Daniel Le Métayer

According to our database1, Daniel Le Métayer authored at least 106 papers between 1985 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Beyond explainability: justifiability and contestability of algorithmic decision systems.
AI Soc., 2022

2021
A framework to contest and justify algorithmic decisions.
AI Ethics, 2021

2020
DESIRE: A Third Way for a European Exposure Notification System Leveraging the best of centralized and decentralized systems.
CoRR, 2020

A Multi-layered Approach for Tailored Black-Box Explanations.
Proceedings of the Pattern Recognition. ICPR International Workshops and Challenges, 2020

A Generic Framework for Black-box Explanations.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Position Paper: Analyzing the Impacts of Facial Recognition.
Proceedings of the Privacy Technologies and Policy - 8th Annual Privacy Forum, 2020

2019
UPRISE-IoT: User-Centric Privacy & Security in the IoT.
Proceedings of the Security and Privacy in the Internet of Things: Challenges and Solutions, 2019

Analysis of Privacy Policies to Enhance Informed Consent (Extended Version).
CoRR, 2019

A Generic Information and Consent Framework for the IoT.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Analysis of Privacy Policies to Enhance Informed Consent.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

2018
Biometric Systems Private by Design: Reasoning about privacy properties of biometric system architectures.
Trans. Data Priv., 2018

Algorithmic Decision Systems in the Health and Justice Sectors: Certification and Explanations for Algorithms in European and French Law.
Eur. J. Law Technol., 2018

Privacy Risk Analysis to Enable Informed Privacy Settings.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

Enhancing Transparency and Consent in the IoT.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

Capacity: an Abstract Model of Control over Personal Data.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Interdisciplinarity in practice: Challenges and benefits for privacy research.
Comput. Law Secur. Rev., 2017

A Refinement Approach for the Reuse of Privacy Risk Analysis Results.
Proceedings of the Privacy Technologies and Policy - 5th Annual Privacy Forum, 2017

2016
Privacy Risk Analysis
Synthesis Lectures on Information Security, Privacy, & Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02349-1, 2016

Privacy Harm Analysis: A Case Study on Smart Grids.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

PRIAM: A Privacy Risk Analysis Methodology.
Proceedings of the Data Privacy Management and Security Assurance, 2016

Reasoning About Privacy Properties of Architectures Supporting Group Authentication and Application to Biometric Systems.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

2015
A general framework for blaming in component-based systems.
Sci. Comput. Program., 2015

The control over personal data: True remedy or fairy tale ?
CoRR, 2015

Privacy and Data Protection by Design - from policy to engineering.
CoRR, 2015

Body-worn cameras for police accountability: Opportunities and risks.
Comput. Law Secur. Rev., 2015

PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology.
Proceedings of the 2015 IEEE Symposium on Security and Privacy Workshops, 2015

Reasoning about Privacy Properties of Biometric Systems Architectures in the Presence of Information Leakage.
Proceedings of the Information Security - 18th International Conference, 2015

Trust Driven Strategies for Privacy by Design.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

A Guide to End-to-End Privacy Accountability.
Proceedings of the 1st IEEE/ACM International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, 2015

Privacy by Design in Practice: Reasoning about Privacy Properties of Biometric System Architectures.
Proceedings of the FM 2015: Formal Methods, 2015

Formal Verification of Privacy Properties in Electric Vehicle Charging.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

Formal Accountability for Biometric Surveillance: A Case Study.
Proceedings of the Privacy Technologies and Policy - Third Annual Privacy Forum, 2015

2014
Apport des méthodes formelles pour l'exploitation de logs informatiques dans un contexte contractuel.
Tech. Sci. Informatiques, 2014

Privacy Architectures: Reasoning about Data Minimisation and Integrity.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Log Analysis for Data Protection Accountability.
Proceedings of the FM 2014: Formal Methods, 2014

PRIPARE: A New Vision on Engineering Privacy and Security by Design.
Proceedings of the Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, 2014

Privacy by Design: From Technologies to Architectures - (Position Paper).
Proceedings of the Privacy Technologies and Policy - Second Annual Privacy Forum, 2014

2013
Log Design for Accountability.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

A General Trace-Based Framework of Logical Causality.
Proceedings of the Formal Aspects of Component Software - 10th International Symposium, 2013

Privacy by design: a formal framework for the analysis of architectural choices.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
From the Protection of Data to the Protection of Individuals: Extending the Application of Non-discrimination Principles.
Proceedings of the European Data Protection: In Good Health?, 2012

2011
Liability issues in software engineering: the use of formal methods to reduce legal uncertainties.
Commun. ACM, 2011

Formal Methods as a Link between Software Code and Legal Rules.
Proceedings of the Software Engineering and Formal Methods - 9th International Conference, 2011

Delegation of Obligations and Responsibility.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

FLAVOR: A Formal Language for a Posteriori Verification of Legal Rules.
Proceedings of the POLICY 2011, 2011

2010
Designing Log Architectures for Legal Evidence.
Proceedings of the 8th IEEE International Conference on Software Engineering and Formal Methods, 2010

A Formal Framework for Specifying and Analyzing Logs as Electronic Evidence.
Proceedings of the Formal Methods: Foundations and Applications, 2010

Causality Analysis in Contract Violation.
Proceedings of the Runtime Verification - First International Conference, 2010

Liability in software engineering: overview of the LISE approach and illustration on a case study.
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

Privacy by Design: A Matter of Choice.
Proceedings of the Data Protection in a Profiled World, 2010

2009
Automated consent through privacy agents: Legal requirements and technical architecture.
Comput. Law Secur. Rev., 2009

2008
ASTRA : A Security Analysis Method Based on Asset Tracking.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

A Formal Privacy Management Framework.
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008

2007
IT Security Analysis Best Practices and Formal Approaches.
Proceedings of the Foundations of Security Analysis and Design IV, 2007

2001
Model Checking Security Properties of Control Flow Graphs.
J. Comput. Secur., 2001

2000
Foreword.
Theor. Comput. Sci., 2000

Gamma and the Chemical Reaction Model: Fifteen Years After.
Proceedings of the Multiset Processing, 2000

Formalization and Verification of Coherence Protocols with the Gamma Framework.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 2000

Formal Methods in Practice: The Missing Links. A Perspective from the Security Area.
Proceedings of the Modeling and Verification of Parallel Processes, 4th Summer School, 2000

Formal Methods in Context: Security and Java Card.
Proceedings of the Java on Smart Cards: Programming and Security, 2000

1999
Dynamic Slicing: a generic analysis based on a natural semantics format.
J. Log. Comput., 1999

Verification of Control Flow based Security Properties.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

Verification by Testing for Recursive Program Schemes.
Proceedings of the Logic Programming Synthesis and Transformation, 1999

Consistency Checking for Multiple View Software Architectures.
Proceedings of the Software Engineering, 1999

1998
Describing Software Architecture Styles Using Graph Grammars.
IEEE Trans. Software Eng., 1998

Refining Multiset Tranformers.
Theor. Comput. Sci., 1998

Exploring the Software Development Trilogy.
IEEE Softw., 1998

Structured Gamma.
Sci. Comput. Program., 1998

Security and Dynamic Class Loading in Java: A Formalization.
Proceedings of the 1998 International Conference on Computer Languages, 1998

Coarse Grained Java Security Policies.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

1997
Program Analysis for Software Engineering: New Applications, New Requirements, New Tools.
ACM SIGPLAN Notices, 1997

Shape Types.
Proceedings of the Conference Record of POPL'97: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1997

CASTING: A Formally Based Software Test Generation Method.
Proceedings of the First IEEE International Conference on Formal Engineering Methods, 1997

1996
Proving the Correctness of Compiler Optimisations Based on a Global Analysis: A Study of Strictness Analysis.
J. Funct. Program., 1996

Structural Operational Semantics as a Basis for Static Program Analysis.
ACM Comput. Surv., 1996

Software Architecture Styles as Graph Grammars.
Proceedings of the Fourth ACM SIGSOFT Symposium on Foundations of Software Engineering, 1996

Type Checking for a Multiset Rewriting Language.
Proceedings of the Analysis and Verification of Multiple-Agent Languages, 1996

Static Detection of Pointer Errors: An Axiomatisation and a Checking Algorithm.
Proceedings of the Programming Languages and Systems, 1996

1995
Lazy Type Inference and Program Analysis.
Sci. Comput. Program., 1995

Proving Properties of Programs Defined over Recursive Data Structures.
Proceedings of the ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation, 1995

An approach to information security in distributed systems.
Proceedings of the 5th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 1995), 1995

1994
A Type-based Framework for Program Analysis.
Proceedings of the Static Analysis, First International Static Analysis Symposium, 1994

Deriving Algorithms From Type Inference Systems: Application to Strictness Analysis.
Proceedings of the Conference Record of POPL'94: 21st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1994

Compile-Time Detection of Information Flow in Sequential Programs.
Proceedings of the Computer Security, 1994

Lazy Type Inference for the Strictness Analysis of Lists.
Proceedings of the Programming Languages and Systems, 1994

Higher-Order Multiset Programming.
Proceedings of the Specification of Parallel Algorithms, 1994

1993
Programming by Multiset Transformation.
Commun. ACM, 1993

Proving the Correctness of Compiler Optimizations Based on Strictness Analysis.
Proceedings of the Programming Language Implementation and Logic Programming, 1993

A Parallel Programming Style and Its Algebra of Programs.
Proceedings of the PARLE '93, 1993

1992
Continuation-Based Compilation of Functional Languages for Parallel Machines.
Math. Struct. Comput. Sci., 1992

Transformation of Gamma Programs.
Proceedings of the Actes WSA'92 Workshop on Static Analysis (Bordeaux, 1992

A Calculus of Gamma Programs.
Proceedings of the Languages and Compilers for Parallel Computing, 1992

1991
Compilation of Functional Languages by Program Transformation.
ACM Trans. Program. Lang. Syst., 1991

The Chemical Reaction Model.
Proceedings of the Research Directions in High-Level Parallel Programming Languages, 1991

Introduction to Gamma.
Proceedings of the Research Directions in High-Level Parallel Programming Languages, 1991

Prospects for functional programming in software engineering.
Research reports ESPRIT / project 302 1, Springer, ISBN: 978-3-540-53852-3, 1991

1990
The GAMMA Model and Its Discipline of Programming.
Sci. Comput. Program., 1990

Continuation-Based Parallel Implementation of Functional Programming Languages.
Proceedings of the 1990 ACM Conference on LISP and Functional Programming, 1990

1989
Compilation of Lambda-Calculus into Functional Machine Code.
Proceedings of the TAPSOFT'89: Proceedings of the International Joint Conference on Theory and Practice of Software Development, 1989

Computer-Time Garbage Collection by Sharing Analysis.
Proceedings of the fourth international conference on Functional programming languages and computer architecture, 1989

A New Method for Strictness Analysis on Non-Flat Domains.
Proceedings of the Functional Programming, 1989

Chemical Reaction as a Computational Model.
Proceedings of the Functional Programming, 1989

1988
ACE: An Automatic Complexity Evaluator.
ACM Trans. Program. Lang. Syst., 1988

Parallel Machines for Multiset Transformation and their Programming Style / Parallele Maschinen für die Multimengen-Transformation und deren Programmierstil.
it Inf. Technol., 1988

A parallel machine for multiset transformation and its programming style.
Future Gener. Comput. Syst., 1988

1985
Mechanical analysis of program complexity.
Proceedings of the ACM SIGPLAN 85 Symposium on Language Issues in Programming Environments, 1985


  Loading...