Yves Deswarte
Yves Deswarte
Researcher, LAAS-CNRS
Verified email at laas.fr - Homepage
TitleCited byYear
Organization based access control
AAE Kalam, REI Baida, P Balbiani, S Benferhat, F Cuppens, Y Deswarte, ...
Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for …, 2003
7242003
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security
R Ortalo, Y Deswarte, M Kaaniche
IEEE Transactions on Software Engineering 25 (5), 633-650, 1999
5451999
Intrusion tolerance in distributed computing systems
Y Deswarte, L Blain, JC Fabre
null, 110, 1991
3591991
Efficient remote data possession checking in critical information infrastructures
F Sebé, J Domingo-Ferrer, A Martinez-Balleste, Y Deswarte, ...
IEEE Transactions on Knowledge and Data Engineering 20 (8), 1034-1038, 2008
3542008
Remote integrity checking
Y Deswarte, JJ Quisquater, A Saïdane
Working Conference on Integrity and Internal Control in Information Systems …, 2003
3112003
Guide de la sûreté de fonctionnement (2ème édition)
J Arlat, JP Blanquart, A Costes, Y Crouzet, Y Deswarte, JC Fabre, ...
Cépaduès Éditions, 1996
289*1996
Quantitative assessment of operational security: Models and tools
M Dacier, Y Deswarte, M Kaâniche
Information Systems Security, ed. by SK Katsikas and D. Gritzalis, London …, 1996
1571996
Privilege graph: an extension to the typed access matrix model
M Dacier, Y Deswarte
European Symposium on Research in Computer Security, 319-334, 1994
1331994
Survey on security threats and protection mechanisms in embedded automotive networks
I Studnia, V Nicomette, E Alata, Y Deswarte, M Kaâniche, Y Laarouchi
2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks …, 2013
1272013
Diversity against accidental and deliberate faults
Y Deswarte, K Kanoun, JC Laprie
Proceedings Computer Security, Dependability, and Assurance: From Needs to …, 1998
1061998
Intrusion-tolerant middleware: The road to automatic security
PE Verissimo, NF Neves, C Cachin, J Poritz, D Powell, Y Deswarte, ...
IEEE Security & Privacy 4 (4), 54-62, 2006
1042006
Models and tools for quantitative assessment of operational security
M Dacier, Y Deswarte, M Kaâniche
12th International Information Security Conference (IFIP/Sec’96) 186, 177-186, 1996
871996
Intrusion-tolerance using fine-grain fragmentation-scattering
JM Fray, Y Deswarte, D Powell
1986 IEEE International Symposium on Security and Privacy, Oakland (CA …, 1986
851986
The design of a generic intrusion-tolerant architecture for web servers
A Saidane, V Nicomette, Y Deswarte
IEEE Transactions on dependable and secure computing 6 (1), 45-58, 2008
762008
An architecture for an adaptive intrusion-tolerant server
A Valdes, M Almgren, S Cheung, Y Deswarte, B Dutertre, J Levy, H Saidi, ...
International Workshop on Security Protocols, 158-178, 2002
652002
Supporting multiple levels of criticality
E Totel, JP Blanquart, Y Deswarte, D Powell
Digest of Papers. Twenty-Eighth Annual International Symposium on Fault …, 1998
621998
Exploiting an I/OMMU vulnerability
FL Sang, E Lacombe, V Nicomette, Y Deswarte
2010 5th International Conference on Malicious and Unwanted Software, 7-14, 2010
612010
Empirical analysis and statistical modeling of attack processes based on honeypots
M Kaaniche, Y Deswarte, E Alata, M Dacier, V Nicomette
Workshop on Empirical Evaluation of Dependability and Security (WEEDS 2006 …, 2006
592006
Designing secure and reliable applications using fragmentation-redundancy-scattering: an object-oriented approach
JC Fabre, Y Deswarte, B Randell
European Dependable Computing Conference, 21-38, 1994
541994
PolyOrBAC: a security framework for critical infrastructures
AA El Kalam, Y Deswarte, A Baïna, M Kaâniche
International Journal of Critical Infrastructure Protection 2 (4), 154-169, 2009
482009
The system can't perform the operation now. Try again later.
Articles 1–20