|  | 2009 | 
|---|
| 49 |            | Mohammed Gadelrab,
Anas Abou El Kalam,
Yves Deswarte:
Manipulation of Network Traffic Traces for Security Evaluation.
AINA Workshops 2009: 1124-1129 | 
| 48 |            | Ayda Saïdane,
Vincent Nicomette,
Yves Deswarte:
The Design of a Generic Intrusion-Tolerant Architecture for Web Servers.
IEEE Trans. Dependable Sec. Comput. 6(1): 45-58 (2009) | 
| 47 |            | Carlos Aguilar Melchor,
Yves Deswarte:
Trustable Relays for Anonymous Communication.
Transactions on Data Privacy 2(2): 101-130 (2009) | 
|  | 2008 | 
|---|
| 46 |            | Anas Abou El Kalam,
Yves Deswarte:
Critical Infrastructures Security Modeling, Enforcement and Runtime Checking.
CRITIS 2008: 95-108 | 
| 45 |            | Youssef Laarouchi,
Yves Deswarte,
David Powell,
Jean Arlat:
Safety and Security Architectures for Avionics.
DCSOFT 2008: 46-52 | 
| 44 |            | Mohammed Gadelrab,
Anas Abou El Kalam,
Yves Deswarte:
Execution Patterns in Automatic Malware and Human-Centric Attacks.
NCA 2008: 29-36 | 
| 43 |            | Francesc Sebé,
Josep Domingo-Ferrer,
Antoni Martínez-Ballesté,
Yves Deswarte,
Jean-Jacques Quisquater:
Efficient Remote Data Possession Checking in Critical Information Infrastructures.
IEEE Trans. Knowl. Data Eng. 20(8): 1034-1038 (2008) | 
|  | 2007 | 
|---|
| 42 |            | Carlos Aguilar Melchor,
Yves Deswarte,
Julien Iguchi-Cartigny:
Closed-Circuit Unobservable Voice over IP.
ACSAC 2007: 119-128 | 
| 41 |            | Anas Abou El Kalam,
Yves Deswarte,
Amine Baïna,
Mohamed Kaâniche:
Access Control for Collaborative Systems: A Web Services Based Approach.
ICWS 2007: 1064-1071 | 
| 40 |            | Mohammed S. Gadelrab,
Anas Abou El Kalam,
Yves Deswarte:
Defining categories to select representative attack test-cases.
QoP 2007: 40-42 | 
| 39 |            | Paulo Veríssimo,
Nuno Ferreira Neves,
Miguel Correia,
Yves Deswarte,
Anas Abou El Kalam,
Andrea Bondavalli,
Alessandro Daidone:
The CRUTIAL Architecture for Critical Information Infrastructures.
WADS 2007: 1-27 | 
| 38 |            | Mohamed Kaâniche,
Yves Deswarte,
Eric Alata,
Marc Dacier,
Vincent Nicomette:
Empirical analysis and statistical modeling of attack processes based on honeypots
CoRR abs/0704.0861:  (2007) | 
|  | 2006 | 
|---|
| 37 |            | Carlos Aguilar Melchor,
Yves Deswarte:
From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications.
NCA 2006: 163-172 | 
| 36 |            | Carlos Aguilar Melchor,
Yves Deswarte:
Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases.
Privacy in Statistical Databases 2006: 257-265 | 
| 35 |            | Yves Deswarte,
Carlos Aguilar Melchor:
Current and future privacy enhancing technologies for the Internet.
Annales des Télécommunications 61(3-4): 399-417 (2006) | 
| 34 |            | Paulo Veríssimo,
Nuno Ferreira Neves,
Christian Cachin,
Jonathan A. Poritz,
David Powell,
Yves Deswarte,
Robert J. Stroud,
Ian Welch:
Intrusion-tolerant middleware: the road to automatic security.
IEEE Security & Privacy 4(4): 54-62 (2006) | 
|  | 2005 | 
|---|
| 33 |            | Anas Abou El Kalam,
Yves Deswarte:
Privacy Requirements Implemented with a JavaCard.
ACSAC 2005: 527-536 | 
| 32 |            | Carlos Aguilar Melchor,
Yves Deswarte:
pMIX: Untraceability for Small Hiding Groups.
NCA 2005: 29-40 | 
|  | 2004 | 
|---|
| 31 |            | Yves Deswarte,
Frédéric Cuppens,
Sushil Jajodia,
Lingyu Wang:
Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France
Kluwer 2004 | 
| 30 |            | Yves Deswarte,
Frédéric Cuppens,
Sushil Jajodia,
Lingyu Wang:
Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France
Kluwer 2004 | 
| 29 |            | Jean-Jacques Quisquater,
Pierre Paradinas,
Yves Deswarte,
Anas Abou El Kalam:
Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8/WG8.8 & TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France
Kluwer 2004 | 
| 28 |            | Anas Abou El Kalam,
Yves Deswarte,
Gilles Trouessin,
Emmanuel Cordonnier:
Smartcard-based Anonymization.
CARDIS 2004: 49-66 | 
| 27 |            | Yves Deswarte,
David Powell:
Intrusion tolerance for Internet applications.
IFIP Congress Topical Sessions 2004: 241-256 | 
| 26 |            | Yves Deswarte,
David Powell:
Intrusion Tolerance for Internet Applications.
NCA 2004: 35-36 | 
| 25 |            | Anas Abou El Kalam,
Yves Deswarte,
Gilles Trouessin,
Emmanuel Cordonnier:
A generic approach for healthcare data anonymization.
WPES 2004: 31-32 | 
| 24 |            | Yves Deswarte,
Anas Abou El Kalam:
Modèle de sécurité pour le secteur de la santé.
Technique et Science Informatiques 23(3): 291-321 (2004) | 
|  | 2003 | 
|---|
| 23 |            | Alfonso Valdes,
Magnus Almgren,
Steven Cheung,
Yves Deswarte,
Bruno Dutertre,
Joshua Levy,
Hassen Saïdi,
Victoria Stavridou,
Tomás E. Uribe:
Dependable Intrusion Tolerance: Technology Demo.
DISCEX (2) 2003: 128-130 | 
| 22 |            | Anas Abou El Kalam,
Salem Benferhat,
Alexandre Miège,
Rania El Baida,
Frédéric Cuppens,
Claire Saurel,
Philippe Balbiani,
Yves Deswarte,
Gilles Trouessin:
Organization based access contro.
POLICY 2003: 120- | 
| 21 |            | Anas Abou El Kalam,
Yves Deswarte:
Security Model for Health Care Computing and Communication Systems.
SEC 2003: 277-288 | 
|  | 2002 | 
|---|
| 20 |            | Alfonso Valdes,
Magnus Almgren,
Steven Cheung,
Yves Deswarte,
Bruno Dutertre,
Joshua Levy,
Hassen Saïdi,
Victoria Stavridou,
Tomás E. Uribe:
An Architecture for an Adaptive Intrusion-Tolerant Server.
Security Protocols Workshop 2002: 158-178 | 
|  | 2001 | 
|---|
| 19 |            | Yves Deswarte,
Noreddine Abghour,
Vincent Nicomette,
David Powell:
An Internet Authorization Scheme Using Smart-Card-Based Security Kernels.
E-smart 2001: 71-82 | 
|  | 2000 | 
|---|
| 18 |            | Frédéric Cuppens,
Yves Deswarte,
Dieter Gollmann,
Michael Waidner:
Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings
Springer 2000 | 
|  | 1999 | 
|---|
| 17 |            | Yves Deswarte,
Mohamed Kaâniche,
Pierre Corneillie,
John Goodson:
SQUALE Dependability Assessment Criteria.
SAFECOMP 1999: 27-38 | 
| 16 |            | Rodolphe Ortalo,
Yves Deswarte,
Mohamed Kaâniche:
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security.
IEEE Trans. Software Eng. 25(5): 633-650 (1999) | 
|  | 1998 | 
|---|
| 15 |            | Jean-Jacques Quisquater,
Yves Deswarte,
Catherine Meadows,
Dieter Gollmann:
Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings
Springer 1998 | 
| 14 |            | Eric Totel,
Jean-Paul Blanquart,
Yves Deswarte,
David Powell:
Supporting Multiple Levels of Criticality.
FTCS 1998: 70-79 | 
|  | 1997 | 
|---|
| 13 |            | Yves Deswarte:
Internet Security Despite Untrustworthy Agents and Components.
FTDCS 1997: 218-219 | 
| 12 |            | Vincent Nicomette,
Yves Deswarte:
An Authorization Scheme For Distributed Object Systems.
IEEE Symposium on Security and Privacy 1997: 21-30 | 
|  | 1996 | 
|---|
| 11 |            | Vincent Nicomette,
Yves Deswarte:
Symbolic Rights and Vouchers for Access Control in Distributed Object Systems.
ASIAN 1996: 192-203 | 
| 10 |            | Vincent Nicomette,
Yves Deswarte:
A Multilevel Security Model for Distributed Object Systems.
ESORICS 1996: 80-98 | 
| 9 |            | Marc Dacier,
Yves Deswarte,
Mohamed Kaâniche:
Models and tools for quantitative assessment of operational security.
SEC 1996: 177-186 | 
|  | 1994 | 
|---|
| 8 |            | Jean-Charles Fabre,
Yves Deswarte,
Brian Randell:
Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach.
EDCC 1994: 21-38 | 
| 7 |            | Marc Dacier,
Yves Deswarte:
Privilege Graph: an Extension to the Typed Access Matrix Model.
ESORICS 1994: 319-334 | 
|  | 1992 | 
|---|
| 6 |            | Yves Deswarte,
Gérard Eizenberg,
Jean-Jacques Quisquater:
Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings
Springer 1992 | 
|  | 1991 | 
|---|
| 5 |            | Yves Deswarte,
Laurent Blain,
Jean-Charles Fabre:
Intrusion Tolerance in Distributed Computing Systems.
IEEE Symposium on Security and Privacy 1991: 110-121 | 
|  | 1990 | 
|---|
| 4 |            | Laurent Blain,
Yves Deswarte:
An Intrusion-Tolerant Security Server for an Open Distributed System.
ESORICS 1990: 97-104 | 
|  | 1986 | 
|---|
| 3 |            | J.-M. Fray,
Yves Deswarte,
David Powell:
Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering.
IEEE Symposium on Security and Privacy 1986: 194-203 | 
| 2 |            | Yves Deswarte,
Jean-Charles Fabre,
Jean-Claude Laprie,
David Powell:
A Saturation Network to Tolerate Faults and Intrusions.
Symposium on Reliability in Distributed Software and Database Systems 1986: 74-81 | 
|  | 1982 | 
|---|
| 1 |            | J. Abadir,
Yves Deswarte:
Run-Time Program for Self-Checking Single Board Computer.
ITC 1982: 205-213 |