Yves Deswarte

Orcid: 0000-0002-3742-8612

According to our database1, Yves Deswarte authored at least 70 papers between 1982 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
A model-driven approach for experimental evaluation of intrusion detection systems.
Secur. Commun. Networks, 2014

A Tool to Analyze Potential I/O Attacks against PCs.
IEEE Secur. Priv., 2014

2013
Security of embedded automotive networks: state of the art and a research proposal.
Proceedings of the SAFECOMP 2013, 2013

Low-Level Attacks on Avionics Embedded Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2013

Survey on security threats and protection mechanisms in embedded automotive networks.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

2012
Potential Attacks on Onboard Aerospace Systems.
IEEE Secur. Priv., 2012

The Challenges Raised by the Privacy-Preserving Identity Card.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

AMORES: an architecture for mobiquitous resilient systems.
Proceedings of the 1st European Workshop on AppRoaches to MObiquitous Resilience, 2012

2011
Further Privacy Mechanisms.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Enforcing kernel constraints by hardware-assisted virtualization.
J. Comput. Virol., 2011

Intrusion-tolerant fine-grained authorization for Internet applications.
J. Syst. Archit., 2011

Protecting Critical Infrastructures While Preserving Each Organization's Autonomy.
Proceedings of the Distributed Computing and Internet Technology, 2011

I/O Attacks in Intel PC-based Architectures and Countermeasures.
Proceedings of the First SysSec Workshop 2011, 2011

Tolerance of Design Faults.
Proceedings of the Dependable and Historic Computing, 2011

2010
A Proposal for a Privacy-preserving National Identity Card.
Trans. Data Priv., 2010

Exploiting an I/OMMU vulnerability.
Proceedings of the 5th International Conference on Malicious and Unwanted Software, 2010

2009
The Design of a Generic Intrusion-Tolerant Architecture for Web Servers.
IEEE Trans. Dependable Secur. Comput., 2009

Trustable Relays for Anonymous Communication.
Trans. Data Priv., 2009

PolyOrBAC: A security framework for Critical Infrastructures.
Int. J. Crit. Infrastructure Prot., 2009

Enhancing dependability in avionics using virtualization.
Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems, 2009

Towards a Privacy-Preserving National Identity Card.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

Manipulation of Network Traffic Traces for Security Evaluation.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Efficient Remote Data Possession Checking in Critical Information Infrastructures.
IEEE Trans. Knowl. Data Eng., 2008

Execution Patterns in Automatic Malware and Human-Centric Attacks.
Proceedings of The Seventh IEEE International Symposium on Networking Computing and Applications, 2008

Collaborative Access Control For Critical Infrastructures.
Proceedings of the Critical Infrastructure Protection II, 2008

Safety and Security Architectures for Avionics.
Proceedings of the DCSOFT 2008, 2008

Critical Infrastructures Security Modeling, Enforcement and Runtime Checking.
Proceedings of the Critical Information Infrastructure Security, 2008

Access control for cooperative systems: A comparative analysis.
Proceedings of the CRiSIS '08, 2008

2007
Empirical analysis and statistical modeling of attack processes based on honeypots
CoRR, 2007

Access Control for Collaborative Systems: A Web Services Based Approach.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

The CRUTIAL Architecture for Critical Information Infrastructures.
Proceedings of the Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], 2007

Defining categories to select representative attack test-cases.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

Closed-Circuit Unobservable Voice over IP.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Collection and analysis of attack data based on honeypots deployed on the Internet.
Proceedings of the Quality of Protection - Security Measurements and Metrics, 2006

Internet Security: An Intrusion-Tolerance Approach.
Proc. IEEE, 2006

Intrusion-tolerant middleware: the road to automatic security.
IEEE Secur. Priv., 2006

Current and future privacy enhancing technologies for the Internet.
Ann. des Télécommunications, 2006

Le projet européen PRIME: protection de la vie privée et gestion des identités pour l'Europe.
Ann. des Télécommunications, 2006

Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases.
Proceedings of the Privacy in Statistical Databases, 2006

From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications.
Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, 2006

2005
pMIX: Untraceability for Small Hiding Groups.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005

Personal data anonymization for security and privacy in collaborative environments.
Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005

Privacy Requirements Implemented with a JavaCard.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Modèle de sécurité pour le secteur de la santé.
Tech. Sci. Informatiques, 2004

A generic approach for healthcare data anonymization.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

Intrusion Tolerance for Internet Applications.
Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August, 2004

Smartcard-based Anonymization.
Proceedings of the Smart Card Research and Advanced Applications VI, 2004

2003
Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003

Security Model for Health Care Computing and Communication Systems.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Organization based access contro.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

Dependable Intrusion Tolerance: Technology Demo.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

An intrusion tolerant architecture for dynamic content internet servers.
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003

2002
An Architecture for an Adaptive Intrusion-Tolerant Server.
Proceedings of the Security Protocols, 2002

2001
An Internet Authorization Scheme Using Smart-Card-Based Security Kernels.
Proceedings of the Smart Card Programming and Security, 2001

1999
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security.
IEEE Trans. Software Eng., 1999

SQUALE Dependability Assessment Criteria.
Proceedings of the Computer Safety, 1999

1998
Supporting Multiple Levels of Criticality.
Proceedings of the Digest of Papers: FTCS-28, 1998

1997
An Authorization Scheme For Distributed Object Systems.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

Internet Security Despite Untrustworthy Agents and Components.
Proceedings of the 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 1997

1996
Models and tools for quantitative assessment of operational security.
Proceedings of the Information Systems Security, 1996

A Multilevel Security Model for Distributed Object Systems.
Proceedings of the Computer Security, 1996

Symbolic Rights and Vouchers for Access Control in Distributed Object Systems.
Proceedings of the Concurrency and Parallelism, 1996

1994
Privilege Graph: an Extension to the Typed Access Matrix Model.
Proceedings of the Computer Security, 1994

Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach.
Proceedings of the Dependable Computing, 1994

1991
Intrusion Tolerance in Distributed Computing Systems.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

1990
An Intrusion-Tolerant Security Server for an Open Distributed System.
Proceedings of the ESORICS 90, 1990

1988
Saturation: reduced idleness for improved fault-tolerance.
Proceedings of the Eighteenth International Symposium on Fault-Tolerant Computing, 1988

1986
A Saturation Network to Tolerate Faults and Intrusions.
Proceedings of the Fifth Symposium on Reliability in Distributed Software and Database Systems, 1986

Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986

1982
Run-Time Program for Self-Checking Single Board Computer.
Proceedings of the Proceedings International Test Conference 1982, 1982


  Loading...