The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yves Deswarte: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Anas Abou El Kalam, Yves Deswarte
    Privacy Requirements Implemented with a JavaCard. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:527-536 [Conf]
  2. Vincent Nicomette, Yves Deswarte
    Symbolic Rights and Vouchers for Access Control in Distributed Object Systems. [Citation Graph (0, 0)][DBLP]
    ASIAN, 1996, pp:192-203 [Conf]
  3. Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier
    Smartcard-based Anonymization. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2004, pp:49-66 [Conf]
  4. Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe
    Dependable Intrusion Tolerance: Technology Demo. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:128-130 [Conf]
  5. Jean-Charles Fabre, Yves Deswarte, Brian Randell
    Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach. [Citation Graph (0, 0)][DBLP]
    EDCC, 1994, pp:21-38 [Conf]
  6. Yves Deswarte, Noreddine Abghour, Vincent Nicomette, David Powell
    An Internet Authorization Scheme Using Smart-Card-Based Security Kernels. [Citation Graph (0, 0)][DBLP]
    E-smart, 2001, pp:71-82 [Conf]
  7. Marc Dacier, Yves Deswarte
    Privilege Graph: an Extension to the Typed Access Matrix Model. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:319-334 [Conf]
  8. Vincent Nicomette, Yves Deswarte
    A Multilevel Security Model for Distributed Object Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:80-98 [Conf]
  9. Eric Totel, Jean-Paul Blanquart, Yves Deswarte, David Powell
    Supporting Multiple Levels of Criticality. [Citation Graph (0, 0)][DBLP]
    FTCS, 1998, pp:70-79 [Conf]
  10. Yves Deswarte
    Internet Security Despite Untrustworthy Agents and Components. [Citation Graph (0, 0)][DBLP]
    FTDCS, 1997, pp:218-219 [Conf]
  11. Yves Deswarte, David Powell
    Intrusion tolerance for Internet applications. [Citation Graph (0, 0)][DBLP]
    IFIP Congress Topical Sessions, 2004, pp:241-256 [Conf]
  12. J. Abadir, Yves Deswarte
    Run-Time Program for Self-Checking Single Board Computer. [Citation Graph (0, 0)][DBLP]
    ITC, 1982, pp:205-213 [Conf]
  13. Yves Deswarte, David Powell
    Intrusion Tolerance for Internet Applications. [Citation Graph (0, 0)][DBLP]
    NCA, 2004, pp:35-36 [Conf]
  14. Carlos Aguilar Melchor, Yves Deswarte
    pMIX: Untraceability for Small Hiding Groups. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:29-40 [Conf]
  15. Anas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida, Frédéric Cuppens, Claire Saurel, Philippe Balbiani, Yves Deswarte, Gilles Trouessin
    Organization based access contro. [Citation Graph (0, 0)][DBLP]
    POLICY, 2003, pp:120-0 [Conf]
  16. Carlos Aguilar Melchor, Yves Deswarte
    Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases. [Citation Graph (0, 0)][DBLP]
    Privacy in Statistical Databases, 2006, pp:257-265 [Conf]
  17. Yves Deswarte, Mohamed Kaâniche, Pierre Corneillie, John Goodson
    SQUALE Dependability Assessment Criteria. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 1999, pp:27-38 [Conf]
  18. Marc Dacier, Yves Deswarte, Mohamed Kaâniche
    Models and tools for quantitative assessment of operational security. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:177-186 [Conf]
  19. Anas Abou El Kalam, Yves Deswarte
    Security Model for Health Care Computing and Communication Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:277-288 [Conf]
  20. J.-M. Fray, Yves Deswarte, David Powell
    Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:194-203 [Conf]
  21. Yves Deswarte, Laurent Blain, Jean-Charles Fabre
    Intrusion Tolerance in Distributed Computing Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:110-121 [Conf]
  22. Vincent Nicomette, Yves Deswarte
    An Authorization Scheme For Distributed Object Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:21-30 [Conf]
  23. Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe
    An Architecture for an Adaptive Intrusion-Tolerant Server. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:158-178 [Conf]
  24. Yves Deswarte, Jean-Charles Fabre, Jean-Claude Laprie, David Powell
    A Saturation Network to Tolerate Faults and Intrusions. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliability in Distributed Software and Database Systems, 1986, pp:74-81 [Conf]
  25. Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier
    A generic approach for healthcare data anonymization. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:31-32 [Conf]
  26. Yves Deswarte, Carlos Aguilar Melchor
    Current and future privacy enhancing technologies for the Internet. [Citation Graph (0, 0)][DBLP]
    Annales des Télécommunications, 2006, v:61, n:3-4, pp:399-417 [Journal]
  27. Rodolphe Ortalo, Yves Deswarte, Mohamed Kaâniche
    Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1999, v:25, n:5, pp:633-650 [Journal]
  28. Yves Deswarte, Anas Abou El Kalam
    Modèle de sécurité pour le secteur de la santé. [Citation Graph (0, 0)][DBLP]
    Technique et Science Informatiques, 2004, v:23, n:3, pp:291-321 [Journal]
  29. Anas Abou El Kalam, Yves Deswarte, Amine Baïna, Mohamed Kaâniche
    Access Control for Collaborative Systems: A Web Services Based Approach. [Citation Graph (0, 0)][DBLP]
    ICWS, 2007, pp:1064-1071 [Conf]
  30. Carlos Aguilar Melchor, Yves Deswarte
    From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications. [Citation Graph (0, 0)][DBLP]
    NCA, 2006, pp:163-172 [Conf]
  31. Mohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette
    Empirical analysis and statistical modeling of attack processes based on honeypots [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  32. Closed-Circuit Unobservable Voice over IP. [Citation Graph (, )][DBLP]


  33. Manipulation of Network Traffic Traces for Security Evaluation. [Citation Graph (, )][DBLP]


  34. Defining categories to select representative attack test-cases. [Citation Graph (, )][DBLP]


  35. An Intrusion-Tolerant Security Server for an Open Distributed System. [Citation Graph (, )][DBLP]


  36. Towards a Privacy-Preserving National Identity Card. [Citation Graph (, )][DBLP]


  37. The CRUTIAL Architecture for Critical Information Infrastructures. [Citation Graph (, )][DBLP]


  38. Safety and Security Architectures for Avionics. [Citation Graph (, )][DBLP]


  39. Execution Patterns in Automatic Malware and Human-Centric Attacks. [Citation Graph (, )][DBLP]


  40. Critical Infrastructures Security Modeling, Enforcement and Runtime Checking. [Citation Graph (, )][DBLP]


  41. Access control for cooperative systems: A comparative analysis. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.285secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002