default search action
Yves Deswarte
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2014
- [j16]Fernand Lone Sang, Vincent Nicomette, Yves Deswarte:
A Tool to Analyze Potential I/O Attacks against PCs. IEEE Secur. Priv. 12(2): 60-66 (2014) - [j15]Anas Abou El Kalam, Mohammed Gad El Rab, Yves Deswarte:
A model-driven approach for experimental evaluation of intrusion detection systems. Secur. Commun. Networks 7(11): 1955-1973 (2014) - 2013
- [c52]Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, Youssef Laarouchi:
Survey on security threats and protection mechanisms in embedded automotive networks. DSN Workshops 2013: 1-12 - [c51]Anthony Dessiatnikoff, Eric Alata, Yves Deswarte, Vincent Nicomette:
Low-Level Attacks on Avionics Embedded Systems. SAFECOMP 2013: 146-153 - [c50]Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaâniche, Youssef Laarouchi:
Security of embedded automotive networks: state of the art and a research proposal. CARS@SAFECOMP 2013 - 2012
- [j14]Anthony Dessiatnikoff, Yves Deswarte, Eric Alata, Vincent Nicomette:
Potential Attacks on Onboard Aerospace Systems. IEEE Secur. Priv. 10(4): 71-74 (2012) - [c49]Christian Artigues, Yves Deswarte, Jérémie Guiochet, Marie-José Huguet, Marc-Olivier Killijian, David Powell, Matthieu Roy, Christophe Bidan, Nicolas Prigent, Emmanuelle Anceaume, Sébastien Gambs, Gilles Guette, Michel Hurfin, Frédéric Schettini:
AMORES: an architecture for mobiquitous resilient systems. ARMOR 2012: 7:1-7:6 - [c48]Yves Deswarte, Sébastien Gambs:
The Challenges Raised by the Privacy-Preserving Identity Card. Cryptography and Security 2012: 383-404 - 2011
- [j13]Vincent Nicomette, David Powell, Yves Deswarte, Noreddine Abghour, Christophe Zanon:
Intrusion-tolerant fine-grained authorization for Internet applications. J. Syst. Archit. 57(4): 441-451 (2011) - [j12]Éric Lacombe, Vincent Nicomette, Yves Deswarte:
Enforcing kernel constraints by hardware-assisted virtualization. J. Comput. Virol. 7(1): 1-21 (2011) - [c47]David Powell, Jean Arlat, Yves Deswarte, Karama Kanoun:
Tolerance of Design Faults. Dependable and Historic Computing 2011: 428-452 - [c46]Fernand Lone Sang, Vincent Nicomette, Yves Deswarte:
I/O Attacks in Intel PC-based Architectures and Countermeasures. SysSec@DIMVA 2011: 19-26 - [c45]Yves Deswarte:
Protecting Critical Infrastructures While Preserving Each Organization's Autonomy. ICDCIT 2011: 15-34 - [p2]Anas Abou El Kalam, Carlos Aguilar Melchor, Stefan Berthold, Jan Camenisch, Sebastian Clauß, Yves Deswarte, Markulf Kohlweiss, Andriy Panchenko, Lexi Pimenidis, Matthieu Roy:
Further Privacy Mechanisms. Digital Privacy - PRIME 2011: 485-555 - 2010
- [j11]Yves Deswarte, Sébastien Gambs:
A Proposal for a Privacy-preserving National Identity Card. Trans. Data Priv. 3(3): 253-276 (2010) - [c44]Fernand Lone Sang, Éric Lacombe, Vincent Nicomette, Yves Deswarte:
Exploiting an I/OMMU vulnerability. MALWARE 2010: 7-14
2000 – 2009
- 2009
- [j10]Anas Abou El Kalam, Yves Deswarte, Amine Baïna, Mohamed Kaâniche:
PolyOrBAC: A security framework for Critical Infrastructures. Int. J. Crit. Infrastructure Prot. 2(4): 154-169 (2009) - [j9]Carlos Aguilar Melchor, Yves Deswarte:
Trustable Relays for Anonymous Communication. Trans. Data Priv. 2(2): 101-130 (2009) - [j8]Ayda Saïdane, Vincent Nicomette, Yves Deswarte:
The Design of a Generic Intrusion-Tolerant Architecture for Web Servers. IEEE Trans. Dependable Secur. Comput. 6(1): 45-58 (2009) - [c43]Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte:
Manipulation of Network Traffic Traces for Security Evaluation. AINA Workshops 2009: 1124-1129 - [c42]Yves Deswarte, Sébastien Gambs:
Towards a Privacy-Preserving National Identity Card. DPM/SETOP 2009: 48-64 - [c41]Youssef Laarouchi, Yves Deswarte, David Powell, Jean Arlat, Eric De Nadai:
Enhancing dependability in avionics using virtualization. VDTS@EuroSys 2009: 13-17 - [e7]Anas Abou El Kalam, Yves Deswarte, Mahmoud Mostafa:
CRiSIS 2009, Post-Proceedings of the Fourth International Conference on Risks and Security of Internet and Systems, Toulouse, France, October 19-22, 2009. IEEE 2009, ISBN 978-1-4244-4498-4 [contents] - 2008
- [j7]Francesc Sebé, Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Yves Deswarte, Jean-Jacques Quisquater:
Efficient Remote Data Possession Checking in Critical Information Infrastructures. IEEE Trans. Knowl. Data Eng. 20(8): 1034-1038 (2008) - [c40]Amine Baïna, Yves Deswarte, Anas Abou El Kalam, Mohamed Kaâniche:
Access control for cooperative systems: A comparative analysis. CRiSIS 2008: 19-26 - [c39]Anas Abou El Kalam, Yves Deswarte:
Critical Infrastructures Security Modeling, Enforcement and Runtime Checking. CRITIS 2008: 95-108 - [c38]Youssef Laarouchi, Yves Deswarte, David Powell, Jean Arlat:
Safety and Security Architectures for Avionics. DCSOFT 2008: 46-52 - [c37]Amine Baïna, Anas Abou El Kalam, Yves Deswarte, Mohamed Kaâniche:
Collaborative Access Control For Critical Infrastructures. Critical Infrastructure Protection 2008: 189-201 - [c36]Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte:
Execution Patterns in Automatic Malware and Human-Centric Attacks. NCA 2008: 29-36 - 2007
- [c35]Carlos Aguilar Melchor, Yves Deswarte, Julien Iguchi-Cartigny:
Closed-Circuit Unobservable Voice over IP. ACSAC 2007: 119-128 - [c34]Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte:
Defining categories to select representative attack test-cases. QoP 2007: 40-42 - [c33]Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia, Yves Deswarte, Anas Abou El Kalam, Andrea Bondavalli, Alessandro Daidone:
The CRUTIAL Architecture for Critical Information Infrastructures. WADS 2007: 1-27 - [c32]Anas Abou El Kalam, Yves Deswarte, Amine Baïna, Mohamed Kaâniche:
Access Control for Collaborative Systems: A Web Services Based Approach. ICWS 2007: 1064-1071 - [i1]Mohamed Kaâniche, Yves Deswarte, Eric Alata, Marc Dacier, Vincent Nicomette:
Empirical analysis and statistical modeling of attack processes based on honeypots. CoRR abs/0704.0861 (2007) - 2006
- [j6]Yves Deswarte, Carlos Aguilar Melchor:
Current and future privacy enhancing technologies for the Internet. Ann. des Télécommunications 61(3-4): 399-417 (2006) - [j5]Yves Deswarte:
Le projet européen PRIME: protection de la vie privée et gestion des identités pour l'Europe. Ann. des Télécommunications 61(3-4): 517-520 (2006) - [j4]Paulo Veríssimo, Nuno Ferreira Neves, Christian Cachin, Jonathan A. Poritz, David Powell, Yves Deswarte, Robert J. Stroud, Ian Welch:
Intrusion-tolerant middleware: the road to automatic security. IEEE Secur. Priv. 4(4): 54-62 (2006) - [j3]Yves Deswarte, David Powell:
Internet Security: An Intrusion-Tolerance Approach. Proc. IEEE 94(2): 432-441 (2006) - [c31]Carlos Aguilar Melchor, Yves Deswarte:
From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications. NCA 2006: 163-172 - [c30]Carlos Aguilar Melchor, Yves Deswarte:
Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases. Privacy in Statistical Databases 2006: 257-265 - [p1]Eric Alata, Marc Dacier, Yves Deswarte, M. Kaaâniche, K. Kortchinsky, Vincent Nicomette, Van-Hau Pham, Fabien Pouget:
Collection and analysis of attack data based on honeypots deployed on the Internet. Quality of Protection 2006: 79-91 - 2005
- [c29]Anas Abou El Kalam, Yves Deswarte:
Privacy Requirements Implemented with a JavaCard. ACSAC 2005: 527-536 - [c28]Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier:
Personal data anonymization for security and privacy in collaborative environments. CTS 2005: 56-61 - [c27]Carlos Aguilar Melchor, Yves Deswarte:
pMIX: Untraceability for Small Hiding Groups. NCA 2005: 29-40 - 2004
- [j2]Yves Deswarte, Anas Abou El Kalam:
Modèle de sécurité pour le secteur de la santé. Tech. Sci. Informatiques 23(3): 291-321 (2004) - [c26]Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier:
Smartcard-based Anonymization. CARDIS 2004: 49-66 - [c25]Yves Deswarte, David Powell:
Intrusion tolerance for Internet applications. IFIP Congress Topical Sessions 2004: 241-256 - [c24]Yves Deswarte, David Powell:
Intrusion Tolerance for Internet Applications. NCA 2004: 35-36 - [c23]Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier:
A generic approach for healthcare data anonymization. WPES 2004: 31-32 - [e6]Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, Anas Abou El Kalam:
Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8/WG8.8 & TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France. IFIP 153, Kluwer/Springer 2004, ISBN 1-4020-8146-4 [contents] - [e5]Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang:
Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France. IFIP 148, Kluwer 2004, ISBN 1-4020-8144-8 [contents] - [e4]Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang:
Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France. IFIP 147, Kluwer / Springer 2004, ISBN 1-4020-8142-1 [contents] - 2003
- [c22]Ayda Saïdane, Yves Deswarte, Vincent Nicomette:
An intrusion tolerant architecture for dynamic content internet servers. SSRS@CCS 2003: 110-114 - [c21]Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe:
Dependable Intrusion Tolerance: Technology Demo. DISCEX (2) 2003: 128-130 - [c20]Anas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida, Frédéric Cuppens, Claire Saurel, Philippe Balbiani, Yves Deswarte, Gilles Trouessin:
Organization based access contro. POLICY 2003: 120- - [c19]Anas Abou El Kalam, Yves Deswarte:
Security Model for Health Care Computing and Communication Systems. SEC 2003: 277-288 - [c18]Yves Deswarte, Jean-Jacques Quisquater, Ayda Saïdane:
Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers. IICIS 2003: 1-11 - 2002
- [c17]Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy, Hassen Saïdi, Victoria Stavridou, Tomás E. Uribe:
An Architecture for an Adaptive Intrusion-Tolerant Server. Security Protocols Workshop 2002: 158-178 - 2001
- [c16]Yves Deswarte, Noreddine Abghour, Vincent Nicomette, David Powell:
An Internet Authorization Scheme Using Smart-Card-Based Security Kernels. E-smart 2001: 71-82 - 2000
- [e3]Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner:
Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings. Lecture Notes in Computer Science 1895, Springer 2000, ISBN 3-540-41031-7 [contents]
1990 – 1999
- 1999
- [j1]Rodolphe Ortalo, Yves Deswarte, Mohamed Kaâniche:
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. IEEE Trans. Software Eng. 25(5): 633-650 (1999) - [c15]Yves Deswarte, Mohamed Kaâniche, Pierre Corneillie, John Goodson:
SQUALE Dependability Assessment Criteria. SAFECOMP 1999: 27-38 - 1998
- [c14]Eric Totel, Jean-Paul Blanquart, Yves Deswarte, David Powell:
Supporting Multiple Levels of Criticality. FTCS 1998: 70-79 - [e2]Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann:
Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings. Lecture Notes in Computer Science 1485, Springer 1998, ISBN 3-540-65004-0 [contents] - 1997
- [c13]Yves Deswarte:
Internet Security Despite Untrustworthy Agents and Components. FTDCS 1997: 218-219 - [c12]Vincent Nicomette, Yves Deswarte:
An Authorization Scheme For Distributed Object Systems. S&P 1997: 21-30 - 1996
- [c11]Vincent Nicomette, Yves Deswarte:
Symbolic Rights and Vouchers for Access Control in Distributed Object Systems. ASIAN 1996: 192-203 - [c10]Vincent Nicomette, Yves Deswarte:
A Multilevel Security Model for Distributed Object Systems. ESORICS 1996: 80-98 - [c9]Marc Dacier, Yves Deswarte, Mohamed Kaâniche:
Models and tools for quantitative assessment of operational security. SEC 1996: 177-186 - 1994
- [c8]Jean-Charles Fabre, Yves Deswarte, Brian Randell:
Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach. EDCC 1994: 21-38 - [c7]Marc Dacier, Yves Deswarte:
Privilege Graph: an Extension to the Typed Access Matrix Model. ESORICS 1994: 319-334 - 1992
- [e1]Yves Deswarte, Gérard Eizenberg, Jean-Jacques Quisquater:
Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings. Lecture Notes in Computer Science 648, Springer 1992, ISBN 3-540-56246-X [contents] - 1991
- [c6]Yves Deswarte, Laurent Blain, Jean-Charles Fabre:
Intrusion Tolerance in Distributed Computing Systems. S&P 1991: 110-121 - 1990
- [c5]Laurent Blain, Yves Deswarte:
An Intrusion-Tolerant Security Server for an Open Distributed System. ESORICS 1990: 97-104
1980 – 1989
- 1988
- [c4]Jean-Claude Fabre, Yves Deswarte, Jean-Claude Laprie, David Powell:
Saturation: reduced idleness for improved fault-tolerance. FTCS 1988: 200-205 - 1986
- [c3]J.-M. Fray, Yves Deswarte, David Powell:
Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering. S&P 1986: 194-203 - [c2]Yves Deswarte, Jean-Charles Fabre, Jean-Claude Laprie, David Powell:
A Saturation Network to Tolerate Faults and Intrusions. Symposium on Reliability in Distributed Software and Database Systems 1986: 74-81 - 1982
- [c1]J. Abadir, Yves Deswarte:
Run-Time Program for Self-Checking Single Board Computer. ITC 1982: 205-213
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 18:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint