knowl. Data Eng. 20(8): 1034-1038 (2008)
2007
42EECarlos Aguilar Melchor, Yves Deswarte, Julien Iguchi-Cartigny: Closed-Circuit Unobservable Voice over IP. ACSAC 2007: 119-128
41EEAnas Abou El Kalam, Yves Deswarte, Amine Baïna, Mohamed Kaâniche: Access Control for Collaborative Systems: A Web Services Based Approach. ICWS 2007: 1064-1071
40EEMohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte: Defining categories to select representative attack test-cases. QoP 2007: 40-42
39EEPaulo Veríssimo, Nuno Ferreira Neves, Miguel Correia, Yves Deswarte, Anas Abou El Kalam, Andrea Bondavalli, Alessandro Daidone: The CRUTIAL Architecture for Critical Information Infrastructures. WADS 2007: 1-27
38EEMohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette: Empirical analysis and statistical modeling of attack processes based on honeypots CoRR abs/0704.0861: (2007)
2006
37EECarlos Aguilar Melchor, Yves Deswarte: From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications. NCA 2006: 163-172
36EECarlos Aguilar Melchor, Yves Deswarte: Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases. Privacy in Statistical Databases 2006: 257-265
35 Yves Deswarte, Carlos Aguilar Melchor: Current and future privacy enhancing technologies for the Internet. Annales des Télécommunications 61(3-4): 399-417 (2006)
34EEPaulo Veríssimo, Nuno Ferreira Neves, Christian Cachin, Jonathan A. Poritz, David Powell, Yves Deswarte, Robert J. Stroud, Ian Welch: Intrusion-tolerant middleware: the road to automatic security. IEEE Security & Privacy 4(4): 54-62 (2006)
2005
33EEAnas Abou El Kalam, Yves Deswarte: Privacy Requirements Implemented with a JavaCard. ACSAC 2005: 527-536
32EECarlos Aguilar Melchor, Yves Deswarte: pMIX: Untraceability for Small Hiding Groups. NCA 2005: 29-40
2004
31 Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France Kluwer 2004
30 Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France Kluwer 2004
29 Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, Anas Abou El Kalam: Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8/WG8.8 & TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France Kluwer 2004
28 Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier: Smartcard-based Anonymization. CARDIS 2004: 49-66
27 Yves Deswarte, David Powell: Intrusion tolerance for Internet applications. IFIP Congress Topical Sessions 2004: 241-256
26EEYves Deswarte, David Powell: Intrusion Tolerance for Internet Applications. NCA 2004: 35-36
25EEAnas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier: A generic approach for healthcare data anonymization. WPES 2004: 31-32
24 Yves Deswarte, Anas Abou El Kalam: Modèle de sécurité pour le secteur de la santé. Technique et Science Informatiques 23(3): 291-321 (2004)
2003
23EEAlfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe: Dependable Intrusion Tolerance: Technology Demo. DISCEX (2) 2003: 128-130
22EEAnas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida, Frédéric Cuppens, Claire Saurel, Philippe Balbiani, Yves Deswarte, Gilles Trouessin: Organization based access contro. POLICY 2003: 120-
21 Anas Abou El Kalam, Yves Deswarte: Security Model for Health Care Computing and Communication Systems. SEC 2003: 277-288
2002
20EEAlfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe: An Architecture for an Adaptive Intrusion-Tolerant Server. Security Protocols Workshop 2002: 158-178
2001
19EEYves Deswarte, Noreddine Abghour, Vincent Nicomette, David Powell: An Internet Authorization Scheme Using Smart-Card-Based Security Kernels. E-smart 2001: 71-82
2000
18 Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings Springer 2000
1999
17EEYves Deswarte, Mohamed Kaâniche, Pierre Corneillie, John Goodson: SQUALE Dependability Assessment Criteria. SAFECOMP 1999: 27-38
16EERodolphe Ortalo, Yves Deswarte, Mohamed Kaâniche: Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. IEEE Trans. Software Eng. 25(5): 633-650 (1999)
1998
15 Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings Springer 1998
14 Eric Totel, Jean-Paul Blanquart, Yves Deswarte, David Powell: Supporting Multiple Levels of Criticality. FTCS 1998: 70-79
1997
13EEYves Deswarte: Internet Security Despite Untrustworthy Agents and Components. FTDCS 1997: 218-219
12EEVincent Nicomette, Yves Deswarte: An Authorization Scheme For Distributed Object Systems. IEEE Symposium on Security and Privacy 1997: 21-30
1996
11 Vincent Nicomette, Yves Deswarte: Symbolic Rights and Vouchers for Access Control in Distributed Object Systems. ASIAN 1996: 192-203
10EEVincent Nicomette, Yves Deswarte: A Multilevel Security Model for Distributed Object Systems. ESORICS 1996: 80-98
9 Marc Dacier, Yves Deswarte, Mohamed Kaâniche: Models and tools for quantitative assessment of operational security. SEC 1996: 177-186
1994
8EEJean-Charles Fabre, Yves Deswarte, Brian Randell: Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach. EDCC 1994: 21-38
7EEMarc Dacier, Yves Deswarte: Privilege Graph: an Extension to the Typed Access Matrix Model. ESORICS 1994: 319-334
1992
6 Yves Deswarte, Gérard Eizenberg, Jean-Jacques Quisquater: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings Springer 1992
1991
5 Yves Deswarte, Laurent Blain, Jean-Charles Fabre: Intrusion Tolerance in Distributed Computing Systems. IEEE Symposium on Security and Privacy 1991: 110-121
1990
4 Laurent Blain, Yves Deswarte: An Intrusion-Tolerant Security Server for an Open Distributed System. ESORICS 1990: 97-104
1986
3 J.-M. Fray, Yves Deswarte, David Powell: Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering. IEEE Symposium on Security and Privacy 1986: 194-203
2 Yves Deswarte, Jean-Charles Fabre, Jean-Claude Laprie, David Powell: A Saturation Network to Tolerate Faults and Intrusions. Symposium on Reliability in Distributed Software and Database Systems 1986: 74-81
1982
1 J. Abadir, Yves Deswarte: Run-Time Program for Self-Checking Single Board Computer. ITC 1982: 205-213

Coauthor Index

1J. Abadir [1]
2Noreddine Abghour [19]
3Eric Alata [38]
4Magnus Almgren [20] [23]
5Jean Arlat [45]
6Rania El Baida [22]
7Amine Baïna [41]
8Philippe Balbiani [22]
9Salem Benferhat [22]
10Laurent Blain [4] [5]
11Jean-Paul Blanquart [14]
12Andrea Bondavalli [39]
13Christian Cachin [34]
14Steven Cheung [20] [23]
15Emmanuel Cordonnier [25] [28]
16Pierre Corneillie [17]
17Miguel Correia (Miguel P. Correia) [39]
18Frédéric Cuppens [18] [22] [30] [31]
19Marc Dacier [7] [9] [38]
20Alessandro Daidone [39]
21Josep Domingo-Ferrer [43]
22Bruno Dutertre [20] [23]
23Gérard Eizenberg [6]
24Jean-Charles Fabre [2] [5] [8]
25J.-M. Fray [3]
26Mohammed Gadelrab [44]
27Mohammed S. Gadelrab [40]
28Dieter Gollmann [15] [18]
29John Goodson [17]
30Julien Iguchi-Cartigny (Julien Cartigny) [42]
31Sushil Jajodia [30] [31]
32Mohamed Kaâniche [9] [16] [17] [38] [41]
33Anas Abou El Kalam [21] [22] [24] [25] [28] [29] [33] [39] [40] [41] [44] [46]
34Youssef Laarouchi [45]
35Jean-Claude Laprie [2]
36Joshua Levy [20] [23]
37Antoni Martínez-Ballesté [43]
38Catherine Meadows [15]
39Carlos Aguilar Melchor [32] [35] [36] [37] [42] [47]
40Alexandre Miège [22]
41Nuno Ferreira Neves [34] [39]
42Vincent Nicomette [10] [11] [12] [19] [38] [48]
43Rodolphe Ortalo [16]
44Pierre Paradinas [29]
45Jonathan A. Poritz [34]
46David Powell [2] [3] [14] [19] [26] [27] [34] [45]
47Jean-Jacques Quisquater [6] [15] [29] [43]
48Brian Randell [8]
49Ayda Saïdane [48]
50Hassen Saïdi [20] [23]
51Claire Saurel [22]
52Francesc Sebé [43]
53Victoria Stavridou [20] [23]
54Robert J. Stroud [34]
55Eric Totel [14]
56Gilles Trouessin [22] [25] [28]
57Tomás E. Uribe [20] [23]
58Alfonso Valdes [20] [23]
59Paulo Veríssimo [34] [39]
60Michael Waidner [18]
61Lingyu Wang [30] [31]
62Ian Welch (Ian S. Welch) [34]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)