Christian Toinard

According to our database1, Christian Toinard authored at least 42 papers between 1992 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Towards a SaaS application providing an ethical support for human caregiving of people living at home.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

2021
A safe dynamic access control providing mandatory automotive cybersecurity.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2015
Enforcing Security and Assurance Properties in Cloud Environment.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

The Promethee Method for Cloud Brokering with Trust and Assurance Criteria.
Proceedings of the 2015 IEEE International Parallel and Distributed Processing Symposium Workshop, 2015

Microarchitecture-Aware Virtual Machine Placement under Information Leakage Constraints.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
An advanced security-aware Cloud architecture.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

An autonomous Cloud management system for in-depth security.
Proceedings of the 3rd IEEE International Conference on Cloud Networking, 2014

2013
Mandatory Access Control for the Android Dalvik Virtual Machine.
Proceedings of the 2013 Workshop on Embedded Self-Organizing Systems, 2013

Security Enhanced Java: Mandatory Access Control for the Java Virtual Machine.
Proceedings of the 16th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2013

PIGA-cluster: A distributed architecture integrating a shared and resilient reference monitor to enforce mandatory access control in the HPC environment.
Proceedings of the International Conference on High Performance Computing & Simulation, 2013


Definition of Security Metrics for the Cloud Computing and Security-Aware Virtual Machine Placement Algorithms.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

2012
PIGA-Cloud : une protection obligatoire des environnements d'informatique en nuage.
Proceedings of the Ingénierie des protocoles et Nouvelles technologies de la répartition: sélection d'articles de CFIP/NOTERE 2012, 2012

MAC protection of the OpenNebula Cloud environment.
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012

Advanced MAC in HPC Systems: Performance Improvement.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

Advanced Protection of Workflow Sessions with SEWebSession.
Proceedings of the Business Process Management Workshops, 2012

2011
PIGA-Virt: An Advanced Distributed MAC Protection of Virtual Systems.
Proceedings of the Euro-Par 2011: Parallel Processing Workshops - CCPI, CGWS, HeteroPar, HiBB, HPCVirt, HPPC, HPSS, MDGS, ProPer, Resilience, UCHPC, VHPC, Bordeaux, France, August 29, 2011

2010
From a Generic Framework for Expressing Integrity Properties to a Dynamic mac Enforcement for Operating Systems.
Trans. Comput. Sci., 2010

Security properties in an open peer-to-peer network
CoRR, 2010

An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OS.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Protection of a Shared HPC Cluster.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

A dynamic end-to-end security for coordinating multiple protections within a Linux desktop.
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010

2009
Security and Results of a Large-Scale High-Interaction Honeypot.
J. Comput., 2009

Classification of Malicious Distributed SELinux Activities.
J. Comput., 2009

Enforcement of Security Properties for Dynamic MAC Policies.
Proceedings of the Third International Conference on Emerging Security Information, 2009

A new approach to enforce the security properties of a clustered high-interaction honeypot.
Proceedings of the 2009 International Conference on High Performance Computing & Simulation, 2009

Authorisation session management in on-demand resource provisioning in collaborative applications.
Proceedings of the 2009 International Symposium on Collaborative Technologies and Systems, 2009

2008
Automation of the Volumetric Models Construction.
Proceedings of the Heterogeneous Objects Modelling and Applications, 2008

2006
Distributed Control Enabling Consistent MAC Policies and IDS Based on a Meta-Policy Approach.
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

Collaboration between MAC Policies and IDS based on a Meta-Policy approach.
Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, 2006

A Collaborative Approach for Access Control, Intrusion Detection and Security Testing.
Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, 2006

2005
Evolutionary Computation Approaches for Shape Modelling and Fitting.
Proceedings of the Progress in Artificial Intelligence, 2005

Intrusion detection and security policy framework for distributed environments.
Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005

2004
3D Shape Reconstruction of Template Models Using Genetic Algorithms.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

Usage of a Formal Result to Design a Causally and Totally Ordered Multicast Protocol.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2002
Collaborative Simulation by Reuse of COTS Simulators with a Reflexive XML Middleware1.
Proceedings of the Advances in Object-Oriented Information Systems, 2002

2001
Collaborative Learning with the Distributed Building Site Metaphor.
IEEE Multim., 2001

2000
An internet based architecture satisfying the distributed building site metaphor.
Proceedings of the Challenges of Information Technology Management in the 21st Century, 2000

1999
A Formal Method to Prove Ordering Properties of Multicast Systems.
ACM SIGOPS Oper. Syst. Rev., 1999

1998
Virtual World Objects for Real-Time Cooperative Design.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

1997
An Object Communication Architecture for Real-Time Distributed Process Control.
Proceedings of the Object-Oriented Technology, ECOOP'97 Workshop Reader, 1997

1992
A New Way to Design Causally and Totally Ordered Multicast Protocols.
ACM SIGOPS Oper. Syst. Rev., 1992


  Loading...