Yves Deswarte
Yves Deswarte
Researcher, LAAS-CNRS
Verified email at - Homepage
Cited by
Cited by
Organization based access control
AAE Kalam, RE Baida, P Balbiani, S Benferhat, F Cuppens, Y Deswarte, ...
Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for†…, 2003
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security
R Ortalo, Y Deswarte, M Kaaniche
IEEE Transactions on Software Engineering 25 (5), 633-650, 1999
Efficient remote data possession checking in critical information infrastructures
F Sebť, J Domingo-Ferrer, A Martinez-Balleste, Y Deswarte, ...
IEEE Transactions on Knowledge and Data Engineering 20 (8), 1034-1038, 2008
Remote integrity checking: How to trust files stored on untrusted servers
Y Deswarte, JJ Quisquater, A SaÔdane
Integrity and Internal Control in Information Systems VI: IFIP TC11/WG11. 5†…, 2004
Intrusion tolerance in distributed computing systems
Y Deswarte, L Blain, JC Fabre
Proceedings. 1991 IEEE Computer Society Symposium on Research in Security†…, 1991
Survey on security threats and protection mechanisms in embedded automotive networks
I Studnia, V Nicomette, E Alata, Y Deswarte, M Ka‚niche, Y Laarouchi
2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks†…, 2013
Quantitative assessment of operational security: Models and tools
M Dacier, Y Deswarte, M Ka‚niche
Information Systems Security, ed. by SK Katsikas and D. Gritzalis, London†…, 1996
Privilege graph: an extension to the typed access matrix model
M Dacier, Y Deswarte
Computer Security—ESORICS 94: Third European Symposium on Research in†…, 1994
Intrusion-tolerant middleware: The road to automatic security
PE VerŪssimo, NF Neves, C Cachin, J Poritz, D Powell, Y Deswarte, ...
IEEE Security & Privacy 4 (4), 54-62, 2006
Diversity against accidental and deliberate faults
Y Deswarte, K Kanoun, JC Laprie
Proceedings Computer Security, Dependability, and Assurance: From Needs to†…, 1998
Models and tools for quantitative assessment of operational security
M Dacier, Y Deswarte, M Ka‚niche
12th International Information Security Conference (IFIP/Sec’96) 186, 177-186, 1996
The design of a generic intrusion-tolerant architecture for web servers
A Saidane, V Nicomette, Y Deswarte
IEEE Transactions on dependable and secure computing 6 (1), 45-58, 2008
Intrusion-tolerance using fine-grain fragmentation-scattering
JM Fray, Y Deswarte, D Powell
1986 IEEE International Symposium on Security and Privacy, Oakland (CA†…, 1986
Empirical analysis and statistical modeling of attack processes based on honeypots
M Kaaniche, Y Deswarte, E Alata, M Dacier, V Nicomette
Workshop on Empirical Evaluation of Dependability and Security (WEEDS 2006†…, 2006
An architecture for an adaptive intrusion-tolerant server
A Valdes, M Almgren, S Cheung, Y Deswarte, B Dutertre, J Levy, H Saidi, ...
Security Protocols: 10th International Workshop, Cambridge, UK, April 17-19†…, 2004
Exploiting an I/OMMU vulnerability
FL Sang, E Lacombe, V Nicomette, Y Deswarte
2010 5th International Conference on Malicious and Unwanted Software, 7-14, 2010
Supporting multiple levels of criticality
E Totel, JP Blanquart, Y Deswarte, D Powell
Digest of Papers. Twenty-Eighth Annual International Symposium on Fault†…, 1998
PolyOrBAC: A security framework for Critical Infrastructures
A Abou El Kalam, Y Deswarte, A BaÔna, M Ka‚niche
International Journal of Critical Infrastructure Protection 2 (4), 154-169, 2009
Designing secure and reliable applications using fragmentation-redundancy-scattering: an object-oriented approach
JC Fabre, Y Deswarte, B Randell
Dependable Computing—EDCC-1: First European Dependable Computing Conference†…, 1994
Multi-orbac: A new access control model for distributed, heterogeneous and collaborative systems
A Abou El Kalam, Y Deswarte
Proceedings of the IEEE Symposium on Systems and Information Security, 2006
The system can't perform the operation now. Try again later.
Articles 1–20