Laurent Bussard

According to our database1, Laurent Bussard authored at least 21 papers between 2002 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Secondary Use Regulations.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Abstract Privacy Policy Framework: Addressing Privacy Problems in SOA.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011

Privacy for Service Oriented Architectures.
Proceedings of the Privacy and Identity Management for Life, 2011

Matching Privacy Policies and Preferences: Access Control, Obligations, Authorisations, and Downstream Usage.
Proceedings of the Privacy and Identity Management for Life, 2011

Downstream Usage Control.
Proceedings of the POLICY 2010, 2010

A Practical Generic Privacy Language.
Proceedings of the Information Systems Security - 6th International Conference, 2010

Obligation Language and Framework to Enable Privacy-Aware SOA.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

An Approach to Identity Management for Service Centric Systems.
Proceedings of the Towards a Service-Based Internet, 2008

An Infrastructure for Gaining Trust in Context Information.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Context-Aware Access Control; Making Access Control Decisions Based on Context Information.
Proceedings of the 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, 2006

Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Secure mobile business applications - framework, architecture and implementation.
Inf. Secur. Tech. Rep., 2004

Establishing Trust with Privacy.
Proceedings of the Security Protocols, 2004

Establishing Trust with Privacy (Transcript of Discussion).
Proceedings of the Security Protocols, 2004

Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension.
Proceedings of the 2004 Symposium on Applications and the Internet Workshops (SAINT 2004 Workshops), 2004

Untraceable Secret Credentials: Trust Establishment with Privacy.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

One-Time Capabilities for Authorizations without Trust.
Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), 2004

History-Based Signature or How to Trust Anonymous Documents.
Proceedings of the Trust Management, Second International Conference, 2004

Embedding Distance-Bounding Protocols within Intuitive Interactions.
Proceedings of the Security in Pervasive Computing, 2003

Trust and Authorization in Pervasive B2E Scenarios.
Proceedings of the Information Security, 6th International Conference, 2003

Extending Tamper-Proof Hardware Security to Untrusted Execution Environments.
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002