|
Search the dblp DataBase
Yves Deswarte:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Anas Abou El Kalam, Yves Deswarte
Privacy Requirements Implemented with a JavaCard. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:527-536 [Conf]
- Vincent Nicomette, Yves Deswarte
Symbolic Rights and Vouchers for Access Control in Distributed Object Systems. [Citation Graph (0, 0)][DBLP] ASIAN, 1996, pp:192-203 [Conf]
- Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier
Smartcard-based Anonymization. [Citation Graph (0, 0)][DBLP] CARDIS, 2004, pp:49-66 [Conf]
- Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe
Dependable Intrusion Tolerance: Technology Demo. [Citation Graph (0, 0)][DBLP] DISCEX (2), 2003, pp:128-130 [Conf]
- Jean-Charles Fabre, Yves Deswarte, Brian Randell
Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach. [Citation Graph (0, 0)][DBLP] EDCC, 1994, pp:21-38 [Conf]
- Yves Deswarte, Noreddine Abghour, Vincent Nicomette, David Powell
An Internet Authorization Scheme Using Smart-Card-Based Security Kernels. [Citation Graph (0, 0)][DBLP] E-smart, 2001, pp:71-82 [Conf]
- Marc Dacier, Yves Deswarte
Privilege Graph: an Extension to the Typed Access Matrix Model. [Citation Graph (0, 0)][DBLP] ESORICS, 1994, pp:319-334 [Conf]
- Vincent Nicomette, Yves Deswarte
A Multilevel Security Model for Distributed Object Systems. [Citation Graph (0, 0)][DBLP] ESORICS, 1996, pp:80-98 [Conf]
- Eric Totel, Jean-Paul Blanquart, Yves Deswarte, David Powell
Supporting Multiple Levels of Criticality. [Citation Graph (0, 0)][DBLP] FTCS, 1998, pp:70-79 [Conf]
- Yves Deswarte
Internet Security Despite Untrustworthy Agents and Components. [Citation Graph (0, 0)][DBLP] FTDCS, 1997, pp:218-219 [Conf]
- Yves Deswarte, David Powell
Intrusion tolerance for Internet applications. [Citation Graph (0, 0)][DBLP] IFIP Congress Topical Sessions, 2004, pp:241-256 [Conf]
- J. Abadir, Yves Deswarte
Run-Time Program for Self-Checking Single Board Computer. [Citation Graph (0, 0)][DBLP] ITC, 1982, pp:205-213 [Conf]
- Yves Deswarte, David Powell
Intrusion Tolerance for Internet Applications. [Citation Graph (0, 0)][DBLP] NCA, 2004, pp:35-36 [Conf]
- Carlos Aguilar Melchor, Yves Deswarte
pMIX: Untraceability for Small Hiding Groups. [Citation Graph (0, 0)][DBLP] NCA, 2005, pp:29-40 [Conf]
- Anas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida, Frédéric Cuppens, Claire Saurel, Philippe Balbiani, Yves Deswarte, Gilles Trouessin
Organization based access contro. [Citation Graph (0, 0)][DBLP] POLICY, 2003, pp:120-0 [Conf]
- Carlos Aguilar Melchor, Yves Deswarte
Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases. [Citation Graph (0, 0)][DBLP] Privacy in Statistical Databases, 2006, pp:257-265 [Conf]
- Yves Deswarte, Mohamed Kaâniche, Pierre Corneillie, John Goodson
SQUALE Dependability Assessment Criteria. [Citation Graph (0, 0)][DBLP] SAFECOMP, 1999, pp:27-38 [Conf]
- Marc Dacier, Yves Deswarte, Mohamed Kaâniche
Models and tools for quantitative assessment of operational security. [Citation Graph (0, 0)][DBLP] SEC, 1996, pp:177-186 [Conf]
- Anas Abou El Kalam, Yves Deswarte
Security Model for Health Care Computing and Communication Systems. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:277-288 [Conf]
- J.-M. Fray, Yves Deswarte, David Powell
Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1986, pp:194-203 [Conf]
- Yves Deswarte, Laurent Blain, Jean-Charles Fabre
Intrusion Tolerance in Distributed Computing Systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1991, pp:110-121 [Conf]
- Vincent Nicomette, Yves Deswarte
An Authorization Scheme For Distributed Object Systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:21-30 [Conf]
- Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe
An Architecture for an Adaptive Intrusion-Tolerant Server. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2002, pp:158-178 [Conf]
- Yves Deswarte, Jean-Charles Fabre, Jean-Claude Laprie, David Powell
A Saturation Network to Tolerate Faults and Intrusions. [Citation Graph (0, 0)][DBLP] Symposium on Reliability in Distributed Software and Database Systems, 1986, pp:74-81 [Conf]
- Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier
A generic approach for healthcare data anonymization. [Citation Graph (0, 0)][DBLP] WPES, 2004, pp:31-32 [Conf]
- Yves Deswarte, Carlos Aguilar Melchor
Current and future privacy enhancing technologies for the Internet. [Citation Graph (0, 0)][DBLP] Annales des Télécommunications, 2006, v:61, n:3-4, pp:399-417 [Journal]
- Rodolphe Ortalo, Yves Deswarte, Mohamed Kaâniche
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. [Citation Graph (0, 0)][DBLP] IEEE Trans. Software Eng., 1999, v:25, n:5, pp:633-650 [Journal]
- Yves Deswarte, Anas Abou El Kalam
Modèle de sécurité pour le secteur de la santé. [Citation Graph (0, 0)][DBLP] Technique et Science Informatiques, 2004, v:23, n:3, pp:291-321 [Journal]
- Anas Abou El Kalam, Yves Deswarte, Amine Baïna, Mohamed Kaâniche
Access Control for Collaborative Systems: A Web Services Based Approach. [Citation Graph (0, 0)][DBLP] ICWS, 2007, pp:1064-1071 [Conf]
- Carlos Aguilar Melchor, Yves Deswarte
From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications. [Citation Graph (0, 0)][DBLP] NCA, 2006, pp:163-172 [Conf]
- Mohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette
Empirical analysis and statistical modeling of attack processes based on honeypots [Citation Graph (0, 0)][DBLP] CoRR, 2007, v:0, n:, pp:- [Journal]
Closed-Circuit Unobservable Voice over IP. [Citation Graph (, )][DBLP]
Manipulation of Network Traffic Traces for Security Evaluation. [Citation Graph (, )][DBLP]
Defining categories to select representative attack test-cases. [Citation Graph (, )][DBLP]
An Intrusion-Tolerant Security Server for an Open Distributed System. [Citation Graph (, )][DBLP]
Towards a Privacy-Preserving National Identity Card. [Citation Graph (, )][DBLP]
The CRUTIAL Architecture for Critical Information Infrastructures. [Citation Graph (, )][DBLP]
Safety and Security Architectures for Avionics. [Citation Graph (, )][DBLP]
Execution Patterns in Automatic Malware and Human-Centric Attacks. [Citation Graph (, )][DBLP]
Critical Infrastructures Security Modeling, Enforcement and Runtime Checking. [Citation Graph (, )][DBLP]
Access control for cooperative systems: A comparative analysis. [Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.285secs
|