2008 |
19 | | Xavier Dumas,
Claire Pagetti,
Laurent Sagaspe,
Pierre Bieber,
Philippe Dhaussy:
Vers la génération de modèles de sûreté de fonctionnement.
CAL 2008: 157-172 |
2005 |
18 | EE | Laurent Sagaspe,
Gérard Bel,
Pierre Bieber,
Frédéric Boniol,
Charles Castel:
Safe Allocation of Avionics Shared Resources.
HASE 2005: 25-33 |
2004 |
17 | | Pierre Bieber,
Christian Bougnol,
Charles Castel,
Jean-Pierre Heckmann,
Christophe Kehren,
Sylvain Metge,
Christel Seguin:
Safety assessment with AltaRica.
IFIP Congress Topical Sessions 2004: 505-510 |
2002 |
16 | EE | Pierre Bieber,
Charles Castel,
Christel Seguin:
Combination of Fault Tree Analysis and Model Checking for Safety Assessment of Complex System.
EDCC 2002: 19-31 |
15 | | Pierre Bieber,
Jacques Cazin,
Pierre Girard,
Jean-Louis Lanet,
Virginie Wiels,
Guy Zanon:
Checking Secure Interactions of Smart Card Applets: Extended Version.
Journal of Computer Security 10(4): 369-398 (2002) |
2000 |
14 | EE | Pierre Bieber,
D. Raujol,
Pierre Siron:
Security Architecture for Federated Cooperative Information Systems.
ACSAC 2000: 208-216 |
13 | EE | Pierre Bieber,
Jacques Cazin,
Pierre Girard,
Jean-Louis Lanet,
Virginie Wiels,
Guy Zanon:
Checking Secure Interactions of Smart Card Applets.
ESORICS 2000: 1-16 |
12 | EE | Pierre Bieber,
Jacques Cazin,
A. El Marouani,
Pierre Girard,
Jean-Louis Lanet,
Virginie Wiels,
Guy Zanon:
The PACAP Prototype: A Tool for Detecting Java Card Illegal Flow.
Java Card Workshop 2000: 25-37 |
11 | EE | Pierre Bieber,
Jacques Cazin,
Virginie Wiels,
Guy Zanon,
Pierre Girard,
Jean-Louis Lanet:
Electronic Purse Applet Certification: extended abstract.
Electr. Notes Theor. Comput. Sci. 32: (2000) |
1999 |
10 | EE | Pierre Bieber:
Security Function Interactions.
CSFW 1999: 151-160 |
9 | EE | Pierre Bieber,
Pierre Siron:
Design and Implementation of a Distributed Interactive Simulation Security Architecture.
DIS-RT 1999: 113-119 |
1996 |
8 | EE | Pierre Bieber:
Formal Techniques for an ITSEC-E4 Secure Gateway.
ACSAC 1996: 236-246 |
1993 |
7 | | Pierre Bieber,
Nora Boulahia-Cuppens,
T. Lehmann,
E. van Wickeren:
Abstract Machines for Communication Security.
CSFW 1993: 137-146 |
1992 |
6 | | Pierre Bieber,
Frédéric Cuppens:
Secure Dependencies with Dynamic Level Assignments.
CSFW 1992: 63-75 |
5 | | Pierre Bieber,
Frédéric Cuppens:
A Logical View of Secure Dependencies.
Journal of Computer Security 1(1): 99-130 (1992) |
1991 |
4 | | Pierre Bieber,
Frédéric Cuppens:
A Definition of Secure Dependencies Using the Logic of Security.
CSFW 1991: 2-11 |
1990 |
3 | | Pierre Bieber:
A Logic of Communication in Hostile Environments.
CSFW 1990: 14-22 |
2 | | Pierre Bieber:
Epistemic Verification of Cryptographic Protocols.
ESORICS 1990: 211-221 |
1988 |
1 | | Pierre Bieber,
Luis Fariñas del Cerro,
Andreas Herzig:
MOLOG: a Modal PROLOG.
CADE 1988: 762-763 |