Organization based access control AAE Kalam, RE Baida, P Balbiani, S Benferhat, F Cuppens, Y Deswarte, ... Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for …, 2003 | 900 | 2003 |
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security R Ortalo, Y Deswarte, M Kaaniche IEEE Transactions on Software Engineering 25 (5), 633-650, 1999 | 613 | 1999 |
Efficient remote data possession checking in critical information infrastructures F Sebé, J Domingo-Ferrer, A Martinez-Balleste, Y Deswarte, ... IEEE Transactions on Knowledge and Data Engineering 20 (8), 1034-1038, 2008 | 500 | 2008 |
Remote integrity checking: How to trust files stored on untrusted servers Y Deswarte, JJ Quisquater, A Saïdane Integrity and Internal Control in Information Systems VI: IFIP TC11/WG11. 5 …, 2004 | 493 | 2004 |
Intrusion tolerance in distributed computing systems Y Deswarte, L Blain, JC Fabre Proceedings. 1991 IEEE Computer Society Symposium on Research in Security …, 1991 | 414 | 1991 |
Survey on security threats and protection mechanisms in embedded automotive networks I Studnia, V Nicomette, E Alata, Y Deswarte, M Kaâniche, Y Laarouchi 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks …, 2013 | 268 | 2013 |
Quantitative assessment of operational security: Models and tools M Dacier, Y Deswarte, M Kaâniche Information Systems Security, ed. by SK Katsikas and D. Gritzalis, London …, 1996 | 176 | 1996 |
Privilege graph: an extension to the typed access matrix model M Dacier, Y Deswarte Computer Security—ESORICS 94: Third European Symposium on Research in …, 1994 | 169 | 1994 |
Intrusion-tolerant middleware: The road to automatic security PE Veríssimo, NF Neves, C Cachin, J Poritz, D Powell, Y Deswarte, ... IEEE Security & Privacy 4 (4), 54-62, 2006 | 124 | 2006 |
Diversity against accidental and deliberate faults Y Deswarte, K Kanoun, JC Laprie Proceedings Computer Security, Dependability, and Assurance: From Needs to …, 1998 | 122 | 1998 |
Models and tools for quantitative assessment of operational security M Dacier, Y Deswarte, M Kaâniche 12th International Information Security Conference (IFIP/Sec’96) 186, 177-186, 1996 | 114 | 1996 |
The design of a generic intrusion-tolerant architecture for web servers A Saidane, V Nicomette, Y Deswarte IEEE Transactions on dependable and secure computing 6 (1), 45-58, 2008 | 94 | 2008 |
Intrusion-tolerance using fine-grain fragmentation-scattering JM Fray, Y Deswarte, D Powell 1986 IEEE International Symposium on Security and Privacy, Oakland (CA …, 1986 | 92 | 1986 |
Empirical analysis and statistical modeling of attack processes based on honeypots M Kaaniche, Y Deswarte, E Alata, M Dacier, V Nicomette Workshop on Empirical Evaluation of Dependability and Security (WEEDS 2006 …, 2006 | 74 | 2006 |
An architecture for an adaptive intrusion-tolerant server A Valdes, M Almgren, S Cheung, Y Deswarte, B Dutertre, J Levy, H Saidi, ... Security Protocols: 10th International Workshop, Cambridge, UK, April 17-19 …, 2004 | 74 | 2004 |
Exploiting an I/OMMU vulnerability FL Sang, E Lacombe, V Nicomette, Y Deswarte 2010 5th International Conference on Malicious and Unwanted Software, 7-14, 2010 | 70 | 2010 |
Supporting multiple levels of criticality E Totel, JP Blanquart, Y Deswarte, D Powell Digest of Papers. Twenty-Eighth Annual International Symposium on Fault …, 1998 | 67 | 1998 |
PolyOrBAC: A security framework for Critical Infrastructures A Abou El Kalam, Y Deswarte, A Baïna, M Kaâniche International Journal of Critical Infrastructure Protection 2 (4), 154-169, 2009 | 65 | 2009 |
Designing secure and reliable applications using fragmentation-redundancy-scattering: an object-oriented approach JC Fabre, Y Deswarte, B Randell Dependable Computing—EDCC-1: First European Dependable Computing Conference …, 1994 | 60 | 1994 |
Multi-orbac: A new access control model for distributed, heterogeneous and collaborative systems A Abou El Kalam, Y Deswarte Proceedings of the IEEE Symposium on Systems and Information Security, 2006 | 55 | 2006 |