Skip to Main content Skip to Navigation

Search by documents



hal-00647170v1  Conference papers
Mathieu JaumeValérie Viet Triem TongLudovic Mé. Flow based interpretation of access control: Detection of illegal information flows
7th International Conference on Information Systems Security (ICISS), Dec 2011, Kolkata, India. pp.72-86, ⟨10.1007/978-3-642-25560-1_5⟩
hal-00606065v1  Conference papers
Jean-Marie BorelloLudovic MéEric Filiol. Dynamic Malware Detection by Similarity Measures Between Behavioral Profiles: an Introduction in French
Network and Information Systems Security (SAR-SSI), May 2011, La Rochelle, France. pp.NC
hal-00761351v1  Journal articles
Mathieu JaumeValérie Viet Triem TongGuillaume Hiet. Spécification et mécanisme de détection de flots d'information illégaux
Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, Lavoisier, 2012, 31 (6), pp.713-742. ⟨10.3166/tsi.31.713-742⟩
hal-00736946v1  Journal articles
Sébastien Gambs. Inference attacks on geolocated data
ERCIM News, ERCIM, 2012, pp.23
hal-00659023v1  Conference papers
Michel HurfinIzabela MoiseJean-Pierre Le Narzul. An Adaptive Fast Paxos for Making Quick Everlasting Decisions
International Conference on Advanced Information Networking and Applications (AINA), IEEE, Mar 2011, Biopolis, Singapore. pp.208-215, ⟨10.1109/AINA.2011.73⟩
hal-00659026v1  Conference papers
Michel HurfinIzabela MoiseLinda ZeghacheNadjib Badache. Cloud-Based Support for Transactional Mobile Agents
25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, IEEE, Mar 2011, Biopolis, Singapore. pp.190-197, ⟨10.1109/WAINA.2011.138⟩
hal-00724829v1  Conference papers
Mohammad AlagganSébastien GambsAnne-Marie Kermarrec. BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom Filters
14th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2012), Oct 2012, Toronto, Canada
hal-00660054v1  Conference papers
Sébastien GambsOlivier HeenChristophe Potin. A comparative privacy analysis of geosocial networks
SPRINGL - 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS - 2011, Nov 2011, Chicago, United States
hal-00656933v1  Conference papers
Valérie Viet Triem TongRadoniaina AndriatsimandefitraStéphane GellerSimon BocheFrédéric Tronel et al.  Mise en œuvre de politiques de protection des flux d'information dans l'environnement Android
Computer & Electronics Security Applications Rendez-vous (C&ESAR 2011), Nov 2011, Rennes, France
hal-00682660v1  Conference papers
Guillaume Piolle. Protection de la vie privée : appréhension de concepts éthiques par un agent autonome
Atelier D2A2 "Agents Autonomes et Éthique" à RFIA 2012, Jan 2012, Lyon, France
hal-00735996v1  Journal articles
Thomas DemongeotEric TotelValérie Viet Triem TongYves Le Traon. User Data Confidentiality in an Orchestration of Web Services
Journal of Information Assurance and Security, Dynamic Publishers Inc., USA, 2012, 7 (1), pp.32-40
hal-00657244v1  Journal articles
Guillaume Piolle. Outils informatiques pour la protection de la vie privée
Interstices, INRIA, 2011, http://interstices.info/outils-protection
hal-00657248v1  Journal articles
Guillaume PiolleYves Demazeau. Representing privacy regulations with deontico-temporal operators
Web Intelligence and Agent Systems, IOS Press, 2011, 9 (3), pp.209-226. ⟨10.3233/WIA-2011-0215⟩
hal-00660053v1  Conference papers
Sébastien GambsHo Ai ThanhEsma Aïmeur. Maintaining sovereignty on personal data on social networking sites
PATS - 1st International Conference on Privacy and Accountability - 2011, Apr 2011, Berlin, Germany
hal-00765519v1  Conference papers
Sébastien GambsJulien Lolive. SlopPy: Slope One with privacy
Atelier Protection de la Vie Privée (APVP 2012), 3ième édition, Jun 2012, Ile de Groix, France
hal-00763197v1  Conference papers
Linda ZeghacheNadjib BadacheMichel HurfinIzabela Moise. Providing Reliability for transactional mobile agents
5th International Conference on Advanced Infocomm Technology, IEEE, Jul 2012, Paris, France. pp.177-190, ⟨10.1007/978-3-642-38227-7_21⟩
hal-00725049v1  Conference papers
Michel HurfinIzabela Elena MoiseJean-Pierre Le NarzulFrédéric Majorczyk. Adaptive Strategies for Speeding Up Sequences of Consensus
26th International Conference on Advanced Information Networking and Applications, Mar 2012, Fukuoka, Japan
hal-03226341v1  Reports
Jérémy BriffautPatrice ClementeJean-François LalandeJonathan Rouzaud-Cornabas. From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers' Profiles J. Briffaut, P. Clemente, J.-F. Lalande, J. Rouzaud-Cornabas
[Research Report] INSA CVL - Institut National des Sciences Appliquées - Centre Val de Loire; LIFO, Université d'Orléans, INSA Centre Val de Loire. 2011
hal-00745112v1  Conference papers
Chuanyou LiMichel HurfinYun Wang. Brief Announcement: Reaching Approximate Byzantine Consensus in Partially-Connected Mobile Networks
DISC - 26th International Symposium on Distributed Computing, Raimundo Macêdo, Oct 2012, Salvador, Brazil. pp.405-406, ⟨10.1007/978-3-642-33651-5⟩
hal-00736949v1  Conference papers
Sébastien GambsJulien Lolive. SlopPy: Slope One with Privacy
DPM - 7th DPM International Workshop on Data Privacy Management - 2012, Sep 2012, Pisa, Italy