A logic of communication in hostile environment P Bieber Computer Security Foundations Workshop III, 1990. Proceedings, 14-22, 1990 | 146 | 1990 |
ESACS: an integrated methodology for design and safety analysis of complex systems M Bozzano, A Villafiorita, O Åkerlund, P Bieber, C Bougnol, E Böde, ... Proc. ESREL, 237-245, 2003 | 138 | 2003 |
ISAAC, a framework for integrated safety analysis of functional, geometrical and human aspects O Akerlund, P Bieber, E Boede, M Bozzano, M Bretschneider, C Castel, ... Conference ERTS'06, 2006 | 115 | 2006 |
New Challenges for Future Avionic Architectures. P Bieber, F Boniol, M Boyer, E Noulard, C Pagetti Aerospace Lab, p. 1-10, 2012 | 96 | 2012 |
Combination of fault tree analysis and model checking for safety assessment of complex system P Bieber, C Castel, C Seguin European Dependable Computing Conference, 19-31, 2002 | 89 | 2002 |
Safety assessment with AltaRica P Bieber, C Bougnol, C Castel, JPH Christophe Kehren, S Metge, ... Building the Information Society, 505-510, 2004 | 85 | 2004 |
A logical view of secure dependencies P Bieber, F Cuppens Journal of Computer Security 1 (1), 99-129, 1992 | 84 | 1992 |
Checking secure interactions of smart card applets: extended version 1 P Bieber, J Cazin, P Girard, JL Lanet, V Wiels, G Zanon Journal of Computer Security 10 (4), 369-398, 2002 | 59 | 2002 |
Experiments in model based safety analysis: Flight controls R Bernard, JJ Aubert, P Bieber, C Merlini, S Metge IFAC Proceedings Volumes 40 (6), 43-48, 2007 | 49 | 2007 |
Formal development of authentication protocols P Bieber, N Boulahia-Cuppens 6th Refinement Workshop, 80-102, 1994 | 40 | 1994 |
Preliminary design of future reconfigurable IMA platforms P Bieber, E Noulard, C Pagetti, T Planche, F Vialard ACM Sigbed Review 6 (3), 1-5, 2009 | 38 | 2009 |
Constraint-based design and allocation of shared avionics resources L Sagaspe, P Bieber 2007 IEEE/AIAA 26th Digital Avionics Systems Conference, 2. A. 5-1-2. A. 5-10, 2007 | 38 | 2007 |
DALculus–theory and tool for development assurance level allocation P Bieber, R Delmas, C Seguin International Conference on Computer Safety, Reliability, and Security, 43-56, 2011 | 35 | 2011 |
Expression of confidentiality policies with deontic logic P Bieber, F Cuppens Deontic logic in computer science: normative system specification, 103-123, 1993 | 35 | 1993 |
A Definition of Secure Dependencies Using the Logic of Security. P Bieber, F Cuppens CSFW, 2-11, 1991 | 33 | 1991 |
The PACAP prototype: a tool for detecting Java Card illegal flow P Bieber, J Cazin, V Wiels, G Zanon, E Marouan, P Girard, JL Lanet International Java Card Workshop, 25-37, 2000 | 32 | 2000 |
Checking secure interactions of smart card applets P Bieber, J Cazin, P Girard, JL Lanet, V Wiels, G Zanon European Symposium on Research in Computer Security, 1-16, 2000 | 30 | 2000 |
Abstract machines for communication security P Bieber, N Boulahia-Cuppens, T Lehmann, E van Wickeren [1993] Proceedings Computer Security Foundations Workshop VI, 137-146, 1993 | 27 | 1993 |
Security and safety assurance for aerospace embedded systems P Bieber, JP Blanquart, G Descargues, M Dulucq, Y Fourastier, E Hazane, ... Embedded Real Time Software and Systems (ERTS2012), 2012 | 23 | 2012 |
Integration of formal fault analysis in ASSERT: Case studies and lessons learnt P Bieber, J Blanquart, G Durrieu, D Lesens, J Lucotte, F Tardy, M Turin, ... Embedded Real Time Software and Systems (ERTS2008), 2008 | 23 | 2008 |