Publications



74 documents

Journal articles

  • Alessandra de Rosa, Phil Uttley, Lijun Gou, Yuan Liu, Cosimo Bambi, et al.. Accretion in strong field gravity with eXTP. SCIENCE CHINA Physics, Mechanics & Astronomy, 2019, 62 (2), ⟨10.1007/s11433-018-9297-0⟩. ⟨hal-02348816⟩
  • Nicolas Anciaux, Philippe Bonnet, Luc Bouganim, Benjamin Nguyen, Philippe Pucheral, et al.. Personal Data Management Systems: The security and functionality standpoint. Information Systems, Elsevier, 2019, 80, pp.13 - 35. ⟨10.1016/j.is.2018.09.002⟩. ⟨hal-01898705⟩
  • Adrien Boiret, Vincent Hugot, Joachim Niehren, Ralf Treinen. Logics for Unordered Trees with Data Constraints. Journal of Computer and System Sciences, Elsevier, 2019, pp.40. ⟨10.1016/j.jcss.2018.11.004⟩. ⟨hal-01176763v2⟩
  • Carlos Aguilar-Melchor, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor. Efficient Encryption From Random Quasi-Cyclic Codes. IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2018, 64 (5), pp.3927-3943. ⟨hal-01951335⟩
  • Ilhem Khlif, Mohamed Hadj Kacem, Cédric Eichler, Ahmed Hadj Kacem. A multi-scale modeling approach for systems of systems architectures. ACM SIGAPP Applied Computing Review (ACM Digital Library), Association for Computing Machinery (ACM), 2017, 17 (3), pp.17 - 26. ⟨10.1145/3161534.3161536⟩. ⟨hal-01643760⟩
  • Willem Conradie, Sabine Frittella, Alessandra Palmigiano, Michele Piazzai, Apostolos Tzimoulis, et al.. Toward an Epistemic-Logical Theory of Categorization. Electronic Proceedings in Theoretical Computer Science, EPTCS, 2017, 251, pp.167 - 186. ⟨10.4204/EPTCS.251.12⟩. ⟨hal-01723893⟩
  • Wilson A. Higashino, Cédric Eichler, Miriam Capretz, Luiz F. Bittencourt, Thierry Monteil. Attributed Graph Rewriting for Complex Event Processing Self-Management. ACM Transactions on Autonomous and Adaptive Systems, Association for Computing Machinery (ACM), 2016, 11 (3), pp.article n° 19. ⟨10.1145/2967499⟩. ⟨hal-01369701⟩
  • Cuong Quoc To, Benjamin Nguyen, Philippe Pucheral. Private and Scalable Execution of SQL Aggregates on a Secure Decentralized Architecture. ACM Transactions on Database Systems, Association for Computing Machinery, 2016, 41 (3), pp.46. ⟨hal-01296432⟩
  • Nicolas Anciaux, Benjamin Nguyen. Gestion sécurisée de données personnelles. 1024 : Bulletin de la Société Informatique de France, Société Informatique de France, 2015, pp.17-41. ⟨hal-01179047⟩
  • Benjamin Nguyen. Techniques d'anonymisation. Statistique et Société, Société française de statistique, 2014, 2 (4), pp.53-60. ⟨hal-01113412⟩
  • Mathieu Blanc, Jérémy Briffaut, Christian Toinard, Damien Gros. PIGA-HIPS: Protection of a shared HPC cluster. International Journal On Advances in Security, IARIA, 2011, 4 (1), pp.44-53. ⟨hal-00671586⟩

Conference papers

  • Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare. Secure Best Arm Identification in Multi-Armed Bandits. ISPEC 2019 : The 15th International Conference on Information Security Practice and Experience, Nov 2019, Kuala Lumpur, Malaysia. ⟨hal-02270418⟩
  • Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye. Secure Strassen-Winograd Matrix Multiplication with MapReduce. International Conference on Security and Cryptography (SECRYPT), Jul 2019, Prague, Czech Republic. pp.220-227. ⟨hal-02129149⟩
  • Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye. Secure Intersection with MapReduce. International Conference on Security and Cryptography (SECRYPT), Jul 2019, Prague, Czech Republic. pp.236-243, ⟨10.5220/0007918902360243⟩. ⟨hal-02273966⟩
  • Cédric Eichler, Pascal Berthomé, Jacques Chabin, Rachid Echahed, Mirian Ferrari, et al.. SEmantic Networks of Data: Utility and Privacy. RESSI 2019: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. ⟨hal-02182521⟩
  • Benjamin Nguyen, Françoise Fessant, Arnaud Hourson, Lucas Laise. Atelier : Sécurité informatique et protection de la vie privée : pratiques et perspectives dans les entreprises. Human Tech Days, Jan 2019, Tours, France. ⟨hal-01994883⟩
  • Benjamin Nguyen. Tutoriel : Anonymization Techniques : Theory and Practice. Ecole d'été EGC, Jan 2019, Metz, France. ⟨hal-01994875⟩
  • Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye. Secure Joins with MapReduce. FPS 2018 : The 11th International Symposium on Foundations & Practice of Security, Nov 2018, Montreal, Canada. ⟨hal-01903098⟩
  • Samuel Balco, Sabine Frittella, Giuseppe Greco, Alexander Kurz, Alessandra Palmigiano. Software Tool Support for Modular Reasoning in Modal Logics of Actions. 9th International Conference on Interactive Theorem Proving, Jul 2018, Oxford, United Kingdom. ⟨hal-01836507⟩
  • Jean-Christophe Deneuville, Philippe Gaborit, Qian Guo, Thomas Johansson. Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol. IEEE International Symposium on Information Theory, Jun 2018, Vail, Colorado, USA, United States. ⟨hal-01946358⟩
  • Jean-Christophe Deneuville. Post-Quantum Cryptography: tomorrow’s security. Envirorisk, Forum de la gestion des risques naturels et technologiques, Jun 2018, Bourges, France. ⟨hal-01946368⟩
  • Jean-Claude Fondras, Marie-Elisabeth Labat, Christian Toinard. A reasoning approach towards Ethics-Based Medicine and care of disabled people. Envirorisk, Jun 2018, Bourges, France. ⟨hal-01959546⟩
  • Laurent Bobelin, Khalil Drira, Cédric Eichler. Toward a Formal Multiscale Architectural Framework for Emerging Properties Analysis in Systems of Systems. 13th Annual Conference on System of Systems Engineering (SoSE 2018 ), Jun 2018, Paris, France. ⟨10.1109/SYSOSE.2018.8428736⟩. ⟨hal-01895173⟩
  • Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Philippe Gaborit, Tancrède Lepoint, Thomas Ricosset. Delegating Elliptic-Curve Operations with Homomorphic Encryption. IEEE Conference on Communications and Network Security, May 2018, Pékin, China. ⟨hal-01946364⟩
  • Benjamin Nguyen. Personalized k-anonymity. 4th Franco-Japanese Workshop on Cybersecurity, May 2018, Annecy, France. ⟨hal-01994719⟩
  • Ilhem Khlif, Imen Tounsi, Mohamed Hadj Kacem, Cédric Eichler, Ahmed Hadj Kacem. A refinement-based approach for specifying multi-scale software architectures. 33rd annual ACM Symposium on Applied Computing, Apr 2018, Pau, France. ⟨10.1145/3167132.3167309⟩. ⟨hal-01836351⟩
  • Cédric Eichler, Khalil Drira, Thierry Monteil, Patricia Stolf. Correctness by construction and style preserving reconfigurations of system of systems. 33rd annual ACM Symposium on Applied Computing (SAC'2018), Apr 2018, Pau, France. 7p., ⟨10.1145/3167132.3167312⟩. ⟨hal-01836357⟩
  • Jean-Claude Fondras, Marie-Elisabeth Labat, Christian Toinard. De l’éthique de la numérisation de la santé à la numérisation de l’éthique de la santé. Espace de Réflexion Ethique de la Région Centre Val de Loire (ERERC), 2018, Tours, France. ⟨hal-01959555⟩
  • Benjamin Nguyen. Personalized Anonymization or the art of Private (Fair ?) Data Processing. Workshop on Social Responsability of Algorithms, Université de Paris Dauphine, Dec 2017, Paris, France. ⟨hal-01994712⟩
  • Laurent Bobelin, Christian Toinard, Tuan Tran, Stéphane Moinard. A Software Test Approach to Evaluate the Enforcement of a Workflow Engine. 2017 International Conference on Software Engineering Research and Practice, Jul 2017, Las Vegas, United States. pp.31-37. ⟨hal-01966672⟩
  • Laurent Bobelin, Andrès Gil, Christian Toinard, Marie-Elisabeth Labat. E-HandicapScale : an open and secure way to promote and improve diagnostics of disabled patients: Use cases for patients with post-stroke hemiplegia to children with cerebral palsy. 2017 International Conference on Health Informatics and Medical Systems, Jul 2017, Las Vegas, United States. ⟨hal-01966667⟩
  • Benjamin Nguyen. What is Fair Data Processing ?. ISI 61st World Statistics Congress, Jul 2017, Marrakech, Morocco. ⟨hal-02014059⟩
  • Cédric Eichler, Pascal Berthomé, Benjamin Nguyen. Projet GIRAFON: Protection de la vie privée dans le cadre de l'interrogation, la fouille et l'analyse de grands graphes. RESSI 2017: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2017, Autrans, France. ⟨hal-01985987⟩
  • Maria Evgenia G. Rossi, Pascal Berthomé, Cédric Eichler, Benjamin Nguyen. Private, Secure and Distributed Computation of k-cores. Atelier sur la Protection de la Vie Privée (APVP'17), 2017, Autrans, France. ⟨hal-01975143⟩
  • Axel Michel, Benjamin Nguyen, Philippe Pucheral. Managing Distributed Queries under Personalized Anonymity Constraints. 6th International Conference on Data Science, Technology and Applications - DATA 2017, 2017, Madrid, Spain. ⟨hal-01682316⟩
  • Ilhem Khlif, Mohamed Hadj Kacem, Cédric Eichler, Khalil Drira, Ahmed Hadj Kacem. Multi-scale modeling for software-intensive systems-of-systems architectures. International Colloquium on Software-intensive Systems-of-Systems at 10th European Conference on Software Architecture , Nov 2016, Copenhagen, Denmark. 6p., ⟨10.1145/3175731.3176179⟩. ⟨hal-01836346⟩
  • Axel Michel, Benjamin Nguyen, Philippe Pucheral. Exécution de requêtes distribuées sous contraintes d'anonymat. 32ème Conférence sur la Gestion de Données - Principes, Technologies et Applications, Nov 2016, Poitiers, France. ⟨hal-01424989⟩
  • Axel Michel, Benjamin Nguyen. Managing distributed queries under anonymity constraints. 7e Atelier sur la Protection de la Vie Privée, Jul 2016, Toulouse, France. ⟨hal-01424993⟩
  • Marie-Elisabeth Labat, Christian Toinard. Ethique et risques pour la prise en charge du handicap. Envirorisk, 2016, Bourges, France. ⟨hal-01959548⟩
  • Yannick Kergosien, Christian Toinard. Risques liés à la planification des emplois du temps pour la prise en charge d’enfants handicapés. Envirorisk, 2016, Bourges, France. ⟨hal-01959553⟩
  • Cuong Quoc To, Benjamin Nguyen, Philippe Pucheral. TrustedMR : Un système MapReduce de confiance basé sur l'utilisation de matériel sécurisé. 31ème Conférence sur la Gestion de Données — Principes, Technologies et Applications – BDA 2015 2, Sep 2015, Porquerolles, France. ⟨hal-01296448⟩
  • Aline Bousquet, Jérémy Briffaut, Christian Toinard. An autonomous Cloud management system for in-depth security.. Les Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2015), May 2015, Troyes, France. ⟨hal-01191746⟩
  • Daniel Le Métayer, Benjamin Nguyen, Josep Domingo-Ferrer, Mark Elliott, Antoinette Rouvroy, et al.. To be or not to be (anonymous)?: Anonymyity in the age of big and open data.. International Conference on Computers, Privacy and Data Protection (CPDP 2015), Jan 2015, Bruxelles, Belgium. ⟨hal-01296465⟩
  • Aline Bousquet, Jérémy Briffaut, Christian Toinard. An autonomous Cloud management system for in-depth security. 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), Oct 2014, Luxembourg, Luxembourg. ⟨10.1109/CloudNet.2014.6969023⟩. ⟨hal-01131866⟩
  • Laurent Bobelin, Aline Bousquet, Jérémy Briffaut, Eddy Caron, Jean-François Couturier, et al.. An Advanced Security-Aware Cloud Architecture. HPCS 2014 - The 2014 International Conference on High Performance Computing & Simulation, Jul 2014, Bologne, Italy. ⟨hal-01063852⟩
  • Eddy Caron, Le Anh Dung, Arnaud Lefray, Christian Toinard. Definition of security metrics for the Cloud Computing and security-aware virtual machine placement algorithms. International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2013), Oct 2013, Beijing, China. pp.125-131. ⟨hal-00932401⟩
  • Mathieu Blanc, Damien Gros, Jérémy Briffaut, Christian Toinard. PIGA-Cluster: a distributed architecture integrating a shared and resilient reference monitor to enforce mandatory access control in the HPC environment. SHPCS - 8th International Workshop on Security and High Performance Computing Systems - 2013, Jul 2013, Helsinki, Finland. ⟨hal-00840736⟩
  • Mathieu Blanc, Damien Gros, Jérémy Briffaut, Christian Toinard. Mandatory access control with a multi-level reference monitor: PIGA-cluster. ACM CLHS '13 Proceedings of the first workshop on Changing landscapes in HPC security, Jun 2013, New-York, United States. pp.1-8, ⟨10.1145/2465808.2465809⟩. ⟨hal-00840735⟩
  • Aline Bousquet, Jérémy Briffaut, Laurent Clévy, Christian Toinard, Benjamin Venelle. Mandatory Access Control for the Android Dalvik Virtual Machine. 2013 - USENIX Federated Conferences, ESOS: Workshop on Embedded Self-Organizing Systems, Jun 2013, San Jose, United States. ⟨hal-00840732⟩
  • Stéphane Betge-Brezetz, Aline Bousquet, Jérémy Briffaut, Eddy Caron, Laurent Clévy, et al.. Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures. The Future Internet - Future Internet Assembly 2013, 2013, Dublin, Ireland. pp.153-158, ⟨10.1007/978-3-642-38082-2_13⟩. ⟨hal-00840730⟩
  • Pierre Clairet, Pascal Berthomé, Jérémy Briffaut. Compression de signatures pour PIGA IDS. 9ème édition de la conférence MAnifestation des JEunes Chercheurs en Sciences et Technologies de l'Information et de la Communication - MajecSTIC 2012 (2012), Nicolas Gouvy, Oct 2012, Villeneuve d'Ascq, France. ⟨hal-00780205⟩
  • Damien Gros, Mathieu Blanc, Jérémy Briffaut, Christian Toinard. PIGA-Windows : contrôle des flux d'information avancés sur les systèmes d'exploitation Windows 7. Majestic 2012, Oct 2012, Lille, France. ⟨hal-00771337⟩
  • Pascal Berthomé, Jérémy Briffaut, Pierre Clairet. Compacting Security Signatures for PIGA IDS. SECURWARE-2012, Aug 2012, Rome, Italy. pp.126--133. ⟨hal-00770935⟩
  • Mathieu Blanc, Jérémy Briffaut, Christian Toinard, Damien Gros. Advanced MAC in HPC systems: performance improvement. CCGrid 2012 -- The 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2012, Ottawa, Canada. ⟨hal-00671770⟩
  • Jérémy Briffaut, Jonathan Rouzaud-Cornabas, Christian Toinard, Emilie Lefebvre. PIGA-Virt: an Advanced Distributed MAC Protection of Virtual Systems. Euro-Par 2011 Parallel Processing Workshops, Lecture Notes in Computer Science, Aug 2011, Bordeaux, France. pp.8-19. ⟨hal-00671592⟩
  • Jérémy Briffaut, Martin Peres, Christian Toinard, Jonathan Rouzaud-Cornabas, Benjamin Venelle, et al.. PIGA-OS : Retour sur le Système d'Exploitation Vainqueur du Défi Sécurité. RenPar'20 / SympA'14 / CFSE 8, 8ème Conférence Francaise en Systèmes d'Exploitation, RenPar'20 / SympA'14 / CFSE 8, May 2011, Saint-Malo, France. ⟨hal-00671591⟩

Poster communications

  • Cédric Eichler, Pascal Berthomé, Jacques Chabin, Rachid Echahed, Mirian Ferrari, et al.. SEmantic Networks of Data: Utility and Privacy. Atelier sur la Protection de la Vie Privée (APVP'19), Jul 2019, Cap Hornu, France. ⟨hal-02182524⟩
  • Fergal Martin-Tricot, Pascal Berthomé, Cédric Eichler. Interopérabilité dans l'Internet des Objets : Étude et mise en œuvre. Journée des Doctorants CEA, Oct 2018, Blois, France. ⟨hal-01951321⟩
  • Arnaud Lefray, Eddy Caron, Jonathan Rouzaud-Cornabas, Zhang Huaxi Yulin, Aline Bousquet, et al.. Security-Aware Models for Clouds. 22th IEEE International Symposium on High Performance Distributed Computing, Jun 2013, New York, United States. 2013. ⟨hal-00840734⟩
  • Damien Gros, Jérémy Briffaut, Christian Toinard, Mathieu Blanc. Advanced MAC in HPC systems: performance improvement. CCGRID'12, May 2012, Ottawa, Canada. ⟨hal-01079329⟩

Book sections

  • Axel Michel, Benjamin Nguyen, Philippe Pucheral. The Case for Personalized Anonymization of Database Query Results. Joaquim Filipe; Jorge Bernardino; Christoph Quix. Data Management Technologies and Applications (DATA'17 Revised Selected Papers), 814, Springer, pp.261-285, 2018, Communications in Computer and Information Science, 978-3-319-94808-9. ⟨hal-01945674⟩

Other publications

  • Laurent Bobelin, Killian Durand, Nadège Fichot, Adrien Jousse, Yannick Kergosien, et al.. Aide à la planification de la prise en charge d’enfants handicapés moteurs. 2017. ⟨hal-01966675⟩
  • Carlos Aguilar Melchor, Nicolas Aragon, Slim Bettaieb, Loïc Bidoux, Olivier Blazy, et al.. Ouroboros-R. 2017, https://pqc-ouroborosr.org/. ⟨hal-01946902⟩
  • Nicolas Aragon, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Adrien Hauteville, et al.. LAKE - Low rAnk parity check codes Key Exchange. 2017, http://nicolas-aragon.fr/lake. ⟨hal-01946967⟩
  • Nicolas Aragon, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Adrien Hauteville, et al.. LOCKER - LOw rank parity ChecK codes EncRyption. 2017, http://nicolas-aragon.fr/locker/. ⟨hal-01946962⟩
  • Carlos Aguilar-Melchor, Nicolas Aragon, Slim Bettaieb, Loïc Bidoux, Olivier Blazy, et al.. Hamming Quasi-Cyclic (HQC). 2017, https://pqc-hqc.org/. ⟨hal-01946880⟩
  • Carlos Aguilar Melchor, Nicolas Aragon, Slim Bettaieb, Loïc Bidoux, Olivier Blazy, et al.. Rank Quasi-Cyclic (RQC). 2017, https://pqc-rqc.org/. ⟨hal-01946894⟩

Preprints, Working Papers, ...

  • Jean-Christophe Deneuville, Philippe Gaborit. Cryptanalysis of a code-based one-time signature. 2018. ⟨hal-01961491⟩
  • Willem Conradie, Sabine Frittella, Alessandra Palmigiano, Michele Piazzai, Apostolos Tzimoulis, et al.. Towards an epistemic-logical theory of categorization. 2017. ⟨hal-01509418⟩
  • Sabine Frittella, Giuseppe Greco, Michele Piazzai, Nachoem Wijnberg, Fan Yang. Matthew Effects via Team Semantics. 2017. ⟨hal-01509419⟩
  • Willem Conradie, Sabine Frittella, Alessandra Palmigiano, Apostolos Tzimoulis, Nachoem Wijnberg. Probabilistic Epistemic Updates on Algebras. 2017. ⟨hal-01509416⟩

Reports

  • Arnaud Lefray, Jonathan Rouzaud-Cornabas, Jérémy Briffaut, Christian Toinard. Security for Cloud Environment through Information Flow Properties Formalization with a First-Order Temporal Logic. [Research Report] RR-8420, INRIA. 2013, pp.30. ⟨hal-00916882⟩

Theses

  • Axel Michel. Personalizing Privacy Constraints in Generalization-based Anonymization Models. Cryptography and Security [cs.CR]. INSA Centre Val de Loire, 2019. English. ⟨tel-02269565⟩
  • Yuan Liu. Procédé Tactile à Diffraction Ultrasonore. Mécanique des structures [physics.class-ph]. Ecole nationale supérieure d'arts et métiers - ENSAM, 2010. Français. ⟨NNT : 2010-ENAM-0049⟩. ⟨tel-00691531⟩