The SCEAS System
Navigation Menu

Search the dblp DataBase


Marc Lacoste: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lorenzo Bettini, Rocco De Nicola, Daniele Falassi, Marc Lacoste, Michele Loreti
    A Flexible and Modular Framework for Implementing Infrastructures for Global Computing. [Citation Graph (0, 0)][DBLP]
    DAIS, 2005, pp:181-193 [Conf]
  2. Florina Almenárez Mendoza, Mildrey Carbonell, Jordi Forné, Francisca Hinarejos, Marc Lacoste, Andrés Marín López, José A. Montenegro
    Design of an Enhanced PKI for Ubiquitous Networks. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2005, pp:262-266 [Conf]
  3. Lorenzo Bettini, Rocco De Nicola, Daniele Falassi, Marc Lacoste, Luís M. B. Lopes, Licínio Oliveira, Hervé Paulino, Vasco Thudichum Vasconcelos
    A Software Framework for Rapid Prototyping of Run-Time Systems for Mobile Calculi. [Citation Graph (0, 0)][DBLP]
    Global Computing, 2004, pp:179-207 [Conf]
  4. Marc Lacoste, Patrick Paniez, Aimé Vareille
    Superphony: Towards Ubiquitous Audio Communication Services. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2002, pp:728-734 [Conf]
  5. Florence Germain, Marc Lacoste, Jean-Bernard Stefani
    An Abstract Machine for a Higher-Order Distributed Process Calculus. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2002, v:66, n:3, pp:- [Journal]
  6. Marc Lacoste
    Towards a Secure Platform for Distributed Mobile Object Computing. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2000, v:34, n:2, pp:56-73 [Journal]
  7. Marc Lacoste, Gilles Privat, Fano Ramparany
    Evaluating Confidence in Context for Context-Aware Security. [Citation Graph (0, 0)][DBLP]
    AmI, 2007, pp:211-229 [Conf]

  8. Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection. [Citation Graph (, )][DBLP]

  9. A QoS and Security Adaptation Model for Autonomic Pervasive Systems. [Citation Graph (, )][DBLP]

  10. A Software Framework for Autonomic Security in Pervasive Environments. [Citation Graph (, )][DBLP]

  11. Brief Announcement: An OS Architecture for Device Self-protection. [Citation Graph (, )][DBLP]

  12. A component-based policy-neutral architecture for kernel-level access control. [Citation Graph (, )][DBLP]

  13. Pervasive authentication and authorization infrastructures for mobile users. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002