Publications



119 documents

Journal articles

  • Jacques Chabin, Cédric Eichler, Mirian Halfeld Ferrari, Nicolas Hiot. Graph rewriting rules for RDF database evolution: optimizing side-effect processing. International Journal of Web Information Systems, Emerald Publishing Limited, 2021, ahead-of-print (ahead-of-print), ⟨10.1108/IJWIS-03-2021-0033⟩. ⟨hal-03329965⟩
  • Ilhem Khlif, Mohamed Hadj Kacem, Cédric Eichler, Khalil Drira, Ahmed Hadj Kacem. A model transformation approach for multiscale modeling of software architectures applied to smart cities. Concurrency and Computation: Practice and Experience, Wiley, 2021, ⟨10.1002/cpe.6298⟩. ⟨hal-03282430⟩
  • Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade. A Faster Cryptographer's Conspiracy Santa. Theoretical Computer Science, Elsevier, 2020, 839, pp.122-134. ⟨10.1016/j.tcs.2020.05.034⟩. ⟨hal-02611751⟩
  • Sabine Frittella, Krishna Manoorkar, Alessandra Palmigiano, Apostolos Tzimoulis, Nachoem M. Wijnberg. Toward a Dempster-Shafer theory of concepts. International Journal of Approximate Reasoning, Elsevier, 2020, 125, pp.14-25. ⟨10.1016/j.ijar.2020.05.004⟩. ⟨hal-02504595⟩
  • Willem Conradie, Sabine Frittella, Krishna Manoorkar, Sajad Nazari, Alessandra Palmigiano, et al.. Rough concepts. Information Sciences, Elsevier, 2020, ⟨10.1016/j.ins.2020.05.074⟩. ⟨hal-02913405⟩
  • Themba Dube, Mojtaba Ghirati, Sajad Nazari, Ali Taherifar. Rings in which idempotents generate maximal or minimal ideals. Algebra Universalis, Springer Verlag, 2020, 81 (3), ⟨10.1007/s00012-020-00660-y⟩. ⟨hal-02913406⟩
  • Benjamin Nguyen, Claude Castelluccia. Techniques d'anonymisation tabulaire : concepts et mise en oeuvre. 1024 : Bulletin de la Société Informatique de France, Société Informatique de France, 2020, pp.23-41. ⟨hal-02570847⟩
  • Willem Conradie, Sabine Frittella, Alessandra Palmigiano, Apostolos Tzimoulis, Nachoem Wijnberg. Probabilistic Epistemic Updates on Algebras. ACM Transactions on Computational Logic, Association for Computing Machinery, 2019, 20 (4), pp.1-75. ⟨10.1145/3341725⟩. ⟨hal-02973836⟩
  • Adrien Boiret, Vincent Hugot, Joachim Niehren, Ralf Treinen. Logics for Unordered Trees with Data Constraints. Journal of Computer and System Sciences, Elsevier, 2019, pp.40. ⟨10.1016/j.jcss.2018.11.004⟩. ⟨hal-01176763v2⟩
  • Nicolas Anciaux, Philippe Bonnet, Luc Bouganim, Benjamin Nguyen, Philippe Pucheral, et al.. Personal Data Management Systems: The security and functionality standpoint. Information Systems, Elsevier, 2019, 80, pp.13-35. ⟨10.1016/j.is.2018.09.002⟩. ⟨hal-01898705⟩
  • Carlos Aguilar Melchor, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Gilles Zémor. Efficient Encryption From Random Quasi-Cyclic Codes. IEEE Transactions on Information Theory, Institute of Electrical and Electronics Engineers, 2018, 64 (5), pp.3927-3943. ⟨hal-01951335⟩
  • Ilhem Khlif, Mohamed Hadj Kacem, Cédric Eichler, Ahmed Hadj Kacem. A multi-scale modeling approach for systems of systems architectures. ACM SIGAPP applied computing review : a publication of the Special Interest Group on Applied Computing, Association for Computing Machinery (ACM), 2017, 17 (3), pp.17 - 26. ⟨10.1145/3161534.3161536⟩. ⟨hal-01643760⟩
  • Willem Conradie, Sabine Frittella, Alessandra Palmigiano, Apostolos Tzimoulis, Nachoem Wijnberg. Toward an Epistemic-Logical Theory of Categorization. Electronic Proceedings in Theoretical Computer Science, EPTCS, 2017, 251, pp.167 - 186. ⟨10.4204/EPTCS.251.12⟩. ⟨hal-01509416⟩
  • Wilson A. Higashino, Cédric Eichler, Miriam Capretz, Luiz F. Bittencourt, Thierry Monteil. Attributed Graph Rewriting for Complex Event Processing Self-Management. ACM Transactions on Autonomous and Adaptive Systems, Association for Computing Machinery (ACM), 2016, 11 (3), pp.article n° 19. ⟨10.1145/2967499⟩. ⟨hal-01369701⟩
  • Cuong Quoc To, Benjamin Nguyen, Philippe Pucheral. Private and Scalable Execution of SQL Aggregates on a Secure Decentralized Architecture. ACM Transactions on Database Systems, Association for Computing Machinery, 2016, 41 (3), pp.46. ⟨10.1145/2894750⟩. ⟨hal-01296432⟩
  • Nicolas Anciaux, Benjamin Nguyen. Gestion sécurisée de données personnelles. 1024 : Bulletin de la Société Informatique de France, Société Informatique de France, 2015, pp.17-41. ⟨hal-01179047⟩
  • Waleed Smari, Patrice Clemente, Jean-François Lalande. An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system. Future Generation Computer Systems, Elsevier, 2014, 31, pp.147-168. ⟨10.1016/j.future.2013.05.010⟩. ⟨hal-00835887⟩
  • Benjamin Nguyen. Techniques d'anonymisation. Statistique et Société, Société française de statistique, 2014, 2 (4), pp.53-60. ⟨hal-01113412⟩
  • Mathieu Blanc, Jérémy Briffaut, Christian Toinard, Damien Gros. PIGA-HIPS: Protection of a shared HPC cluster. International Journal On Advances in Security, IARIA, 2011, 4 (1), pp.44-53. ⟨hal-00671586⟩
  • Jonathan Rouzaud-Cornabas, Patrice Clemente, Christian Toinard. An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OS. International Journal On Advances in Software, IARIA, 2011, 4 (1&2), pp.34-45. ⟨hal-03226326⟩
  • Patrice Clemente, Jonathan Rouzaud-Cornabas, Christian Toinard. From a Generic Framework for Expressing Integrity Properties to a Dynamic MAC Enforcement for Operating Systems. LNCS Transactions on Computational Science, Springer, 2010, pp._. ⟨hal-00511130⟩
  • Mathieu Blanc, Patrice Clemente, Jonathan Rouzaud-Cornabas, Christian Toinard. Classification of malicious distributed SELinux activities. Journal of Computers (JCP), Academy Publisher, 2009, 4 (5), pp.423-432. ⟨10.4304/jcp.4.5.423-432⟩. ⟨hal-00459817⟩

Conference papers

  • Sandrine da Col, Radu Ciucanu, Marta Soare, Nassim Bouarour, Sihem Amer-Yahia. DashBot: An ML-Guided Dashboard Generation System. ACM International Conference on Information and Knowledge Management (CIKM) - Demo track. Accepté, à paraître, Nov 2021, Online, Australia. ⟨hal-03320843⟩
  • Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare. Secure Outsourcing of Multi-Armed Bandits. 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020), Dec 2020, Conférence online, China. pp.202-209. ⟨hal-02953292⟩
  • Antoine Boutet, Mathieu Cunche, Sébastien Gambs, Benjamin Nguyen, Antoine Laurent. DARC : Data Anonymization and Re-identification Challenge. RESSI 2020 - Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, Dec 2020, Nouan-le-Fuzelier, France. ⟨hal-02512677v2⟩
  • Radu Ciucanu, Anatole Delabrouille, Pascal Lafourcade, Marta Soare. Secure Cumulative Reward Maximization in Linear Stochastic Bandits. International Conference on Provable and Practical Security (ProvSec), Nov 2020, Conférence online, Singapore. pp.257-277, ⟨10.1007/978-3-030-62576-4_13⟩. ⟨hal-02942694⟩
  • Radu Ciucanu, Pascal Lafourcade. Demonstration of GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation. International Semantic Web Conference (ISWC) - Demo Track, Nov 2020, Conférence online, Greece. ⟨hal-02942717⟩
  • Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Thyla van der Merwe. Designing Reverse Firewalls for the Real World. ESORICS 2020, Sep 2020, Guildford, United Kingdom. pp.193-213, ⟨10.1007/978-3-030-58951-6_10⟩. ⟨hal-03225846⟩
  • Radu Ciucanu, Pascal Lafourcade. GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation. 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec'20), Jun 2020, Conférence online, Germany. pp.347-366, ⟨10.1007/978-3-030-49669-2_20⟩. ⟨hal-02544920⟩
  • Fergal Martin-Tricot, Cédric Eichler, Pascal Berthomé. An Enrolment Gateway for Data Security in Heterogeneous Industrial Internet of Things. 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises - WETICE 2020, 2020, Bayonne (Virtual Conference), France. ⟨hal-02960931⟩
  • Jacques Chabin, Cédric Eichler, Mirian Halfeld-Ferrari, Nicolas Hiot. Graph Rewriting Rules for RDF Database Evolution Management. International Conference on Information Integration and Web-based Applications & Services, 2020, Chiang Mai (On line), Thailand. ⟨hal-02956728⟩
  • Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare. Secure Best Arm Identification in Multi-Armed Bandits. ISPEC 2019 : The 15th International Conference on Information Security Practice and Experience, Nov 2019, Kuala Lumpur, Malaysia. ⟨10.1007/978-3-030-34339-2_9⟩. ⟨hal-02270418⟩
  • Vincent Hugot, Adrien Jousse, Christian Toinard, Benjamin Venelle. oMAC : Open Model for Automotive Cybersecurity. 17th escar Europe : embedded security in cars (Konferenzveröffentlichung), Nov 2019, Stuttgart, Germany. ⟨10.13154/294-6674⟩. ⟨hal-02497993⟩
  • Jean-Yves Zié, Jean-Christophe Deneuville, Jérémy Briffaut, Benjamin Nguyen. Extending Atomic Chain Swaps. Data Privacy Management, Cryptocurrencies and Blockchain Technology, ESORICS 2019 International Workshops, Sep 2019, Luxembourg, Luxembourg. ⟨10.1007/978-3-030-31500-9_14⟩. ⟨hal-02570859⟩
  • Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye. Secure and Efficient Matrix Multiplication with MapReduce. SECRYPT/ICETE - Revised Selected Papers, Jul 2019, Prague, Czech Republic. ⟨10.1007/978-3-030-52686-3_6⟩. ⟨hal-02942677⟩
  • Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye. Secure Intersection with MapReduce. International Conference on Security and Cryptography (SECRYPT), Jul 2019, Prague, Czech Republic. pp.236-243, ⟨10.5220/0007918902360243⟩. ⟨hal-02273966⟩
  • Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye. Secure Strassen-Winograd Matrix Multiplication with MapReduce. International Conference on Security and Cryptography (SECRYPT), Jul 2019, Prague, Czech Republic. pp.220-227. ⟨hal-02129149⟩
  • Cédric Eichler, Pascal Berthomé, Jacques Chabin, Rachid Echahed, Mirian Ferrari, et al.. SEmantic Networks of Data: Utility and Privacy. RESSI 2019: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2019, Erquy, France. ⟨hal-02182521⟩
  • Benjamin Nguyen, Françoise Fessant, Arnaud Hourson, Lucas Laise. Atelier : Sécurité informatique et protection de la vie privée : pratiques et perspectives dans les entreprises. Human Tech Days, Jan 2019, Tours, France. ⟨hal-01994883⟩
  • Benjamin Nguyen. Tutoriel : Anonymization Techniques : Theory and Practice. Ecole d'été EGC, Jan 2019, Metz, France. ⟨hal-01994875⟩
  • Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye. Secure Joins with MapReduce. FPS 2018 : The 11th International Symposium on Foundations & Practice of Security, Nov 2018, Montreal, Canada. ⟨hal-01903098⟩
  • Samuel Balco, Sabine Frittella, Giuseppe Greco, Alexander Kurz, Alessandra Palmigiano. Software Tool Support for Modular Reasoning in Modal Logics of Actions. 9th International Conference on Interactive Theorem Proving, Jul 2018, Oxford, United Kingdom. ⟨hal-01836507⟩
  • Laurent Bobelin, Khalil Drira, Cédric Eichler. Toward a Formal Multiscale Architectural Framework for Emerging Properties Analysis in Systems of Systems. 13th Annual Conference on System of Systems Engineering (SoSE 2018 ), Jun 2018, Paris, France. ⟨10.1109/SYSOSE.2018.8428736⟩. ⟨hal-01895173⟩
  • Jean-Christophe Deneuville, Philippe Gaborit, Qian Guo, Thomas Johansson. Ouroboros-E: An Efficient Lattice-based Key-Exchange Protocol. IEEE International Symposium on Information Theory, Jun 2018, Vail, Colorado, USA, United States. ⟨hal-01946358⟩
  • Jean-Christophe Deneuville. Post-Quantum Cryptography: tomorrow’s security. Envirorisk, Forum de la gestion des risques naturels et technologiques, Jun 2018, Bourges, France. ⟨hal-01946368⟩
  • Jean-Claude Fondras, Marie-Elisabeth Labat, Christian Toinard. A reasoning approach towards Ethics-Based Medicine and care of disabled people. Envirorisk, Jun 2018, Bourges, France. ⟨hal-01959546⟩
  • Carlos Aguilar Melchor, Jean-Christophe Deneuville, Philippe Gaborit, Tancrède Lepoint, Thomas Ricosset. Delegating Elliptic-Curve Operations with Homomorphic Encryption. IEEE Conference on Communications and Network Security, May 2018, Pékin, China. ⟨hal-01946364⟩
  • Benjamin Nguyen. Personalized k-anonymity. 4th Franco-Japanese Workshop on Cybersecurity, May 2018, Annecy, France. ⟨hal-01994719⟩
  • Ilhem Khlif, Imen Tounsi, Mohamed Hadj Kacem, Cédric Eichler, Ahmed Hadj Kacem. A refinement-based approach for specifying multi-scale software architectures. 33rd annual ACM Symposium on Applied Computing, Apr 2018, Pau, France. ⟨10.1145/3167132.3167309⟩. ⟨hal-01836351⟩
  • Jean-Claude Fondras, Marie-Elisabeth Labat, Christian Toinard. De l’éthique de la numérisation de la santé à la numérisation de l’éthique de la santé. Espace de Réflexion Ethique de la Région Centre Val de Loire (ERERC), 2018, Tours, France. ⟨hal-01959555⟩
  • Benjamin Nguyen. Personalized Anonymization or the art of Private (Fair ?) Data Processing. Workshop on Social Responsability of Algorithms, Université de Paris Dauphine, Dec 2017, Paris, France. ⟨hal-01994712⟩
  • Laurent Bobelin, Andrès Gil, Christian Toinard, Marie-Elisabeth Labat. E-HandicapScale : an open and secure way to promote and improve diagnostics of disabled patients: Use cases for patients with post-stroke hemiplegia to children with cerebral palsy. 2017 International Conference on Health Informatics and Medical Systems, Jul 2017, Las Vegas, United States. ⟨hal-01966667⟩
  • Laurent Bobelin, Christian Toinard, Tuan Tran, Stéphane Moinard. A Software Test Approach to Evaluate the Enforcement of a Workflow Engine. 2017 International Conference on Software Engineering Research and Practice, Jul 2017, Las Vegas, United States. pp.31-37. ⟨hal-01966672⟩
  • Benjamin Nguyen. What is Fair Data Processing ?. ISI 61st World Statistics Congress, Jul 2017, Marrakech, Morocco. ⟨hal-01994667⟩
  • Cédric Eichler, Pascal Berthomé, Benjamin Nguyen. Projet GIRAFON: Protection de la vie privée dans le cadre de l'interrogation, la fouille et l'analyse de grands graphes. RESSI 2017: Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2017, Autrans, France. ⟨hal-01985987⟩
  • Maria Evgenia G. Rossi, Pascal Berthomé, Cédric Eichler, Benjamin Nguyen. Private, Secure and Distributed Computation of k-cores. Atelier sur la Protection de la Vie Privée (APVP'17), 2017, Autrans, France. ⟨hal-01975143⟩
  • Axel Michel, Benjamin Nguyen, Philippe Pucheral. Managing Distributed Queries under Personalized Anonymity Constraints. 6th International Conference on Data Science, Technology and Applications - DATA 2017, 2017, Madrid, Spain. ⟨hal-01682316⟩
  • Ilhem Khlif, Mohamed Hadj Kacem, Cédric Eichler, Khalil Drira, Ahmed Hadj Kacem. Multi-scale modeling for software-intensive systems-of-systems architectures. International Colloquium on Software-intensive Systems-of-Systems at 10th European Conference on Software Architecture , Nov 2016, Copenhagen, Denmark. 6p., ⟨10.1145/3175731.3176179⟩. ⟨hal-01836346⟩
  • Axel Michel, Benjamin Nguyen, Philippe Pucheral. Exécution de requêtes distribuées sous contraintes d'anonymat. 32ème Conférence sur la Gestion de Données - Principes, Technologies et Applications, Nov 2016, Poitiers, France. ⟨hal-01424989⟩
  • Axel Michel, Benjamin Nguyen. Managing distributed queries under anonymity constraints. 7e Atelier sur la Protection de la Vie Privée, Jul 2016, Toulouse, France. ⟨hal-01424993⟩
  • Yannick Kergosien, Christian Toinard. Risques liés à la planification des emplois du temps pour la prise en charge d’enfants handicapés. Envirorisk, 2016, Bourges, France. ⟨hal-01959553⟩
  • Marie-Elisabeth Labat, Christian Toinard. Ethique et risques pour la prise en charge du handicap. Envirorisk, 2016, Bourges, France. ⟨hal-01959548⟩
  • Cuong Quoc To, Benjamin Nguyen, Philippe Pucheral. TrustedMR : Un système MapReduce de confiance basé sur l'utilisation de matériel sécurisé. 31ème Conférence sur la Gestion de Données — Principes, Technologies et Applications – BDA 2015 2, Sep 2015, Porquerolles, France. ⟨hal-01296448⟩
  • Asma Guesmi, Patrice Clemente, Frédéric Loulergue, Pascal Berthomé. Cloud Resources Placement Based on Functional and Non-Functional Requirements. SECRYPT, Jul 2015, Colmar, France. ⟨hal-01158134⟩
  • Aline Bousquet, Jérémy Briffaut, Christian Toinard. An autonomous Cloud management system for in-depth security.. Les Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI 2015), May 2015, Troyes, France. ⟨hal-01191746⟩
  • Daniel Le Métayer, Benjamin Nguyen, Josep Domingo-Ferrer, Mark Elliott, Antoinette Rouvroy, et al.. To be or not to be (anonymous)?: Anonymyity in the age of big and open data.. International Conference on Computers, Privacy and Data Protection (CPDP 2015), Jan 2015, Bruxelles, Belgium. ⟨hal-01296465⟩
  • Aline Bousquet, Jérémy Briffaut, Christian Toinard. An autonomous Cloud management system for in-depth security. 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), Oct 2014, Luxembourg, Luxembourg. ⟨10.1109/CloudNet.2014.6969023⟩. ⟨hal-01131866⟩
  • Laurent Bobelin, Aline Bousquet, Jérémy Briffaut, Eddy Caron, Jean-François Couturier, et al.. An Advanced Security-Aware Cloud Architecture. HPCS 2014 - The 2014 International Conference on High Performance Computing & Simulation, Jul 2014, Bologne, Italy. ⟨hal-01063852⟩
  • Patrice Clemente. De la sécurité de la virtualisation à la sécurité des Clouds. Colloque International sur la Sécurité des Systèmes d'Information, Mar 2014, Kenitra, Maroc. ⟨hal-03226185⟩
  • Asma Guesmi, Patrice Clemente. Access Control and Security Properties Requirements Specification for Clouds' SecLAs. CloudCom 2013, Dec 2013, Bristol, United Kingdom. pp.723-729. ⟨hal-03226333⟩
  • Eddy Caron, Le Anh Dung, Arnaud Lefray, Christian Toinard. Definition of security metrics for the Cloud Computing and security-aware virtual machine placement algorithms. International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC 2013), Oct 2013, Beijing, China. pp.125-131. ⟨hal-00932401⟩
  • Mathieu Blanc, Damien Gros, Jérémy Briffaut, Christian Toinard. PIGA-Cluster: a distributed architecture integrating a shared and resilient reference monitor to enforce mandatory access control in the HPC environment. SHPCS - 8th International Workshop on Security and High Performance Computing Systems - 2013, Jul 2013, Helsinki, Finland. ⟨hal-00840736⟩
  • Aline Bousquet, Jérémy Briffaut, Laurent Clévy, Christian Toinard, Benjamin Venelle. Mandatory Access Control for the Android Dalvik Virtual Machine. 2013 - USENIX Federated Conferences, ESOS: Workshop on Embedded Self-Organizing Systems, Jun 2013, San Jose, United States. ⟨hal-00840732⟩
  • Mathieu Blanc, Damien Gros, Jérémy Briffaut, Christian Toinard. Mandatory access control with a multi-level reference monitor: PIGA-cluster. ACM CLHS '13 Proceedings of the first workshop on Changing landscapes in HPC security, Jun 2013, New-York, United States. pp.1-8, ⟨10.1145/2465808.2465809⟩. ⟨hal-00840735⟩
  • Stéphane Betge-Brezetz, Aline Bousquet, Jérémy Briffaut, Eddy Caron, Laurent Clévy, et al.. Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures. The Future Internet - Future Internet Assembly 2013, 2013, Dublin, Ireland. pp.153-158, ⟨10.1007/978-3-642-38082-2_13⟩. ⟨hal-00840730⟩
  • Patrice Clemente, Bangaly Kaba, Jonathan Rouzaud-Cornabas, Marc Alexandre, Guillaume Aujay. SPTrack: Visual Analysis of Information Flows within SELinux Policies and Attack Logs. Active Media Technology, Dec 2012, Chengdu, China. pp.596-605, ⟨10.1007/978-3-642-35236-2_60⟩. ⟨hal-00766721⟩
  • Pierre Clairet, Pascal Berthomé, Jérémy Briffaut. Compression de signatures pour PIGA IDS. 9ème édition de la conférence MAnifestation des JEunes Chercheurs en Sciences et Technologies de l'Information et de la Communication - MajecSTIC 2012 (2012), Nicolas Gouvy, Oct 2012, Villeneuve d'Ascq, France. ⟨hal-00780205⟩
  • Damien Gros, Mathieu Blanc, Jérémy Briffaut, Christian Toinard. PIGA-Windows : contrôle des flux d'information avancés sur les systèmes d'exploitation Windows 7. Majestic 2012, Oct 2012, Lille, France. ⟨hal-00771337⟩
  • Pascal Berthomé, Jérémy Briffaut, Pierre Clairet. Compacting Security Signatures for PIGA IDS. SECURWARE-2012, Aug 2012, Rome, Italy. pp.126--133. ⟨hal-00770935⟩
  • Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas. HoneyCloud: elastic honeypots - On-attack provisioning of high-interaction honeypots. SECRYPT 2012, Jul 2012, Rome, Italy. pp.434-439. ⟨hal-00721415⟩
  • Mathieu Blanc, Jérémy Briffaut, Christian Toinard, Damien Gros. Advanced MAC in HPC systems: performance improvement. CCGrid 2012 -- The 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2012, Ottawa, Canada. ⟨hal-00671770⟩
  • Jérémy Briffaut, Jonathan Rouzaud-Cornabas, Christian Toinard, Emilie Lefebvre. PIGA-Virt: an Advanced Distributed MAC Protection of Virtual Systems. Euro-Par 2011 Parallel Processing Workshops, Lecture Notes in Computer Science, Aug 2011, Bordeaux, France. pp.8-19. ⟨hal-00671592⟩
  • Aline Bousquet, Patrice Clemente, Jean-François Lalande. SYNEMA: visual monitoring of network and system security sensors. SECRYPT 2011, Jul 2011, Séville, Spain. pp.375-378, ⟨10.5220/0003516203750378⟩. ⟨hal-00596893⟩
  • Jérémy Briffaut, Martin Peres, Christian Toinard, Jonathan Rouzaud-Cornabas, Benjamin Venelle, et al.. PIGA-OS : Retour sur le Système d'Exploitation Vainqueur du Défi Sécurité. RenPar'20 / SympA'14 / CFSE 8, 8ème Conférence Francaise en Systèmes d'Exploitation, RenPar'20 / SympA'14 / CFSE 8, May 2011, Saint-Malo, France. ⟨hal-00671591⟩
  • Jonathan Rouzaud-Cornabas, Patrice Clemente, Christian Toinard. An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OS. SECURWARE'10, Jul 2010, Venise, Italy. pp.11-16. ⟨hal-00474156⟩
  • Jonathan Rouzaud-Cornabas, Jérémy Briffaut, Christian Toinard, Patrice Clemente. An integrity security property based on information flows : Application to the enforcement of a classical operating system. Journée Informatique de la Région Centre 2009, Jan 2010, Blois, France. pp.1. ⟨hal-00459827⟩
  • Waleed Smari, Jian Zhu, Patrice Clemente. Trust and privacy in attribute based access control for collaboration environments. iiWAS 2009, Dec 2009, Kuala Lumpur, Malaysia. pp.47-53. ⟨hal-03226321⟩
  • Mathieu Blanc, Patrice Clemente, Steve-William Kissi. Toward a real MLS/SELinux system for end users: an empirical study. Workshop on Collaboration and Security (COLSEC'10), May 2009, Baltimore, United States. pp.209-216, ⟨10.1109/CTS.2009.5067483⟩. ⟨hal-03226176⟩
  • Jonathan Rouzaud-Cornabas, Patrice Clemente, Christian Toinard. Correlation of system events: High performance classification of selinux activities and scenarios. Workshop on Security and High Performance Computing Systems, Jun 2008, Cyprus, Cyprus. pp.171-177. ⟨hal-00459822⟩
  • Mathieu Blanc, Jérémy Briffaut, Patrice Clemente, Mohammed Gad El Rab, Christian Toinard. A Collaborative Approach for Access Control, Intrusion Detection and Security Testing. International Symposium on Collaborative Technologies and Systems (CTS'06), 2006, Las Vegas, United States. pp.270-278. ⟨hal-03226354⟩
  • Mathieu Blanc, Jérémy Briffaut, Patrice Clemente, Mohammed Gad El Rab, Christian Toinard. A Multi-Agent and Multi-Level Architecture to Secure Distributed Systems. First International Workshop on Privacy and Security in Agent-based Collaborative Environments, 2006, Hakodate, Japan. ⟨hal-03226172⟩
  • Anas Abou El Kalam, Jérémy Briffaut, Patrice Clemente, Pierre Courtieu, Fabrice Gadaud, et al.. Systèmes de confiance et détection d'intrusion répartis. Les Journées Informatique de la Région Centre, Jun 2005, Blois, France. ⟨hal-00459971⟩
  • Mathieu Blanc, Patrice Clemente, Pierre Courtieu, Stéphane Franche, Laurent Oudot, et al.. Amélioration de la sécurité des grands réseaux par une infrastructure de méta-politique. 11ème Colloque Francophone sur l'Ingénierie des Protocoles (CFIP'2005), Mar 2005, Bordeaux, France. pp.517-530. ⟨hal-00083402⟩
  • Mathieu Blanc, Patrice Clemente, Pierre Courtieu, Stéphane Franche, Laurent Oudot, et al.. Hardening large-scale networks security through a meta-policy framework. 3rd Workshop on the Internet, Telecommunications and Signal Processing (WITSP'04), Dec 2004, Adelaïde, Australia. pp.132-137. ⟨hal-00083400⟩

Poster communications

  • Vincent Hugot, Adrien Jousse, Christian Toinard, Benjamin Venelle. oMAC : Open Model for Automotive Cybersecurity. escar Europe 2019, Nov 2019, Stuttgart, Germany. ⟨hal-02498302⟩
  • Cédric Eichler, Pascal Berthomé, Jacques Chabin, Rachid Echahed, Mirian Ferrari, et al.. SEmantic Networks of Data: Utility and Privacy. Atelier sur la Protection de la Vie Privée (APVP'19), Jul 2019, Cap Hornu, France. ⟨hal-02182524⟩
  • Fergal Martin-Tricot, Cédric Eichler, Pascal Berthomé. Industrial Internet of Things: Security of Interoperability. RESSI, May 2019, Erquy, France. ⟨hal-03021574⟩
  • Fergal Martin-Tricot, Pascal Berthomé, Cédric Eichler. Interopérabilité dans l'Internet des Objets : Étude et mise en œuvre. Journée des Doctorants CEA, Oct 2018, Blois, France. ⟨hal-01951321⟩
  • Arnaud Lefray, Eddy Caron, Jonathan Rouzaud-Cornabas, Zhang Huaxi Yulin, Aline Bousquet, et al.. Security-Aware Models for Clouds. 22th IEEE International Symposium on High Performance Distributed Computing, Jun 2013, New York, United States. 2013. ⟨hal-00840734⟩
  • Damien Gros, Jérémy Briffaut, Christian Toinard, Mathieu Blanc. Advanced MAC in HPC systems: performance improvement. CCGRID'12, May 2012, Ottawa, Canada. ⟨hal-01079329⟩

Book sections

  • Marta Bílková, Sabine Frittella, Ondrej Majer, Sajad Nazari. Belief Based on Inconsistent Information. Dynamic Logic. New Trends and Applications. DaLi 2020. Lecture Notes in Computer Science., pp.68-86, 2020, ⟨10.1007/978-3-030-65840-3_5⟩. ⟨hal-03115256⟩
  • Axel Michel, Benjamin Nguyen, Philippe Pucheral. The Case for Personalized Anonymization of Database Query Results. Joaquim Filipe; Jorge Bernardino; Christoph Quix. Data Management Technologies and Applications (DATA'17 Revised Selected Papers), 814, Springer, pp.261-285, 2018, Communications in Computer and Information Science, 978-3-319-94808-9. ⟨hal-01945674⟩
  • Jérémy Briffaut, Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas. Honeypot forensics for system and network SIEM design. Guillermo Suárez de Tangil and Esther Palomar. Advances in Security Information Management: Perceptions and Outcomes, Nova Science Publishers, pp.181-216, 2013, Computer Science, Technology and Applications, Computer Networks, 978-1-62417-221-2. ⟨hal-00677340⟩

Other publications

  • Laurent Bobelin, Killian Durand, Nadège Fichot, Adrien Jousse, Yannick Kergosien, et al.. Aide à la planification de la prise en charge d’enfants handicapés moteurs. 2017. ⟨hal-01966675⟩
  • Nicolas Aragon, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Adrien Hauteville, et al.. LOCKER - LOw rank parity ChecK codes EncRyption. 2017, http://nicolas-aragon.fr/locker/. ⟨hal-01946962⟩
  • Nicolas Aragon, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Adrien Hauteville, et al.. LAKE - Low rAnk parity check codes Key Exchange. 2017, http://nicolas-aragon.fr/lake. ⟨hal-01946967⟩
  • Carlos Aguilar Melchor, Nicolas Aragon, Slim Bettaieb, Loïc Bidoux, Olivier Blazy, et al.. Hamming Quasi-Cyclic (HQC). 2017, https://pqc-hqc.org/. ⟨hal-01946880⟩
  • Carlos Aguilar Melchor, Nicolas Aragon, Slim Bettaieb, Loïc Bidoux, Olivier Blazy, et al.. Rank Quasi-Cyclic (RQC). 2017, https://pqc-rqc.org/. ⟨hal-01946894⟩
  • Carlos Aguilar Melchor, Nicolas Aragon, Slim Bettaieb, Loïc Bidoux, Olivier Blazy, et al.. Ouroboros-R. 2017, https://pqc-ouroborosr.org/. ⟨hal-01946902⟩

Preprints, Working Papers, ...

  • Willem Conradie, Sabine Frittella, Krishna Manoorkar, Sajad Nazari, Alessandra Palmigiano, et al.. Rough concepts. 2020. ⟨hal-02504608⟩
  • Jean-Christophe Deneuville, Philippe Gaborit. Cryptanalysis of a code-based one-time signature. 2018. ⟨hal-01961491⟩
  • Sabine Frittella, Giuseppe Greco, Michele Piazzai, Nachoem Wijnberg, Fan Yang. Matthew Effects via Team Semantics. 2017. ⟨hal-01509419⟩
  • Willem Conradie, Sabine Frittella, Alessandra Palmigiano, Michele Piazzai, Apostolos Tzimoulis, et al.. Towards an epistemic-logical theory of categorization. 2017. ⟨hal-01509418⟩

Reports

  • Jacques Chabin, Cédric Eichler, Mirian Halfeld-Ferrari, Nicolas Hiot. Graph Rewriting System for Consistent Evolution of RDF/S databases. [Research Report] LIFO, Université d'Orléans, INSA Centre Val de Loire. 2020. ⟨hal-02560325v3⟩
  • Jacques Chabin, Cédric Eichler, Mirian Halfeld-Ferrari, Nicolas Hiot. Specification of side-effect management techniques for semantic graph sanitization. [Research Report] LIFO, Université d'Orléans, INSA Centre Val de Loire. 2020. ⟨hal-02957974⟩
  • Arnaud Lefray, Jonathan Rouzaud-Cornabas, Jérémy Briffaut, Christian Toinard. Security for Cloud Environment through Information Flow Properties Formalization with a First-Order Temporal Logic. [Research Report] RR-8420, INRIA. 2013, pp.30. ⟨hal-00916882⟩
  • Patrice Clemente, Jonathan Rouzaud-Cornabas. Security and Virtualization: a Survey. [Research Report] INSA CVL - Institut National des Sciences Appliquées - Centre Val de Loire; LIFO, Université d'Orléans, INSA Centre Val de Loire. 2011. ⟨hal-03226336⟩

Theses

  • Axel Michel. Personalizing Privacy Constraints in Generalization-based Anonymization Models. Cryptography and Security [cs.CR]. INSA Centre Val de Loire, 2019. English. ⟨tel-02269565⟩

Habilitation à diriger des recherches

  • Radu Ciucanu. Secure Outsourced Data Analytics. Databases [cs.DB]. Université d'Orléans, 2021. ⟨tel-03256882⟩