dblp.uni-trier.dewww.uni-trier.de

Yves Deswarte

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
45EEAyda Saïdane, Vincent Nicomette, Yves Deswarte: The Design of a Generic Intrusion-Tolerant Architecture for Web Servers. IEEE Trans. Dependable Sec. Comput. 6(1): 45-58 (2009)
2008
44 Youssef Laarouchi, Yves Deswarte, David Powell, Jean Arlat: Safety and Security Architectures for Avionics. DCSOFT 2008: 46-52
43EEMohammed Gadelrab, Anas Abou El Kalam, Yves Deswarte: Execution Patterns in Automatic Malware and Human-Centric Attacks. NCA 2008: 29-36
42EEFrancesc Sebé, Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Yves Deswarte, Jean-Jacques Quisquater: Efficient Remote Data Possession Checking in Critical Information Infrastructures. IEEE Trans. Knowl. Data Eng. 20(8): 1034-1038 (2008)
2007
41EECarlos Aguilar Melchor, Yves Deswarte, Julien Iguchi-Cartigny: Closed-Circuit Unobservable Voice over IP. ACSAC 2007: 119-128
40EEAnas Abou El Kalam, Yves Deswarte, Amine Baïna, Mohamed Kaâniche: Access Control for Collaborative Systems: A Web Services Based Approach. ICWS 2007: 1064-1071
39EEMohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte: Defining categories to select representative attack test-cases. QoP 2007: 40-42
38EEPaulo Veríssimo, Nuno Ferreira Neves, Miguel Correia, Yves Deswarte, Anas Abou El Kalam, Andrea Bondavalli, Alessandro Daidone: The CRUTIAL Architecture for Critical Information Infrastructures. WADS 2007: 1-27
37EEMohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette: Empirical analysis and statistical modeling of attack processes based on honeypots CoRR abs/0704.0861: (2007)
2006
36EECarlos Aguilar Melchor, Yves Deswarte: From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications. NCA 2006: 163-172
35EECarlos Aguilar Melchor, Yves Deswarte: Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases. Privacy in Statistical Databases 2006: 257-265
34 Yves Deswarte, Carlos Aguilar Melchor: Current and future privacy enhancing technologies for the Internet. Annales des Télécommunications 61(3-4): 399-417 (2006)
2005
33EEAnas Abou El Kalam, Yves Deswarte: Privacy Requirements Implemented with a JavaCard. ACSAC 2005: 527-536
32EECarlos Aguilar Melchor, Yves Deswarte: pMIX: Untraceability for Small Hiding Groups. NCA 2005: 29-40
2004
31 Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France Kluwer 2004
30 Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France Kluwer 2004
29 Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, Anas Abou El Kalam: Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8/WG8.8 & TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France Kluwer 2004
28 Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier: Smartcard-based Anonymization. CARDIS 2004: 49-66
27 Yves Deswarte, David Powell: Intrusion tolerance for Internet applications. IFIP Congress Topical Sessions 2004: 241-256
26EEYves Deswarte, David Powell: Intrusion Tolerance for Internet Applications. NCA 2004: 35-36
25EEAnas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier: A generic approach for healthcare data anonymization. WPES 2004: 31-32
24 Yves Deswarte, Anas Abou El Kalam: Modèle de sécurité pour le secteur de la santé. Technique et Science Informatiques 23(3): 291-321 (2004)
2003
23EEAlfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe: Dependable Intrusion Tolerance: Technology Demo. DISCEX (2) 2003: 128-130
22EEAnas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida, Frédéric Cuppens, Claire Saurel, Philippe Balbiani, Yves Deswarte, Gilles Trouessin: Organization based access contro. POLICY 2003: 120-
21 Anas Abou El Kalam, Yves Deswarte: Security Model for Health Care Computing and Communication Systems. SEC 2003: 277-288
2002
20EEAlfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe: An Architecture for an Adaptive Intrusion-Tolerant Server. Security Protocols Workshop 2002: 158-178
2001
19EEYves Deswarte, Noreddine Abghour, Vincent Nicomette, David Powell: An Internet Authorization Scheme Using Smart-Card-Based Security Kernels. E-smart 2001: 71-82
2000
18 Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings Springer 2000
1999
17EEYves Deswarte, Mohamed Kaâniche, Pierre Corneillie, John Goodson: SQUALE Dependability Assessment Criteria. SAFECOMP 1999: 27-38
16EERodolphe Ortalo, Yves Deswarte, Mohamed Kaâniche: Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. IEEE Trans. Software Eng. 25(5): 633-650 (1999)
1998
15 Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings Springer 1998
14 Eric Totel, Jean-Paul Blanquart, Yves Deswarte, David Powell: Supporting Multiple Levels of Criticality. FTCS 1998: 70-79
1997
13EEYves Deswarte: Internet Security Despite Untrustworthy Agents and Components. FTDCS 1997: 218-219
12EEVincent Nicomette, Yves Deswarte: An Authorization Scheme For Distributed Object Systems. IEEE Symposium on Security and Privacy 1997: 21-30
1996
11 Vincent Nicomette, Yves Deswarte: Symbolic Rights and Vouchers for Access Control in Distributed Object Systems. ASIAN 1996: 192-203
10EEVincent Nicomette, Yves Deswarte: A Multilevel Security Model for Distributed Object Systems. ESORICS 1996: 80-98
9 Marc Dacier, Yves Deswarte, Mohamed Kaâniche: Models and tools for quantitative assessment of operational security. SEC 1996: 177-186
1994
8 Jean-Charles Fabre, Yves Deswarte, Brian Randell: Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach. EDCC 1994: 21-38
7EEMarc Dacier, Yves Deswarte: Privilege Graph: an Extension to the Typed Access Matrix Model. ESORICS 1994: 319-334
1992
6 Yves Deswarte, Gérard Eizenberg, Jean-Jacques Quisquater: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings Springer 1992
1991
5 Yves Deswarte, Laurent Blain, Jean-Charles Fabre: Intrusion Tolerance in Distributed Computing Systems. IEEE Symposium on Security and Privacy 1991: 110-121
1990
4 Laurent Blain, Yves Deswarte: An Intrusion-Tolerant Security Server for an Open Distributed System. ESORICS 1990: 97-104
1986
3 J.-M. Fray, Yves Deswarte, David Powell: Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering. IEEE Symposium on Security and Privacy 1986: 194-203
2 Yves Deswarte, Jean-Charles Fabre, Jean-Claude Laprie, David Powell: A Saturation Network to Tolerate Faults and Intrusions. Symposium on Reliability in Distributed Software and Database Systems 1986: 74-81
1982
1 J. Abadir, Yves Deswarte: Run-Time Program for Self-Checking Single Board Computer. ITC 1982: 205-213

Coauthor Index

1J. Abadir [1]
2Noreddine Abghour [19]
3Eric Alata [37]
4Magnus Almgren [20] [23]
5Jean Arlat [44]
6Rania El Baida [22]
7Amine Baïna [40]
8Philippe Balbiani [22]
9Salem Benferhat [22]
10Laurent Blain [4] [5]
11Jean-Paul Blanquart [14]
12Andrea Bondavalli [38]
13Steven Cheung [20] [23]
14Emmanuel Cordonnier [25] [28]
15Pierre Corneillie [17]
16Miguel Correia [38]
17Frédéric Cuppens [18] [22] [30] [31]
18Marc Dacier [7] [9] [37]
19Alessandro Daidone [38]
20Josep Domingo-Ferrer [42]
21Bruno Dutertre [20] [23]
22Gérard Eizenberg [6]
23Jean-Charles Fabre [2] [5] [8]
24J.-M. Fray [3]
25Mohammed Gadelrab [43]
26Mohammed S. Gadelrab [39]
27Dieter Gollmann [15] [18]
28John Goodson [17]
29Julien Iguchi-Cartigny (Julien Cartigny) [41]
30Sushil Jajodia [30] [31]
31Mohamed Kaâniche [9] [16] [17] [37] [40]
32Anas Abou El Kalam [21] [22] [24] [25] [28] [29] [33] [38] [39] [40] [43]
33Youssef Laarouchi [44]
34Jean-Claude Laprie [2]
35Joshua Levy [20] [23]
36Antoni Martínez-Ballesté [42]
37Catherine Meadows [15]
38Carlos Aguilar Melchor [32] [34] [35] [36] [41]
39Alexandre Miège [22]
40Nuno Ferreira Neves [38]
41Vincent Nicomette [10] [11] [12] [19] [37] [45]
42Rodolphe Ortalo [16]
43Pierre Paradinas [29]
44David Powell [2] [3] [14] [19] [26] [27] [44]
45Jean-Jacques Quisquater [6] [15] [29] [42]
46Brian Randell [8]
47Ayda Saïdane [45]
48Hassen Saïdi [20] [23]
49Claire Saurel [22]
50Francesc Sebé [42]
51Victoria Stavridou [20] [23]
52Eric Totel [14]
53Gilles Trouessin [22] [25] [28]
54Tomás E. Uribe [20] [23]
55Alfonso Valdes [20] [23]
56Paulo Veríssimo [38]
57Michael Waidner [18]
58Lingyu Wang [30] [31]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)