Yves Roudier

According to our database1, Yves Roudier authored at least 63 papers between 1995 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Formal specification of security guidelines for program certification.
Proceedings of the 11th International Symposium on Theoretical Aspects of Software Engineering, 2017

Formal Specification and Verification of Security Guidelines.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Tracking Dependent Information Flows.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
A risk assessment model for selecting cloud service providers.
J. Cloud Comput., 2016

Security Guidelines: Requirements Engineering for Verifying Code Quality.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016

2015
On User Availability Prediction and Network Applications.
IEEE/ACM Trans. Netw., 2015

SysML-Sec - A Model Driven Approach for Designing Safe and Secure Systems.
Proceedings of the MODELSWARD 2015, 2015

Designing Safe and Secure Embedded and Cyber-Physical Systems with SysML-Sec.
Proceedings of the Model-Driven Engineering and Software Development, 2015

SysML-Sec Attack Graphs: Compact Representations for Complex Attacks.
Proceedings of the Graphical Models for Security - Second International Workshop, 2015

2014
Model the System from Adversary Viewpoint: Threats Identification and Modeling.
Proceedings of the Proceedings 2014 International Workshop on Advanced Intrusion Detection and Prevention, 2014

Towards the Model-Driven Engineering of Secure yet Safe Embedded Systems.
Proceedings of the Proceedings First International Workshop on Graphical Models for Security, 2014

A Cloud Adoption Risk Assessment Model.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

A Quantitative Analysis of Common Criteria Certification Practice.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

UAVs for humanitarian missions: Autonomy and reliability.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2014

Static Code Analysis for Software Security Verification: Problems and Approaches.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems.
Inf. Secur. Tech. Rep., 2013

Bringing Common Criteria Certification to Web Services.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Towards the model-driven engineering of security requirements for embedded systems.
Proceedings of the International Workshop on Model-Driven Requirements Engineering, 2013

Reference Monitors for Security and Interoperability in OAuth 2.0.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

2012
Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols.
Peer-to-Peer Netw. Appl., 2012

HiPoLDS: A Security Policy Language for Distributed Systems.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

Effective and Efficient Security Policy Engines for Automotive On-Board Networks.
Proceedings of the Communication Technologies for Vehicles - 4th International Workshop, 2012

Enabling Message Security for RESTful Services.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

2011
Car2X Communication: Securing the Last Meter - A Cost-Effective Approach for Ensuring Trust in Car2X Applications Using In-Vehicle Symmetric Cryptography.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

A Formal Methodology Applied to Secure Over-the-Air Automotive Applications.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates.
Proceedings of the Communication Technologies for Vehicles - Third International Workshop, 2011

Evolving Security Requirements in Multi-layered Service-Oriented-Architectures.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

2010
Secure P2P Data Storage and Maintenance.
Int. J. Digit. Multim. Broadcast., 2010

Back To The Future: On Predicting User Uptime
CoRR, 2010

Password Strength: An Empirical Analysis.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Securing P2P Storage with a Self-organizing Payment Scheme.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

2009
Measuring Password Strength: An Empirical Analysis
CoRR, 2009

A Game Theoretical Approach in Securing P2P Storage against Whitewashers.
Proceedings of the 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2009

Document-Based Dynamic Workflows: Towards Flexible and Stateful Services.
Proceedings of the 2009 IEEE World Congress on Services, Part II, 2009

Ontology-Based Secure XML Content Distribution.
Proceedings of the Emerging Challenges for Security, 2009

A Secure Comparison Technique for Tree Structured Data.
Proceedings of the Fourth International Conference on Internet and Web Applications and Services, 2009

Towards Secure Content Based Dissemination of XML Documents.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Reputation and Audits for Self-Organizing Storage.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

A Security Protocol for Self-Organizing Data Storage.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Security and privacy issues in middleware for emergency and rescue applications.
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008

Validating Peer-to-Peer Storage Audits with Evolutionary Game Theory.
Proceedings of the Self-Organizing Systems, Third International Workshop, 2008

On the Impact of DoS Attacks on Secure Service Discovery.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Distributed Access Control For XML Document Centric Collaborations.
Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008

2007
Securing Ad Hoc Storage through Probabilistic Cooperation Assessment.
Proceedings of theThird Workshop on Cryptography for Ad-hoc Networks, 2007

A Game Theoretic Model of a Protocol for Data Possession Verification.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Secure Service Publishing with Untrusted Registries - Securing Service Discovery.
Proceedings of the SECRYPT 2007, 2007

Context-Aware Security Policy for the Service Discovery.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Enabling Secure Discovery in a Pervasive Environment.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing.
Proceedings of the Fourth IEEE European Conference on Web Services (ECOWS 2006), 2006

2005
SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005

2004
Secure mobile business applications - framework, architecture and implementation.
Inf. Secur. Tech. Rep., 2004

Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension.
Proceedings of the 2004 Symposium on Applications and the Internet Workshops (SAINT 2004 Workshops), 2004

Untraceable Secret Credentials: Trust Establishment with Privacy.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

Collaborative backup for dependable mobile applications.
Proceedings of the 2nd Workshop on Middleware for Pervasive and Ad-hoc Computing, 2004

History-Based Signature or How to Trust Anonymous Documents.
Proceedings of the Trust Management, Second International Conference, 2004

2003
Embedding Distance-Bounding Protocols within Intuitive Interactions.
Proceedings of the Security in Pervasive Computing, 2003

Trust and Authorization in Pervasive B2E Scenarios.
Proceedings of the Information Security, 6th International Conference, 2003

2002
Enabling adaptive and secure extranets.
Proceedings of the Advanced Communications and Multimedia Security, 2002

Extending Tamper-Proof Hardware Security to Untrusted Execution Environments.
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002

2000
A Distributed Access Control Model for Java.
Proceedings of the Computer Security, 2000

1997
The Extensible Java Preprocessor Kit and a Tiny Data-Parallel Java.
Proceedings of the Scientific Computing in Object-Oriented Parallel Environments, 1997

1996
Parallel Object-Oriented Programming for Parallel Simulations.
Inf. Sci., 1996

1995
Reactive Programming in Eiffel//.
Proceedings of the Object-Based Parallel and Distributed Computation, 1995


  Loading...