Thierry Sans

According to our database1, Thierry Sans authored at least 16 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Decentralized Mnemonic Backup System for Non-custodial Cryptocurrency Wallets.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

2014
Substructural Meta-Theory of a Type-Safe Language for Web Programming.
Fundam. Informaticae, 2014

2013
Controlling Data Flow with a Policy-Based Programming Language for the Web.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

2011
Getting CS undergraduates to communicate effectively.
Proceedings of the 16th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2011

2010
QWeS2T for Type-Safe Web Programming.
Proceedings of the 3rd International Workshop on Logics, Agents, and Mobility, 2010

2007
A Framework to Enforce Access Control, Usage Control and Obligations.
Ann. des Télécommunications, 2007

OPA: Onion Policy Administration Model - Another approach to manage rights in DRM.
Proceedings of the New Approaches for Security, 2007

XML-BB: A Model to Handle Relationships Protection in XML Documents.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Security policy compliance with violation management.
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007

2006
Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework.
Ann. des Télécommunications, 2006

A Flexible and Distributed Architecture to Enforce Dynamic Access Control.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

FORM : A Federated Rights Expression Model for Open DRM Frameworks.
Proceedings of the Advances in Computer Science, 2006

2005
Protection of Relationships in XML Documents with the XML-BB Model.
Proceedings of the Information Systems Security, First International Conference, 2005

Nomad: A Security Model with Non Atomic Actions and Deadlines.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

2004
A Formal Approach to Specify and Deploy a Network Security Policy.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

Selecting Appropriate Counter-Measures in an Intrusion Detection Framework.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004


  Loading...