Jérémy Briffaut

According to our database1, Jérémy Briffaut authored at least 26 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Bridging The Gap: Data Exfiltration In Highly Secured Environments Using Bluetooth IoTs.
Proceedings of the 37th IEEE International Conference on Computer Design, 2019

Extending Atomic Cross-Chain Swaps.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019

2015
Enforcing Security and Assurance Properties in Cloud Environment.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015

An Autonomic Cloud Management System for Enforcing Security and Assurance Properties.
Proceedings of the 2015 Workshop on Changing Landscapes in HPC Security, 2015

2014
An advanced security-aware Cloud architecture.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

An autonomous Cloud management system for in-depth security.
Proceedings of the 3rd IEEE International Conference on Cloud Networking, 2014

2013
Mandatory Access Control for the Android Dalvik Virtual Machine.
Proceedings of the 2013 Workshop on Embedded Self-Organizing Systems, 2013

Security Enhanced Java: Mandatory Access Control for the Java Virtual Machine.
Proceedings of the 16th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 2013

PIGA-cluster: A distributed architecture integrating a shared and resilient reference monitor to enforce mandatory access control in the HPC environment.
Proceedings of the International Conference on High Performance Computing & Simulation, 2013


2012
PIGA-Cloud : une protection obligatoire des environnements d'informatique en nuage.
Proceedings of the Ingénierie des protocoles et Nouvelles technologies de la répartition: sélection d'articles de CFIP/NOTERE 2012, 2012

MAC protection of the OpenNebula Cloud environment.
Proceedings of the 2012 International Conference on High Performance Computing & Simulation, 2012

Advanced MAC in HPC Systems: Performance Improvement.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

2011
PIGA-Virt: An Advanced Distributed MAC Protection of Virtual Systems.
Proceedings of the Euro-Par 2011: Parallel Processing Workshops - CCPI, CGWS, HeteroPar, HiBB, HPCVirt, HPPC, HPSS, MDGS, ProPer, Resilience, UCHPC, VHPC, Bordeaux, France, August 29, 2011

2010
Protection of a Shared HPC Cluster.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

A dynamic end-to-end security for coordinating multiple protections within a Linux desktop.
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010

2009
Security and Results of a Large-Scale High-Interaction Honeypot.
J. Comput., 2009

Enforcement of Security Properties for Dynamic MAC Policies.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Generation of Role Based Access Control Security Policies for Java Collaborative Applications.
Proceedings of the Third International Conference on Emerging Security Information, 2009

A new approach to enforce the security properties of a clustered high-interaction honeypot.
Proceedings of the 2009 International Conference on High Performance Computing & Simulation, 2009

2008
Team--Based MAC Policy over Security--Enhanced Linux.
Proceedings of the Second International Conference on Emerging Security Information, 2008

2007
Formalisation et garantie de propriétés de sécurité système : application à la détection d'intrusions. (Formalization and guaranty of system security properties : application to the detection of intrusions).
PhD thesis, 2007

2006
Distributed Control Enabling Consistent MAC Policies and IDS Based on a Meta-Policy Approach.
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

Collaboration between MAC Policies and IDS based on a Meta-Policy approach.
Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, 2006

A Collaborative Approach for Access Control, Intrusion Detection and Security Testing.
Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, 2006

2005
Intrusion detection and security policy framework for distributed environments.
Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005


  Loading...