Charles Morisset

According to our database1, Charles Morisset authored at least 50 papers between 2005 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Efficient Extended ABAC Evaluation.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

VisABAC: A Tool for Visualising ABAC Policies.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems.
CoRR, 2017

Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

Learning Decision Trees from Synthetic Data Models for Human Security Behaviour.
Proceedings of the Software Engineering and Formal Methods, 2017

ADaCS: A Tool for Analysing Data Collection Strategies.
Proceedings of the Computer Performance Engineering - 14th European Workshop, 2017

2016
Modeling and analysis of influence power for information security decisions.
Perform. Eval., 2016

WRAD: Tool Support for Workflow Resiliency Analysis and Design.
Proceedings of the Software Engineering for Resilient Systems - 8th International Workshop, 2016

2015
Probabilistic cost enforcement of security policies.
Journal of Computer Security, 2015

Resiliency Variance in Workflows with Choice.
Proceedings of the Software Engineering for Resilient Systems - 7th International Workshop, 2015

On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Impact of Policy Design on Workflow Resiliency Computation Time.
Proceedings of the Quantitative Evaluation of Systems, 12th International Conference, 2015

Modelling user availability in workflow resiliency analysis.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

2014
A Formal Model for Soft Enforcement: Influencing the Decision-Maker.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Monotonicity and Completeness in Attribute-Based Access Control.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Reduction of access control decisions.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Nudging for Quantitative Access Control Systems.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

Quantitative Workflow Resiliency.
Proceedings of the Computer Security - ESORICS 2014, 2014

A Decision Making Model of Influencing Behavior in Information Security.
Proceedings of the Computer Performance Engineering - 11th European Workshop, 2014

2013
A framework for automated and certified refinement steps.
ISSE, 2013

Automated Certification of Authorisation Policy Resistance.
CoRR, 2013

Probabilistic Cost Enforcement of Security Policies.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

Quantitative Evaluation of Enforcement Strategies - Position Paper.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

Automated Certification of Authorisation Policy Resistance.
Proceedings of the Computer Security - ESORICS 2013, 2013

Detection of attack strategies.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Implementing Access Control Markov Decision Processes with GLPK/GMPL
CoRR, 2012

Towards A Generic Formal Framework for Access Control Systems
CoRR, 2012

Cost-Aware Runtime Enforcement of Security Policies.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Subjective review-based reputation.
Proceedings of the ACM Symposium on Applied Computing, 2012

PTaCL: A Language for Attribute-Based Access Control in Open Systems.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

From Qualitative to Quantitative Enforcement of Security Policy.
Proceedings of the Computer Network Security, 2012

A Quantitative Approach for Inexact Enforcement of Security Policies.
Proceedings of the Information Security - 15th International Conference, 2012

Risk-based security decisions under uncertainty.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

Quantitative access control with partially-observable Markov decision processes.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
A Framework for Automated and Certified Refinement Steps
CoRR, 2011

PTaCL: A Language for Attribute-Based Access Control in Open Systems
CoRR, 2011

Risk-Based Auto-delegation for Probabilistic Availability.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

2010
Robustness testing for software components.
Sci. Comput. Program., 2010

State Based Robustness Testing for Components.
Electr. Notes Theor. Comput. Sci., 2010

An Auto-delegation Mechanism for Access Control Systems.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

A Graph-Based Implementation for Mechanized Refinement Calculus of OO Programs.
Proceedings of the Formal Methods: Foundations and Applications, 2010

2009
Design and Verification of Fault-Tolerant Components.
Proceedings of the Methods, 2009

rCOS: Theory and Tool for Component-Based Model Driven Development.
Proceedings of the Fundamentals of Software Engineering, 2009

Specification and Validation of Behavioural Protocols in the rCOS Modeler.
Proceedings of the Fundamentals of Software Engineering, 2009

2008
Un cadre sémantique pour le contrôle d'accès.
Technique et Science Informatiques, 2008

A Component-Based Access Control Monitor.
Proceedings of the Leveraging Applications of Formal Methods, 2008

A Formal Comparison of the Bell & LaPadula and RBAC Models.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Un moniteur de référence sr d'une base de données.
Technique et Science Informatiques, 2007

2005
Formalisation and implementation of Access control models.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005


  Loading...