Pierre Bieber

According to our database1, Pierre Bieber authored at least 26 papers between 1988 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Evaluation of a Resilience-Driven Operational Concept to Manage Drone Intrusions in Airports.
Inf., April, 2023

2019
Tiered Model-Based Safety Assessment.
Proceedings of the Model-Based Safety and Assessment - 6th International Symposium, 2019

2014
From Safety Models to Security Models: Preliminary Lessons Learnt.
Proceedings of the Computer Safety, Reliability, and Security, 2014

2012
An MDE-Based Synthesis of Aircraft Safety Models.
Proceedings of the Model and Data Engineering - 2nd International Conference, 2012

2011
DALculus - Theory and Tool for Development Assurance Level Allocation.
Proceedings of the Computer Safety, Reliability, and Security, 2011

2009
Preliminary design of future reconfigurable IMA platforms.
SIGBED Rev., 2009

2008
Vers la génération de modèles de sûreté de fonctionnement.
Proceedings of the Langages et Modèles à Objets, 2008

2005
Safe Allocation of Avionics Shared Resources.
Proceedings of the Ninth IEEE International Symposium on High Assurance Systems Engineering (HASE 2005), 2005

2004
Safety assessment with AltaRica - Lessons learnt based on two aircraft system studies.
Proceedings of the Building the Information Society, 2004

2002
Checking Secure Interactions of Smart Card Applets: Extended Version.
J. Comput. Secur., 2002

Combination of Fault Tree Analysis and Model Checking for Safety Assessment of Complex System.
Proceedings of the Dependable Computing, 2002

2000
The PACAP Prototype: A Tool for Detecting Java Card Illegal Flow.
Proceedings of the Java on Smart Cards: Programming and Security, 2000

Checking Secure Interactions of Smart Card Applets.
Proceedings of the Computer Security, 2000

Security Architecture for Federated Cooperative Information Systems.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
Electronic Purse Applet Certification: extended abstract.
Proceedings of the Workshop on Secure Architectures and Information Flow 1999, 1999

Design and Implementation of a Distributed Interactive Simulation Security Architecture.
Proceedings of the 3rd International Workshop on Distributed Interactive Simulation and Real-Time Applications (DIS-RT '99), 1999

Security Function Interactions.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999

1996
Formal Techniques for an ITSEC-E4 Secure Gateway.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

1994
Formal Development of Authentication Protocols.
Proceedings of the 6th Refinement Workshop, 1994

1993
Abstract Machines for Communication Security.
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993

1992
A Logical View of Secure Dependencies.
J. Comput. Secur., 1992

Secure Dependencies with Dynamic Level Assignments.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992

1991
A Definition of Secure Dependencies Using the Logic of Security.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

1990
Epistemic Verification of Cryptographic Protocols.
Proceedings of the ESORICS 90, 1990

A Logic of Communication in Hostile Environments.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990

1988
MOLOG: a Modal PROLOG.
Proceedings of the 9th International Conference on Automated Deduction, 1988


  Loading...