Skip to Main content Skip to Navigation


hal-00761351v1  Journal articles
Mathieu JaumeValérie Viet Triem TongGuillaume Hiet. Spécification et mécanisme de détection de flots d'information illégaux
Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, Lavoisier, 2012, 31 (6), pp.713-742. ⟨10.3166/tsi.31.713-742⟩
...
hal-01125667v2  Conference papers
Philippe AyraultMatthieu CarlierDavid DelahayeCatherine DuboisDamien Doligez et al.  Trusted Software within Focal
C&ESAR 2008 - Computer & Electronics Security Applications Rendez-vous, Dec 2008, Rennes, France. pp.162-179
hal-00647170v1  Conference papers
Mathieu JaumeValérie Viet Triem TongLudovic Mé. Flow based interpretation of access control: Detection of illegal information flows
7th International Conference on Information Systems Security (ICISS), Dec 2011, Kolkata, India. pp.72-86, ⟨10.1007/978-3-642-25560-1_5⟩
...
tel-00005594v1  Theses
Mathieu Jaume. Contributions à la sémantique de la programmation logique
Interface homme-machine [cs.HC]. Ecole des Ponts ParisTech, 1999. Français
inria-00552221v1  Conference papers
Tony BourdierHoratiu CirsteaMathieu JaumeHélène Kirchner. Rule-based Specification and Analysis of Security Policies
5th International Workshop on Security and Rewriting Techniques - SecReT 2010, Jun 2010, Valencia, Spain
...
inria-00507300v2  Conference papers
Tony BourdierHoratiu CirsteaMathieu JaumeHélène Kirchner. Formal Specification and Validation of Security Policies
FPS - 4th Canada-France MITACS Workshop on Foundations and Practice of Security - 2011, May 2011, Paris, France. pp.148-163, ⟨10.1007/978-3-642-27901-0_12⟩
...
inria-00429240v3  Conference papers
Tony BourdierHoratiu CirsteaMathieu JaumeHélène Kirchner. On Formal Specification and Analysis of Security Policies
2010 Grande Region Security and Reliability Day, Mar 2010, Saarbrücken, Germany
hal-01083384v1  Conference papers
Mathieu JaumeRadoniaina AndriatsimandefitraValérie Viet Triem TongLudovic Mé. Secure states versus Secure executions: From access control to flow control
ICISS 2013 - 9th International Conference on Information Systems Security, Dec 2013, Calcutta, India. pp.148-162, ⟨10.1007/978-3-642-45204-8_11⟩
...
hal-01535937v1  Conference papers
Laurent GeorgetMathieu JaumeGuillaume PiolleFrédéric TronelValérie Viet Triem Tong. Suivi de flux d'information correct sous Linux
16èmes journées AFADL (Approches formelles dans l'assistance au développement de logiciels), Jun 2017, Montpellier, France. pp.19-26
...
hal-01535949v1  Conference papers
Laurent GeorgetMathieu JaumeGuillaume PiolleFrédéric TronelValérie Viet Triem Tong. Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory
15th International Conference on Software Engineering and Formal Methods (SEFM 2017), Sep 2017, Trento, Italy. pp.1-16, ⟨10.1007/978-3-319-66197-1_1⟩
...
hal-01535862v1  Conference papers
Laurent GeorgetMathieu JaumeGuillaume PiolleFrédéric TronelValérie Viet Triem Tong. Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux
5th International FME Workshop on Formal Methods in Software Engineering, May 2017, Buenos Aires, Argentina. pp.10-16, ⟨10.1109/FormaliSE.2017.1⟩
hal-01149471v1  Conference papers
Laurent GeorgetGuillaume PiolleFrédéric TronelValérie Viet Triem TongMathieu Jaume. Towards a Formal Semantics for System Calls in terms of Information Flow
Tenth International Conference on Systems (ICONS 2015), Apr 2015, Barcelone, Spain. pp.1-4
...
hal-03131262v1  Journal articles
Aimad BeradyMathieu JaumeValérie Viet Triem TongGilles Guette. From TTP to IoC: Advanced Persistent Graphs for Threat Hunting
IEEE Transactions on Network and Service Management, IEEE, 2021, Latest Developments for Security Management of Networks and Services, Special Issue, pp.1-13. ⟨10.1109/TNSM.2021.3056999⟩