| 2009 |
| 45 | EE | Ayda Saïdane,
Vincent Nicomette,
Yves Deswarte:
The Design of a Generic Intrusion-Tolerant Architecture for Web Servers.
IEEE Trans. Dependable Sec. Comput. 6(1): 45-58 (2009) |
| 2008 |
| 44 | | Youssef Laarouchi,
Yves Deswarte,
David Powell,
Jean Arlat:
Safety and Security Architectures for Avionics.
DCSOFT 2008: 46-52 |
| 43 | EE | Mohammed Gadelrab,
Anas Abou El Kalam,
Yves Deswarte:
Execution Patterns in Automatic Malware and Human-Centric Attacks.
NCA 2008: 29-36 |
| 42 | EE | Francesc Sebé,
Josep Domingo-Ferrer,
Antoni Martínez-Ballesté,
Yves Deswarte,
Jean-Jacques Quisquater:
Efficient Remote Data Possession Checking in Critical Information Infrastructures.
IEEE Trans. Knowl. Data Eng. 20(8): 1034-1038 (2008) |
| 2007 |
| 41 | EE | Carlos Aguilar Melchor,
Yves Deswarte,
Julien Iguchi-Cartigny:
Closed-Circuit Unobservable Voice over IP.
ACSAC 2007: 119-128 |
| 40 | EE | Anas Abou El Kalam,
Yves Deswarte,
Amine Baïna,
Mohamed Kaâniche:
Access Control for Collaborative Systems: A Web Services Based Approach.
ICWS 2007: 1064-1071 |
| 39 | EE | Mohammed S. Gadelrab,
Anas Abou El Kalam,
Yves Deswarte:
Defining categories to select representative attack test-cases.
QoP 2007: 40-42 |
| 38 | EE | Paulo Veríssimo,
Nuno Ferreira Neves,
Miguel Correia,
Yves Deswarte,
Anas Abou El Kalam,
Andrea Bondavalli,
Alessandro Daidone:
The CRUTIAL Architecture for Critical Information Infrastructures.
WADS 2007: 1-27 |
| 37 | EE | Mohamed Kaâniche,
Yves Deswarte,
Eric Alata,
Marc Dacier,
Vincent Nicomette:
Empirical analysis and statistical modeling of attack processes based on honeypots
CoRR abs/0704.0861: (2007) |
| 2006 |
| 36 | EE | Carlos Aguilar Melchor,
Yves Deswarte:
From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications.
NCA 2006: 163-172 |
| 35 | EE | Carlos Aguilar Melchor,
Yves Deswarte:
Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases.
Privacy in Statistical Databases 2006: 257-265 |
| 34 | | Yves Deswarte,
Carlos Aguilar Melchor:
Current and future privacy enhancing technologies for the Internet.
Annales des Télécommunications 61(3-4): 399-417 (2006) |
| 2005 |
| 33 | EE | Anas Abou El Kalam,
Yves Deswarte:
Privacy Requirements Implemented with a JavaCard.
ACSAC 2005: 527-536 |
| 32 | EE | Carlos Aguilar Melchor,
Yves Deswarte:
pMIX: Untraceability for Small Hiding Groups.
NCA 2005: 29-40 |
| 2004 |
| 31 | | Yves Deswarte,
Frédéric Cuppens,
Sushil Jajodia,
Lingyu Wang:
Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France
Kluwer 2004 |
| 30 | | Yves Deswarte,
Frédéric Cuppens,
Sushil Jajodia,
Lingyu Wang:
Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France
Kluwer 2004 |
| 29 | | Jean-Jacques Quisquater,
Pierre Paradinas,
Yves Deswarte,
Anas Abou El Kalam:
Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8/WG8.8 & TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France
Kluwer 2004 |
| 28 | | Anas Abou El Kalam,
Yves Deswarte,
Gilles Trouessin,
Emmanuel Cordonnier:
Smartcard-based Anonymization.
CARDIS 2004: 49-66 |
| 27 | | Yves Deswarte,
David Powell:
Intrusion tolerance for Internet applications.
IFIP Congress Topical Sessions 2004: 241-256 |
| 26 | EE | Yves Deswarte,
David Powell:
Intrusion Tolerance for Internet Applications.
NCA 2004: 35-36 |
| 25 | EE | Anas Abou El Kalam,
Yves Deswarte,
Gilles Trouessin,
Emmanuel Cordonnier:
A generic approach for healthcare data anonymization.
WPES 2004: 31-32 |
| 24 | | Yves Deswarte,
Anas Abou El Kalam:
Modèle de sécurité pour le secteur de la santé.
Technique et Science Informatiques 23(3): 291-321 (2004) |
| 2003 |
| 23 | EE | Alfonso Valdes,
Magnus Almgren,
Steven Cheung,
Yves Deswarte,
Bruno Dutertre,
Joshua Levy,
Hassen Saïdi,
Victoria Stavridou,
Tomás E. Uribe:
Dependable Intrusion Tolerance: Technology Demo.
DISCEX (2) 2003: 128-130 |
| 22 | EE | Anas Abou El Kalam,
Salem Benferhat,
Alexandre Miège,
Rania El Baida,
Frédéric Cuppens,
Claire Saurel,
Philippe Balbiani,
Yves Deswarte,
Gilles Trouessin:
Organization based access contro.
POLICY 2003: 120- |
| 21 | | Anas Abou El Kalam,
Yves Deswarte:
Security Model for Health Care Computing and Communication Systems.
SEC 2003: 277-288 |
| 2002 |
| 20 | EE | Alfonso Valdes,
Magnus Almgren,
Steven Cheung,
Yves Deswarte,
Bruno Dutertre,
Joshua Levy,
Hassen Saïdi,
Victoria Stavridou,
Tomás E. Uribe:
An Architecture for an Adaptive Intrusion-Tolerant Server.
Security Protocols Workshop 2002: 158-178 |
| 2001 |
| 19 | EE | Yves Deswarte,
Noreddine Abghour,
Vincent Nicomette,
David Powell:
An Internet Authorization Scheme Using Smart-Card-Based Security Kernels.
E-smart 2001: 71-82 |
| 2000 |
| 18 | | Frédéric Cuppens,
Yves Deswarte,
Dieter Gollmann,
Michael Waidner:
Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings
Springer 2000 |
| 1999 |
| 17 | EE | Yves Deswarte,
Mohamed Kaâniche,
Pierre Corneillie,
John Goodson:
SQUALE Dependability Assessment Criteria.
SAFECOMP 1999: 27-38 |
| 16 | EE | Rodolphe Ortalo,
Yves Deswarte,
Mohamed Kaâniche:
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security.
IEEE Trans. Software Eng. 25(5): 633-650 (1999) |
| 1998 |
| 15 | | Jean-Jacques Quisquater,
Yves Deswarte,
Catherine Meadows,
Dieter Gollmann:
Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings
Springer 1998 |
| 14 | | Eric Totel,
Jean-Paul Blanquart,
Yves Deswarte,
David Powell:
Supporting Multiple Levels of Criticality.
FTCS 1998: 70-79 |
| 1997 |
| 13 | EE | Yves Deswarte:
Internet Security Despite Untrustworthy Agents and Components.
FTDCS 1997: 218-219 |
| 12 | EE | Vincent Nicomette,
Yves Deswarte:
An Authorization Scheme For Distributed Object Systems.
IEEE Symposium on Security and Privacy 1997: 21-30 |
| 1996 |
| 11 | | Vincent Nicomette,
Yves Deswarte:
Symbolic Rights and Vouchers for Access Control in Distributed Object Systems.
ASIAN 1996: 192-203 |
| 10 | EE | Vincent Nicomette,
Yves Deswarte:
A Multilevel Security Model for Distributed Object Systems.
ESORICS 1996: 80-98 |
| 9 | | Marc Dacier,
Yves Deswarte,
Mohamed Kaâniche:
Models and tools for quantitative assessment of operational security.
SEC 1996: 177-186 |
| 1994 |
| 8 | | Jean-Charles Fabre,
Yves Deswarte,
Brian Randell:
Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach.
EDCC 1994: 21-38 |
| 7 | EE | Marc Dacier,
Yves Deswarte:
Privilege Graph: an Extension to the Typed Access Matrix Model.
ESORICS 1994: 319-334 |
| 1992 |
| 6 | | Yves Deswarte,
Gérard Eizenberg,
Jean-Jacques Quisquater:
Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings
Springer 1992 |
| 1991 |
| 5 | | Yves Deswarte,
Laurent Blain,
Jean-Charles Fabre:
Intrusion Tolerance in Distributed Computing Systems.
IEEE Symposium on Security and Privacy 1991: 110-121 |
| 1990 |
| 4 | | Laurent Blain,
Yves Deswarte:
An Intrusion-Tolerant Security Server for an Open Distributed System.
ESORICS 1990: 97-104 |
| 1986 |
| 3 | | J.-M. Fray,
Yves Deswarte,
David Powell:
Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering.
IEEE Symposium on Security and Privacy 1986: 194-203 |
| 2 | | Yves Deswarte,
Jean-Charles Fabre,
Jean-Claude Laprie,
David Powell:
A Saturation Network to Tolerate Faults and Intrusions.
Symposium on Reliability in Distributed Software and Database Systems 1986: 74-81 |
| 1982 |
| 1 | | J. Abadir,
Yves Deswarte:
Run-Time Program for Self-Checking Single Board Computer.
ITC 1982: 205-213 |