Publications



165 documents

Articles dans une revue

  • Adrien Boiret, Cédric Eichler, Benjamin Nguyen, Sara Taki. Graph rewriting primitives for semantic graph databases sanitization. Computer Science and Information Systems, 2024, 21 (3), pp.23. ⟨10.2298/csis230426026b⟩. ⟨hal-04631734⟩
  • Marta Bílková, Sabine Frittella, Daniil Kozhemiachenko, Ondrej Majer. Qualitative reasoning in a two-layered framework. International Journal of Approximate Reasoning, 2023, 154, pp.84-108. ⟨10.1016/j.ijar.2022.12.011⟩. ⟨hal-03942522⟩
  • A R Aliabad, M Badie, Sajad Nazari. On Commutative Gelfand Rings. Journal of Mathematical Extension, 2021. ⟨hal-03537350⟩
  • Jacques Chabin, Cédric Eichler, Mirian Halfeld Ferrari, Nicolas Hiot. Graph rewriting rules for RDF database evolution: optimizing side-effect processing. International Journal of Web Information Systems, 2021, 17 (6), ⟨10.1108/IJWIS-03-2021-0033⟩. ⟨hal-03329965⟩
  • Ilhem Khlif, Mohamed Hadj Kacem, Cédric Eichler, Khalil Drira, Ahmed Hadj Kacem. A model transformation approach for multiscale modeling of software architectures applied to smart cities. Concurrency and Computation: Practice and Experience, 2021, Distributed Computing for Smart Networks: Recent Advances and Future Trends (DiCES‐N2019). AMMCS19. Security and Privacy in IoT Communication (IOTSEC19). SKG2019, 34 (7), pp.e6298. ⟨10.1002/cpe.6298⟩. ⟨hal-03282430⟩
  • Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade. A Faster Cryptographer's Conspiracy Santa. Theoretical Computer Science, 2020, 839, pp.122-134. ⟨10.1016/j.tcs.2020.05.034⟩. ⟨hal-02611751⟩
  • Sabine Frittella, Krishna Manoorkar, Alessandra Palmigiano, Apostolos Tzimoulis, Nachoem M. Wijnberg. Toward a Dempster-Shafer theory of concepts. International Journal of Approximate Reasoning, 2020, 125, pp.14-25. ⟨10.1016/j.ijar.2020.05.004⟩. ⟨hal-02504595⟩
  • Willem Conradie, Sabine Frittella, Krishna Manoorkar, Sajad Nazari, Alessandra Palmigiano, et al.. Rough concepts. Information Sciences, 2020, ⟨10.1016/j.ins.2020.05.074⟩. ⟨hal-02913405⟩
  • Themba Dube, Mojtaba Ghirati, Sajad Nazari, Ali Taherifar. Rings in which idempotents generate maximal or minimal ideals. Algebra Universalis, 2020, 81 (3), ⟨10.1007/s00012-020-00660-y⟩. ⟨hal-02913406⟩
  • Benjamin Nguyen, Claude Castelluccia. Techniques d'anonymisation tabulaire : concepts et mise en oeuvre. 1024 : Bulletin de la Société Informatique de France, 2020, 15, pp.23-41. ⟨hal-02570847⟩
  • Willem Conradie, Sabine Frittella, Alessandra Palmigiano, Apostolos Tzimoulis, Nachoem Wijnberg. Probabilistic Epistemic Updates on Algebras. ACM Transactions on Computational Logic, 2019, 20 (4), pp.1-75. ⟨10.1145/3341725⟩. ⟨hal-02973836⟩
  • Adrien Boiret, Vincent Hugot, Joachim Niehren, Ralf Treinen. Logics for Unordered Trees with Data Constraints. Journal of Computer and System Sciences, 2019, pp.40. ⟨10.1016/j.jcss.2018.11.004⟩. ⟨hal-01176763v2⟩
  • Nicolas Anciaux, Philippe Bonnet, Luc Bouganim, Benjamin Nguyen, Philippe Pucheral, et al.. Personal Data Management Systems: The security and functionality standpoint. Information Systems, 2019, 80, pp.13-35. ⟨10.1016/j.is.2018.09.002⟩. ⟨hal-01898705⟩
  • Carlos Aguilar Melchor, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor. Efficient Encryption From Random Quasi-Cyclic Codes. IEEE Transactions on Information Theory, 2018, 64 (5), pp.3927-3943. ⟨hal-01951335⟩
  • Ilhem Khlif, Mohamed Hadj Kacem, Cédric Eichler, Ahmed Hadj Kacem. A multi-scale modeling approach for systems of systems architectures. ACM SIGAPP applied computing review : a publication of the Special Interest Group on Applied Computing, 2017, 17 (3), pp.17 - 26. ⟨10.1145/3161534.3161536⟩. ⟨hal-01643760⟩
  • Wilson A. Higashino, Cédric Eichler, Miriam Capretz, Luiz F. Bittencourt, Thierry Monteil. Attributed Graph Rewriting for Complex Event Processing Self-Management. ACM Transactions on Autonomous and Adaptive Systems, 2016, 11 (3), pp.article n° 19. ⟨10.1145/2967499⟩. ⟨hal-01369701⟩
  • Cuong Quoc To, Benjamin Nguyen, Philippe Pucheral. Private and Scalable Execution of SQL Aggregates on a Secure Decentralized Architecture. ACM Transactions on Database Systems, 2016, 41 (3), pp.46. ⟨10.1145/2894750⟩. ⟨hal-01296432⟩
  • Nicolas Anciaux, Benjamin Nguyen. Gestion sécurisée de données personnelles. 1024 : Bulletin de la Société Informatique de France, 2015, 5, pp.17-41. ⟨hal-01179047⟩
  • Waleed W. Smari, Patrice Clemente, Jean-François Lalande. An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system. Future Generation Computer Systems, 2014, 31, pp.147-168. ⟨10.1016/j.future.2013.05.010⟩. ⟨hal-00835887⟩
  • Benjamin Nguyen. Techniques d'anonymisation. Statistique et Société, 2014, 2 (4), pp.53-60. ⟨hal-01113412⟩
  • Mathieu Blanc, Jérémy Briffaut, Christian Toinard, Damien Gros. PIGA-HIPS: Protection of a shared HPC cluster. International Journal On Advances in Security, 2011, 4 (1), pp.44-53. ⟨hal-00671586⟩
  • Jonathan Rouzaud-Cornabas, Patrice Clemente, Christian Toinard. An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OS. International Journal On Advances in Software, 2011, 4 (1&2), pp.34-45. ⟨hal-03226326⟩
  • Patrice Clemente, Jonathan Rouzaud-Cornabas, Christian Toinard. From a Generic Framework for Expressing Integrity Properties to a Dynamic MAC Enforcement for Operating Systems. Transactions on Computational Science, 2010, pp._. ⟨hal-00511130⟩
  • Mathieu Blanc, Patrice Clemente, Jonathan Rouzaud-Cornabas, Christian Toinard. Classification of malicious distributed SELinux activities. Journal of Computers (JCP), 2009, 4 (5), pp.423-432. ⟨10.4304/jcp.4.5.423-432⟩. ⟨hal-00459817⟩

Communications dans un congrès

  • Yasmine Hayder, Adrien Boiret, Cédric Eichler, Benjamin Nguyen. Data Privacy for Graphs with Semantic Informations. BDA 2024 - 40èmes journées de la conférence « Gestion de Données – Principes, Technologies et Applications », Oct 2024, Orléans, France. ⟨hal-04711565⟩
  • Xavier Bultel, Charles Olivier-Anclin. On the Anonymity of Linkable Ring Signatures. Cryptology and Network Security (CANS 2024), Sep 2024, Cambridge, United Kingdom. pp.212-235, ⟨10.1007/978-981-97-8013-6_10⟩. ⟨hal-04726565⟩
  • Xavier Bultel, Charlène Jojon, Pascal Lafourcade. Cryptographic cryptid protocols: How to play cryptid with cheaters. CANS 2024 - 23rd International Conference on Cryptology And Network Security, Sep 2024, Cambridge, United Kingdom. ⟨hal-04620483⟩
  • Xavier Bultel. Physical Ring Signature. 12th International Conference on Fun with Algorithms (FUN 2024), Jun 2024, La Maddalena, Italy. ⟨10.4230/LIPIcs.FUN.2024.7⟩. ⟨hal-04624521⟩
  • Pierre Bouchet, Christian Toinard, Sophie Jacquot. A passive assessment of homecare need with a Rasch model. The 15th International Multi-Conference on Complexity, Informatics and Cybernetics: IMCIC 2024, Mar 2024, Orlando (Florida), United States. ⟨hal-04500764⟩
  • Nicolas Anciaux, Sabine Frittella, Baptiste Joffroy, Benjamin Nguyen, Guillaume Scerri. A new PET for Data Collection via Forms with Data Minimization, Full Accuracy and Informed Consent. 27th International Conference on Extending Database Technology, EDBT 2024, Mar 2024, Paestum, Italy. ⟨hal-04149000v2⟩
  • Nicolas Anciaux, Sabine Frittella, Baptiste Joffroy, Benjamin Nguyen. Demo : Data Minimization and Informed Consent in Administrative Forms. ACM CCS 2023 - Conference on Computer and Communications Security, Nov 2023, Copenhagen, Denmark. ⟨10.1145/3576915.3624363⟩. ⟨hal-04240432⟩
  • Radu Ciucanu, Pascal Lafourcade, Gael Marcadet, Marta Soare. SAMBA: A Generic Framework for Secure Federated Multi-Armed Bandits (Extended Abstract). Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}, Aug 2023, Macau, China. pp.6863-6867, ⟨10.24963/ijcai.2023/772⟩. ⟨hal-04182291⟩
  • Sabine Frittella, Daniil Kozhemiachenko, Bart Verheij. Presumptive Reasoning in a Paraconsistent Setting. Theoretical Aspects of Rationality and Knowledge, Jun 2023, Oxford (UK), United Kingdom. pp.233-244, ⟨10.4204/EPTCS.379.19⟩. ⟨hal-04160161⟩
  • Rohann Bella, Xavier Bultel, Céline Chevalier, Pascal Lafourcade, Charles Olivier-Anclin. Practical Construction for Secure Trick-Taking Games Even With Cards Set Aside. FC2023 - Twenty-Seventh Financial Cryptography and Data Security Conference, International Financial Cryptography Association, May 2023, Bol, Brač, Croatia. ⟨hal-04008484⟩
  • Pierre Bouchet, Sophie Jacquot, Christian Toinard. Towards a SaaS application providing an ethical support for human caregiving of people living at home. Computational Science and Computational Intelligence, Dec 2022, Las Vegas, United States. ⟨hal-03952387⟩
  • Xavier Bultel, Ashley Fraser, Elizabeth Quaglia. Improving the Efficiency of Report and Trace Ring Signatures. Stabilization, Safety, and Security of Distributed Systems (SSS 2022), Nov 2022, Clermont-Ferrand, France. pp.130-145, ⟨10.1007/978-3-031-21017-4_9⟩. ⟨hal-03894199⟩
  • Sara Taki, Cédric Eichler, Benjamin Nguyen. It’s Too Noisy in Here: Using Projection to Improve Differential Privacy on RDF Graphs. ADBIS 2022- 26th European Conference on Advances in Databases and Information Systems, Sep 2022, Turin, Italy. pp.212-221, ⟨10.1007/978-3-031-15743-1_20⟩. ⟨hal-03770679⟩
  • Adrien Boiret, Cédric Eichler, Benjamin Nguyen. Privacy Operators for Semantic Graph Databases as Graph Rewriting. International Workshop on Intelligent Data – From Data to Knowledge (DOING@ADBIS), Sep 2022, Turino, Italy. pp.366-377, ⟨10.1007/978-3-031-15743-1_34⟩. ⟨hal-03768318⟩
  • Sara Taki, Cédric Eichler, Benjamin Nguyen. It’s too noisy in here: using projection to improve Differential Privacy on RDF graphs. APVP 2022 - 12ème Atelier sur la Protection de la Vie Privée, Jun 2022, Châtenay-sur-Seine, France. ⟨hal-04249522⟩
  • Xavier Bultel. Zero-Knowledge Proof of Knowledge for Peg Solitaire. 11th International Conference on Fun with Algorithms (FUN 2022), May 2022, Favignana, Italy. ⟨10.4230/LIPIcs.FUN.2022.9⟩. ⟨hal-03754563⟩
  • Xavier Bultel. Enseigner les preuves à divulgation nulle sur des chiffrements sans prérequis d'arithmétique. RESSI 2022 (Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information), May 2022, Chambon-sur-Lac, France. ⟨hal-03754546⟩
  • Cédric Eichler, Jacques Chabin, Rachid Echahed, Mirian H. Ferrari, Nicolas Hiot, et al.. Back on SEmantic Networks of Data: Utility and Privacy. Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information RESSI, May 2022, Chambon-Sur-Lac, France. ⟨hal-03788897⟩
  • Marta Bílková, Sabine Frittella, Ondrej Majer, Sajad Nazari. Belief Based on Inconsistent Information. Dynamic Logic: New Trends and Applications, Mar 2022, Prague, Czech Republic. pp.68-86, ⟨10.1007/978-3-030-65840-3_5⟩. ⟨hal-03115256⟩
  • Xavier Bultel. CCA Secure A Posteriori Openable Encryption in the Standard Model. The Cryptographer’s Track at the RSA Conference (TC-RSA 2022), Mar 2022, San Francisco, United States. ⟨10.1007/978-3-030-95312-6_16⟩. ⟨hal-03754615⟩
  • Vincent Hugot, Adrien Jousse, Christian Toinard, Benjamin Venelle. A safe dynamic access control providing mandatory automotive cybersecurity. 2021 International Conference on Computational Science and Computational Intelligence (CSCI), Dec 2021, Las Vegas, United States. pp.848-851, ⟨10.1109/CSCI54926.2021.00199⟩. ⟨hal-03739737⟩
  • Xavier Bultel, Pascal Lafourcade, Charles Olivier-Anclin, Léo Robert. Generic Construction for Identity-based Proxy Blind Signature. FPS 2022 : The 14th International Symposium on Foundations & Practice of Security, Dec 2021, Paris, France. ⟨hal-03435956⟩
  • Sara Taki, Cédric Eichler, Benjamin Nguyen. Using projection to improve Differential Privacy on RDF graphs. BDA 2021-37ème Conférence sur la Gestion de Données – Principes, Technologies et Applications, Oct 2021, Paris, France. ⟨hal-03566266⟩
  • Fergal Martin-Tricot, Cédric Eichler, Pascal Berthomé. Secure key distribution in heterogeneous interoperable industrial Internet of Things. 2021 17th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Oct 2021, Bologna, France. pp.74-79, ⟨10.1109/WiMob52687.2021.9606265⟩. ⟨hal-03442592⟩
  • Marta Bílková, Sabine Frittella, Daniil Kozhemiachenko. Constraint Tableaux for Two-Dimensional Fuzzy Logics. TABLEAUX 2021: 30th International Conference on Automated Reasoning with Analytic Tableaux and Related Methods, Sep 2021, Birmingham, United Kingdom. pp.20-37, ⟨10.1007/978-3-030-86059-2_2⟩. ⟨hal-03626661⟩
  • Angèle Bossuat, Xavier Bultel. Unlinkable and Invisible $\gamma$-Sanitizable Signatures. ACNS 2021, Jun 2021, Kamakura / Virtual, Japan. pp.251-283, ⟨10.1007/978-3-030-78372-3_10⟩. ⟨hal-03537371⟩
  • Olivier Blazy, Xavier Bultel, Pascal Lafourcade, Octavio Perez-Kempner. Generic Plaintext Equality and Inequality Proofs. Financial Cryptography and Data Security Conference, 2021, Online, Unknown Region. pp.415--435, ⟨10.1007/978-3-662-64322-8\_20⟩. ⟨hal-03478247⟩
  • Cédric Eichler. Projet SENDUP : SEmantic Networks of Data: Utility and Privacy. Journées Informatique en Région Centre-Val de Loire, 2021, Blois, France. ⟨hal-03560227⟩
  • Ghada Arfaoui, Olivier Blazy, Xavier Bultel, Pierre-Alain Fouque, Thibaut Jacques, et al.. How to (Legally) Keep Secrets from Mobile Operators. Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I, 2021, Online, Unknown Region. pp.23--43, ⟨10.1007/978-3-030-88418-5_2⟩. ⟨hal-03478246⟩
  • Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare. Secure Outsourcing of Multi-Armed Bandits. 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020), Dec 2020, Conférence online, China. pp.202-209. ⟨hal-02953292⟩
  • Antoine Boutet, Mathieu Cunche, Sébastien Gambs, Benjamin Nguyen, Antoine Laurent. DARC : Data Anonymization and Re-identification Challenge. RESSI 2020 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Dec 2020, Nouan-le-Fuzelier, France. ⟨hal-02512677v2⟩
  • Radu Ciucanu, Anatole Delabrouille, Pascal Lafourcade, Marta Soare. Secure Cumulative Reward Maximization in Linear Stochastic Bandits. International Conference on Provable and Practical Security (ProvSec), Nov 2020, Conférence online, Singapore. pp.257-277, ⟨10.1007/978-3-030-62576-4_13⟩. ⟨hal-02942694⟩
  • Radu Ciucanu, Pascal Lafourcade. Demonstration of GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation. International Semantic Web Conference (ISWC) - Demo Track, Nov 2020, Conférence online, Greece. ⟨hal-02942717⟩
  • Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Thyla van Der Merwe. Designing Reverse Firewalls for the Real World. ESORICS 2020, Sep 2020, Guildford, United Kingdom. pp.193-213, ⟨10.1007/978-3-030-58951-6_10⟩. ⟨hal-03225846⟩
  • Radu Ciucanu, Pascal Lafourcade. GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation. 34th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (also known as DBSEC), Jun 2020, Conférence online, Germany. pp.347-366, ⟨10.1007/978-3-030-49669-2_20⟩. ⟨hal-02544920⟩
  • Jacques Chabin, Cédric Eichler, Mirian Halfeld Ferrari, Nicolas Hiot. Graph Rewriting Rules for RDF Database Evolution Management. International Conference on Information Integration and Web-based Applications & Services, 2020, Chiang Mai (On line), Thailand. ⟨hal-02956728⟩
  • Fergal Martin-Tricot, Cédric Eichler, Pascal Berthomé. An Enrolment Gateway for Data Security in Heterogeneous Industrial Internet of Things. 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises - WETICE 2020, 2020, Bayonne (Virtual Conference), France. ⟨hal-02960931⟩
  • Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare. Secure Best Arm Identification in Multi-Armed Bandits. ISPEC 2019 : The 15th International Conference on Information Security Practice and Experience, Nov 2019, Kuala Lumpur, Malaysia. ⟨10.1007/978-3-030-34339-2_9⟩. ⟨hal-02270418⟩
  • Vincent Hugot, Adrien Jousse, Christian Toinard, Benjamin Venelle. oMAC : Open Model for Automotive Cybersecurity. 17th escar Europe : embedded security in cars (Konferenzveröffentlichung), Nov 2019, Stuttgart, Germany. ⟨10.13154/294-6674⟩. ⟨hal-02497993⟩
  • Jean-Yves Zié, Jean-Christophe Deneuville, Jérémy Briffaut, Benjamin Nguyen. Extending Atomic Chain Swaps. Data Privacy Management, Cryptocurrencies and Blockchain Technology, ESORICS 2019 International Workshops, Sep 2019, Luxembourg, Luxembourg. ⟨10.1007/978-3-030-31500-9_14⟩. ⟨hal-02570859⟩
  • Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye. Secure Strassen-Winograd Matrix Multiplication with MapReduce. International Conference on Security and Cryptography (SECRYPT), Jul 2019, Prague, Czech Republic. pp.220-227. ⟨hal-02129149⟩
  • Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye. Secure and Efficient Matrix Multiplication with MapReduce. SECRYPT/ICETE - Revised Selected Papers, Jul 2019, Prague, Czech Republic. ⟨10.1007/978-3-030-52686-3_6⟩. ⟨hal-02942677⟩
  • Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye. Secure Intersection with MapReduce. International Conference on Security and Cryptography (SECRYPT), Jul 2019, Prague, Czech Republic. pp.236-243, ⟨10.5220/0007918902360243⟩. ⟨hal-02273966⟩
  • Cédric Eichler, Pascal Berthomé, Jacques Chabin, Rachid Echahed, Mirian Halfeld-Ferrari, et al.. SEmantic Networks of Data: Utility and Privacy. RESSI 2019: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. ⟨hal-02182521⟩
  • Benjamin Nguyen, Françoise Fessant, Arnaud Hourson, Lucas Laise. Atelier : Sécurité informatique et protection de la vie privée : pratiques et perspectives dans les entreprises. Human Tech Days, Jan 2019, Tours, France. ⟨hal-01994883⟩
  • Benjamin Nguyen. Tutoriel : Anonymization Techniques : Theory and Practice. Ecole d'été EGC, Jan 2019, Metz, France. ⟨hal-01994875⟩
  • Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye. Secure Joins with MapReduce. FPS 2018 : The 11th International Symposium on Foundations & Practice of Security, Nov 2018, Montreal, Canada. ⟨hal-01903098⟩
  • Samuel Balco, Sabine Frittella, Giuseppe Greco, Alexander Kurz, Alessandra Palmigiano. Software Tool Support for Modular Reasoning in Modal Logics of Actions. 9th International Conference on Interactive Theorem Proving, Jul 2018, Oxford, United Kingdom. ⟨hal-01836507⟩
  • Laurent Bobelin, Khalil Drira, Cédric Eichler. Toward a Formal Multiscale Architectural Framework for Emerging Properties Analysis in Systems of Systems. 13th Annual Conference on System of Systems Engineering (SoSE 2018 ), Jun 2018, Paris, France. ⟨10.1109/SYSOSE.2018.8428736⟩. ⟨hal-01895173⟩
  • Jean-Christophe Deneuville, Philippe Gaborit, Qian Guo, Thomas Johansson. Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol. IEEE International Symposium on Information Theory, Jun 2018, Vail, Colorado, USA, United States. ⟨hal-01946358⟩
  • Jean-Christophe Deneuville. Post-Quantum Cryptography: tomorrow’s security. Envirorisk, Forum de la gestion des risques naturels et technologiques, Jun 2018, Bourges, France. ⟨hal-01946368⟩
  • Jean-Claude Fondras, Marie-Elisabeth Labat, Christian Toinard. A reasoning approach towards Ethics-Based Medicine and care of disabled people. Envirorisk, Jun 2018, Bourges, France. ⟨hal-01959546⟩
  • Carlos Aguilar Melchor, Jean-Christophe Deneuville, Philippe Gaborit, Tancrède Lepoint, Thomas Ricosset. Delegating Elliptic-Curve Operations with Homomorphic Encryption. IEEE Conference on Communications and Network Security, May 2018, Pékin, China. ⟨hal-01946364⟩
  • Benjamin Nguyen. Personalized k-anonymity. 4th Franco-Japanese Workshop on Cybersecurity, May 2018, Annecy, France. ⟨hal-01994719⟩
  • Ilhem Khlif, Imen Tounsi, Mohamed Hadj Kacem, Cédric Eichler, Ahmed Hadj Kacem. A refinement-based approach for specifying multi-scale software architectures. 33rd annual ACM Symposium on Applied Computing, Apr 2018, Pau, France. ⟨10.1145/3167132.3167309⟩. ⟨hal-01836351⟩
  • Cédric Eichler, Khalil Drira, Thierry Monteil, Patricia Stolf. Correctness by construction and style preserving reconfigurations of system of systems. SAC 2018: The 33th ACM/SIGAPP Symposium on Applied Computing, Apr 2018, Pau, France. pp.1680-1686. ⟨hal-02652140⟩
  • Jean-Claude Fondras, Marie-Elisabeth Labat, Christian Toinard. De l’éthique de la numérisation de la santé à la numérisation de l’éthique de la santé. Espace de Réflexion Ethique de la Région Centre Val de Loire (ERERC), 2018, Tours, France. ⟨hal-01959555⟩
  • Benjamin Nguyen. Personalized Anonymization or the art of Private (Fair ?) Data Processing. Workshop on Social Responsability of Algorithms, Université de Paris Dauphine, Dec 2017, Paris, France. ⟨hal-01994712⟩
  • Willem Conradie, Sabine Frittella, Alessandra Palmigiano, Apostolos Tzimoulis, Nachoem Wijnberg. Toward an Epistemic-Logical Theory of Categorization. TARK 2017 Sixteenth conference on Theoretical Aspects of Rationality and Knowledge, Jul 2017, Liverpool, United Kingdom. pp.167 - 186, ⟨10.4204/EPTCS.251.12⟩. ⟨hal-01509416⟩
  • Laurent Bobelin, Andrès Gil, Christian Toinard, Marie-Elisabeth Labat. E-HandicapScale : an open and secure way to promote and improve diagnostics of disabled patients. 2017 International Conference on Health Informatics and Medical Systems, Jul 2017, Las Vegas, United States. ⟨hal-01966667⟩
  • Laurent Bobelin, Christian Toinard, Tuan Tran, Stéphane Moinard. A Software Test Approach to Evaluate the Enforcement of a Workflow Engine. 2017 International Conference on Software Engineering Research and Practice, Jul 2017, Las Vegas, United States. pp.31-37. ⟨hal-01966672⟩
  • Benjamin Nguyen. What is Fair Data Processing ?. ISI 61st World Statistics Congress, Jul 2017, Marrakech, Morocco. ⟨hal-01994667⟩
  • Cédric Eichler, Pascal Berthomé, Benjamin Nguyen. Projet GIRAFON: Protection de la vie privée dans le cadre de l'interrogation, la fouille et l'analyse de grands graphes. RESSI 2017: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2017, Autrans, France. ⟨hal-01985987⟩
  • Axel Michel, Benjamin Nguyen, Philippe Pucheral. Managing Distributed Queries under Personalized Anonymity Constraints. 6th International Conference on Data Science, Technology and Applications - DATA 2017, 2017, Madrid, Spain. ⟨hal-01682316⟩
  • Maria Evgenia G. Rossi, Pascal Berthomé, Cédric Eichler, Benjamin Nguyen. Private, Secure and Distributed Computation of k-cores. Atelier sur la Protection de la Vie Privée (APVP'17), 2017, Autrans, France. ⟨hal-01975143⟩
  • Ilhem Khlif, Mohamed Hadj Kacem, Cédric Eichler, Khalil Drira, Ahmed Hadj Kacem. Multi-scale modeling for software-intensive systems-of-systems architectures. International Colloquium on Software-intensive Systems-of-Systems at 10th European Conference on Software Architecture , Nov 2016, Copenhagen, Denmark. 6p., ⟨10.1145/3175731.3176179⟩. ⟨hal-01836346⟩
  • Axel Michel, Benjamin Nguyen, Philippe Pucheral. Exécution de requêtes distribuées sous contraintes d'anonymat. 32ème Conférence sur la Gestion de Données - Principes, Technologies et Applications, Nov 2016, Poitiers, France. ⟨hal-01424989⟩
  • Axel Michel, Benjamin Nguyen. Managing distributed queries under anonymity constraints. 7e Atelier sur la Protection de la Vie Privée, Jul 2016, Toulouse, France. ⟨hal-01424993⟩
  • Marie-Elisabeth Labat, Christian Toinard. Ethique et risques pour la prise en charge du handicap. Envirorisk, 2016, Bourges, France. ⟨hal-01959548⟩
  • Yannick Kergosien, Christian Toinard. Risques liés à la planification des emplois du temps pour la prise en charge d’enfants handicapés. Envirorisk, 2016, Bourges, France. ⟨hal-01959553⟩
  • Cuong Quoc To, Benjamin Nguyen, Philippe Pucheral. TrustedMR : Un système MapReduce de confiance basé sur l'utilisation de matériel sécurisé. 31ème Conférence sur la Gestion de Données — Principes, Technologies et Applications – BDA 2015 2, Sep 2015, Porquerolles, France. ⟨hal-01296448⟩
  • Asma Guesmi, Patrice Clemente, Frédéric Loulergue, Pascal Berthomé. Cloud Resources Placement Based on Functional and Non-Functional Requirements. SECRYPT, Jul 2015, Colmar, France. ⟨hal-01158134⟩
  • Aline Bousquet, Jérémy Briffaut, Christian Toinard. An autonomous Cloud management system for in-depth security.. Les Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2015), May 2015, Troyes, France. ⟨hal-01191746⟩
  • Daniel Le Métayer, Benjamin Nguyen, Josep Domingo-Ferrer, Mark Elliott, Antoinette Rouvroy, et al.. To be or not to be (anonymous)?. International Conference on Computers, Privacy and Data Protection (CPDP 2015), Jan 2015, Bruxelles, Belgium. ⟨hal-01296465⟩
  • Aline Bousquet, Jérémy Briffaut, Christian Toinard. An autonomous Cloud management system for in-depth security. 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), Oct 2014, Luxembourg, Luxembourg. ⟨10.1109/CloudNet.2014.6969023⟩. ⟨hal-01131866⟩
  • Laurent Bobelin, Aline Bousquet, Jérémy Briffaut, Eddy Caron, Jean-François Couturier, et al.. An Advanced Security-Aware Cloud Architecture. HPCS 2014 - The 2014 International Conference on High Performance Computing & Simulation, Jul 2014, Bologne, Italy. ⟨hal-01063852⟩
  • Patrice Clemente. De la sécurité de la virtualisation à la sécurité des Clouds. Colloque International sur la Sécurité des Systèmes d'Information, Mar 2014, Kenitra, Maroc. ⟨hal-03226185⟩
  • Asma Guesmi, Patrice Clemente. Access Control and Security Properties Requirements Specification for Clouds' SecLAs. CloudCom 2013, Dec 2013, Bristol, United Kingdom. pp.723-729. ⟨hal-03226333⟩
  • Eddy Caron, Le Anh Dung, Arnaud Lefray, Christian Toinard. Definition of security metrics for the Cloud Computing and security-aware virtual machine placement algorithms. International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2013), Oct 2013, Beijing, China. pp.125-131. ⟨hal-00932401⟩
  • Mathieu Blanc, Damien Gros, Jérémy Briffaut, Christian Toinard. PIGA-Cluster: a distributed architecture integrating a shared and resilient reference monitor to enforce mandatory access control in the HPC environment. SHPCS - 8th International Workshop on Security and High Performance Computing Systems - 2013, Jul 2013, Helsinki, Finland. ⟨hal-00840736⟩
  • Aline Bousquet, Jérémy Briffaut, Laurent Clévy, Christian Toinard, Benjamin Venelle. Mandatory Access Control for the Android Dalvik Virtual Machine. 2013 - USENIX Federated Conferences, ESOS: Workshop on Embedded Self-Organizing Systems, Jun 2013, San Jose, United States. ⟨hal-00840732⟩
  • Mathieu Blanc, Damien Gros, Jérémy Briffaut, Christian Toinard. Mandatory access control with a multi-level reference monitor: PIGA-cluster. ACM CLHS '13 Proceedings of the first workshop on Changing landscapes in HPC security, Jun 2013, New-York, United States. pp.1-8, ⟨10.1145/2465808.2465809⟩. ⟨hal-00840735⟩
  • Stéphane Betge-Brezetz, Aline Bousquet, Jérémy Briffaut, Eddy Caron, Laurent Clévy, et al.. Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures. The Future Internet - Future Internet Assembly 2013, 2013, Dublin, Ireland. pp.153-158, ⟨10.1007/978-3-642-38082-2_13⟩. ⟨hal-00840730⟩
  • Patrice Clemente, Bangaly Kaba, Jonathan Rouzaud-Cornabas, Marc Alexandre, Guillaume Aujay. SPTrack: Visual Analysis of Information Flows within SELinux Policies and Attack Logs. Active Media Technology, Dec 2012, Chengdu, China. pp.596-605, ⟨10.1007/978-3-642-35236-2_60⟩. ⟨hal-00766721⟩
  • Pierre Clairet, Pascal Berthomé, Jérémy Briffaut. Compression de signatures pour PIGA IDS. 9ème édition de la conférence MAnifestation des JEunes Chercheurs en Sciences et Technologies de l'Information et de la Communication - MajecSTIC 2012 (2012), Nicolas Gouvy, Oct 2012, Villeneuve d'Ascq, France. ⟨hal-00780205⟩
  • Damien Gros, Mathieu Blanc, Jérémy Briffaut, Christian Toinard. PIGA-Windows : contrôle des flux d'information avancés sur les systèmes d'exploitation Windows 7. Majestic 2012, Oct 2012, Lille, France. ⟨hal-00771337⟩
  • Pascal Berthomé, Jérémy Briffaut, Pierre Clairet. Compacting Security Signatures for PIGA IDS. SECURWARE-2012, Aug 2012, Rome, Italy. pp.126--133. ⟨hal-00770935⟩
  • Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas. HoneyCloud: elastic honeypots - On-attack provisioning of high-interaction honeypots. SECRYPT 2012, Jul 2012, Rome, Italy. pp.434-439. ⟨hal-00721415⟩
  • Mathieu Blanc, Jérémy Briffaut, Christian Toinard, Damien Gros. Advanced MAC in HPC systems: performance improvement. CCGrid 2012 -- The 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2012, Ottawa, Canada. ⟨hal-00671770⟩
  • Jérémy Briffaut, Jonathan Rouzaud-Cornabas, Christian Toinard, Emilie Lefebvre. PIGA-Virt: an Advanced Distributed MAC Protection of Virtual Systems. Euro-Par 2011 Parallel Processing Workshops, Lecture Notes in Computer Science, Aug 2011, Bordeaux, France. pp.8-19. ⟨hal-00671592⟩
  • Aline Bousquet, Patrice Clemente, Jean-François Lalande. SYNEMA: visual monitoring of network and system security sensors. SECRYPT 2011, Jul 2011, Séville, Spain. pp.375-378, ⟨10.5220/0003516203750378⟩. ⟨hal-00596893⟩
  • Jérémy Briffaut, Martin Peres, Christian Toinard, Jonathan Rouzaud-Cornabas, Benjamin Venelle, et al.. PIGA-OS : Retour sur le Système d'Exploitation Vainqueur du Défi Sécurité. RenPar'20 / SympA'14 / CFSE 8, 8ème Conférence Francaise en Systèmes d'Exploitation, RenPar'20 / SympA'14 / CFSE 8, May 2011, Saint-Malo, France. ⟨hal-00671591⟩
  • Jonathan Rouzaud-Cornabas, Patrice Clemente, Christian Toinard. An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OS. SECURWARE'10, Jul 2010, Venise, Italy. pp.11-16. ⟨hal-00474156⟩
  • Jonathan Rouzaud-Cornabas, Jérémy Briffaut, Christian Toinard, Patrice Clemente. An integrity security property based on information flows : Application to the enforcement of a classical operating system. Journée Informatique de la Région Centre 2009, Jan 2010, Blois, France. pp.1. ⟨hal-00459827⟩
  • Waleed W. Smari, Jian Zhu, Patrice Clemente. Trust and privacy in attribute based access control for collaboration environments. iiWAS 2009, Dec 2009, Kuala Lumpur, Malaysia. pp.47-53. ⟨hal-03226321⟩
  • Mathieu Blanc, Patrice Clemente, Steve-William Kissi. Toward a real MLS/SELinux system for end users: an empirical study. Workshop on Collaboration and Security (COLSEC'10), May 2009, Baltimore, United States. pp.209-216, ⟨10.1109/CTS.2009.5067483⟩. ⟨hal-03226176⟩
  • Jonathan Rouzaud-Cornabas, Patrice Clemente, Christian Toinard. Correlation of system events: High performance classification of selinux activities and scenarios. Workshop on Security and High Performance Computing Systems, Jun 2008, Cyprus, Cyprus. pp.171-177. ⟨hal-00459822⟩
  • Mathieu Blanc, Jérémy Briffaut, Patrice Clemente, Mohammed Gad El Rab, Christian Toinard. A Collaborative Approach for Access Control, Intrusion Detection and Security Testing. International Symposium on Collaborative Technologies and Systems (CTS'06), 2006, Las Vegas, United States. pp.270-278. ⟨hal-03226354⟩
  • Mathieu Blanc, Jérémy Briffaut, Patrice Clemente, Mohammed Gad El Rab, Christian Toinard. A Multi-Agent and Multi-Level Architecture to Secure Distributed Systems. First International Workshop on Privacy and Security in Agent-based Collaborative Environments, 2006, Hakodate, Japan. ⟨hal-03226172⟩
  • Anas Abou El Kalam, Jérémy Briffaut, Patrice Clemente, Pierre Courtieu, Fabrice Gadaud, et al.. Systèmes de confiance et détection d'intrusion répartis. Les Journées Informatique de la Région Centre, Jun 2005, Blois, France. ⟨hal-00459971⟩
  • Mathieu Blanc, Patrice Clemente, Pierre Courtieu, Stéphane Franche, Laurent Oudot, et al.. Amélioration de la sécurité des grands réseaux par une infrastructure de méta-politique. 11ème Colloque Francophone sur l'Ingénierie des Protocoles (CFIP'2005), Mar 2005, Bordeaux, France. pp.517-530. ⟨hal-00083402⟩
  • Mathieu Blanc, Patrice Clemente, Pierre Courtieu, Stéphane Franche, Laurent Oudot, et al.. Hardening large-scale networks security through a meta-policy framework. 3rd Workshop on the Internet, Telecommunications and Signal Processing (WITSP'04), Dec 2004, Adelaïde, Australia. pp.132-137. ⟨hal-00083400⟩

Poster de conférence

  • Xavier Bultel, Cristina Onete. Pairing-free secure-channel establishment in mobile networks with fine-grained lawful interception. The 37th ACM/SIGAPP Symposium On Applied Computing, Apr 2022, Brno, Czech Republic. SAC '22: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, ⟨10.1145/3477314.3507202⟩. ⟨hal-03754606⟩
  • Sara Taki, Cédric Eichler, Benjamin Nguyen. Privacy Over RDF datasets. BDA 2021 Conference, Oct 2021, Paris, France. ⟨hal-03539033⟩
  • Christian Toinard. Ethical reasoning and protocols for improving the scientific integrity. ENRIO 2020 Congress on Research Integrity Practice, 2020, Helsinski, Finland. ⟨hal-03547141⟩
  • Vincent Hugot, Adrien Jousse, Christian Toinard, Benjamin Venelle. oMAC : Open Model for Automotive Cybersecurity. escar Europe 2019, Nov 2019, Stuttgart, Germany. ⟨hal-02498302⟩
  • Cédric Eichler, Pascal Berthomé, Jacques Chabin, Rachid Echahed, Mirian Halfeld-Ferrari, et al.. SEmantic Networks of Data: Utility and Privacy. Atelier sur la Protection de la Vie Privée (APVP'19), Jul 2019, Cap Hornu, France. ⟨hal-02182524⟩
  • Fergal Martin-Tricot, Cédric Eichler, Pascal Berthomé. Industrial Internet of Things: Security of Interoperability. RESSI, May 2019, Erquy, France. ⟨hal-03021574⟩
  • Fergal Martin-Tricot, Pascal Berthomé, Cédric Eichler. Interopérabilité dans l'Internet des Objets : Étude et mise en œuvre. Journée des Doctorants CEA, Oct 2018, Blois, France. ⟨hal-01951321⟩
  • Arnaud Lefray, Eddy Caron, Jonathan Rouzaud-Cornabas, Zhang Huaxi Yulin, Aline Bousquet, et al.. Security-Aware Models for Clouds. 22th IEEE International Symposium on High Performance Distributed Computing, Jun 2013, New York, United States. 2013. ⟨hal-00840734⟩
  • Damien Gros, Jérémy Briffaut, Christian Toinard, Mathieu Blanc. Advanced MAC in HPC systems: performance improvement. CCGRID'12, May 2012, Ottawa, Canada. ⟨hal-01079329⟩

Proceedings/Recueil des communications

  • Ridwane Aissaoui, Jean-Christophe Deneuville, Christophe Guerber, Alain Pirovano. A Performant Quantum-Resistant KEM for Constrained Hardware: Optimized HQC. 21st International Conference on Security and Cryptography, SCITEPRESS - Science and Technology Publications, pp.668-673, 2024, 978-989-758-709-2. ⟨10.5220/0012757800003767⟩. ⟨hal-04699351⟩
  • Yohan Boichut, Adrien Boiret, Vincent Hugot. SAT-Based Automated Completion for Reachability Analysis. International Conference on Implementation and Application of Automata, 2024. ⟨hal-04605772⟩

Chapitres d'ouvrage

  • Marta Bílková, Sabine Frittella, Daniil Kozhemiachenko. Paraconsistent Gödel Modal Logic. Automated Reasoning, 13385, Springer International Publishing, pp.429-448, 2022, Lecture Notes in Computer Science, ⟨10.1007/978-3-031-10769-6_26⟩. ⟨hal-03825253⟩
  • Axel Michel, Benjamin Nguyen, Philippe Pucheral. The Case for Personalized Anonymization of Database Query Results. Joaquim Filipe; Jorge Bernardino; Christoph Quix. Data Management Technologies and Applications (DATA'17 Revised Selected Papers), 814, Springer, pp.261-285, 2018, Communications in Computer and Information Science, 978-3-319-94808-9. ⟨hal-01945674⟩
  • Jérémy Briffaut, Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas. Honeypot forensics for system and network SIEM design. Guillermo Suárez de Tangil and Esther Palomar. Advances in Security Information Management: Perceptions and Outcomes, Nova Science Publishers, pp.181-216, 2013, Computer Science, Technology and Applications, Computer Networks, 978-1-62417-221-2. ⟨hal-00677340⟩

Autres publications

  • Adrien Boiret, Cédric Eichler, Benjamin Nguyen, Sara Taki. Granon: un moteur formel de procédures d'assainissement de données graphes. 2023. ⟨hal-04354037⟩
  • Adrien Boiret, Cédric Eichler, Benjamin Nguyen, Sara Taki. Privacy Operators for Semantic Graph Databases as Graph Rewriting. 2023. ⟨hal-04354000⟩
  • Laurent Bobelin, Killian Durand, Nadège Fichot, Adrien Jousse, Yannick Kergosien, et al.. Aide à la planification de la prise en charge d’enfants handicapés moteurs. 2017. ⟨hal-01966675⟩
  • Nicolas Aragon, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Adrien Hauteville, et al.. LOCKER - LOw rank parity ChecK codes EncRyption. 2017, http://nicolas-aragon.fr/locker/. ⟨hal-01946962⟩
  • Carlos Aguilar Melchor, Nicolas Aragon, Slim Bettaieb, Loïc Bidoux, Olivier Blazy, et al.. Hamming Quasi-Cyclic (HQC). 2017, https://pqc-hqc.org/. ⟨hal-01946880⟩
  • Nicolas Aragon, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Adrien Hauteville, et al.. LAKE - Low rAnk parity check codes Key Exchange. 2017, http://nicolas-aragon.fr/lake. ⟨hal-01946967⟩
  • Carlos Aguilar Melchor, Nicolas Aragon, Slim Bettaieb, Loïc Bidoux, Olivier Blazy, et al.. Rank Quasi-Cyclic (RQC). 2017, https://pqc-rqc.org/. ⟨hal-01946894⟩
  • Carlos Aguilar Melchor, Nicolas Aragon, Slim Bettaieb, Loïc Bidoux, Olivier Blazy, et al.. Ouroboros-R. 2017, https://pqc-ouroborosr.org/. ⟨hal-01946902⟩

Pré-publications, Documents de travail

  • Marta Bílková, Sabine Frittella, Daniil Kozhemiachenko, Ondrej Majer, Krishna Manoorkar. Describing and Quantifying Contradiction between Pieces of Evidence via Belnap Dunn Logic and Dempster-Shafer Theory. 2023. ⟨hal-04051113⟩
  • Siva Anantharaman, Sabine Frittella, Benjamin Nguyen. Distributed Transition Systems with Tags for Privacy Analysis. 2022. ⟨hal-03623522v3⟩
  • Marco Baldi, Jean-Christophe Deneuville, Edoardo Persichetti, Paolo Santini. Cryptanalysis of a code-based signature scheme without trapdoors. 2021. ⟨hal-03687511⟩
  • Willem Conradie, Sabine Frittella, Krishna Manoorkar, Sajad Nazari, Alessandra Palmigiano, et al.. Rough concepts. 2020. ⟨hal-02504608⟩
  • Jean-Christophe Deneuville, Philippe Gaborit. Cryptanalysis of a code-based one-time signature. 2018. ⟨hal-01961491⟩
  • Sabine Frittella, Giuseppe M Greco, Michele Piazzai, Nachoem M Wijnberg, Fan M Yang. Matthew Effects via Team Semantics. 2017. ⟨hal-01509419⟩
  • Willem Conradie, Sabine Frittella, Alessandra Palmigiano, Michele M Piazzai, Apostolos Tzimoulis, et al.. Towards an epistemic-logical theory of categorization. 2017. ⟨hal-01509418⟩

Rapports

  • Cédric Eichler, Benjamin Nguyen, Sara Taki, Adrien Boiret. D3 - Final Use-Cases Specification. INSA Centre Val de Loire. 2023. ⟨hal-04265485⟩
  • Cédric Eichler. Specification of data and databases. INSA Centre Val de Loire. 2023. ⟨hal-04265250⟩
  • Jacques Chabin, Cédric Eichler, Mirian Halfeld-Ferrari, Nicolas Hiot. Graph Rewriting System for Consistent Evolution of RDF/S databases. [Research Report] LIFO, Université d'Orléans, INSA Centre Val de Loire. 2020. ⟨hal-02560325v3⟩
  • Jacques Chabin, Cédric Eichler, Mirian Halfeld-Ferrari, Nicolas Hiot. Specification of side-effect management techniques for semantic graph sanitization. [Research Report] LIFO, Université d'Orléans, INSA Centre Val de Loire. 2020. ⟨hal-02957974⟩
  • Arnaud Lefray, Jonathan Rouzaud-Cornabas, Jérémy Briffaut, Christian Toinard. Security for Cloud Environment through Information Flow Properties Formalization with a First-Order Temporal Logic. [Research Report] RR-8420, INRIA. 2013, pp.30. ⟨hal-00916882⟩
  • Patrice Clemente, Jonathan Rouzaud-Cornabas. Security and Virtualization: a Survey. [Research Report] INSA CVL - Institut National des Sciences Appliquées - Centre Val de Loire; LIFO, Université d'Orléans, INSA Centre Val de Loire. 2011. ⟨hal-03226336⟩

Thèses

  • Sara Taki. Linked Data Sanitization with Differential Privacy. Computer Science [cs]. INSA Centre Val de Loire, 2023. English. ⟨NNT : 2023ISAB0009⟩. ⟨tel-04688533⟩
  • Adrien Jousse. Mandatory protection checked against the automotive sector’s safety objectives. Computer Science [cs]. INSA CVL - Institut National des Sciences Appliquées - Centre Val de Loire, 2022. English. ⟨NNT : 2022ISAB0002⟩. ⟨tel-04645556⟩
  • Salwa Souaf. Formal Methods meet Security in a Cost Aware Cloud Brokerage Solution. Computer Science [cs]. INSA CVL - Institut National des Sciences Appliquées - Centre Val de Loire, 2020. English. ⟨NNT : ⟩. ⟨tel-03616187⟩

Habilitations à diriger des recherches

  • Radu Ciucanu. Secure Outsourced Data Analytics. Databases [cs.DB]. Université d'Orléans, 2021. ⟨tel-03256882⟩