Publications équipe SMIS - 2009

Articles

  1. G Georg, K Anastasakis, B Bordbar, S H Houmb, I Ray and M Toahchoodee. Verification and Trade-off Analysis of Security Properties in UML System Models. IEEE Transactions on Software Engineering 36(3):338-356, 2009. BibTeX

    @article{GAB+09,
    	author = "G. Georg and K. Anastasakis and B. Bordbar and S. H. Houmb and I. Ray and M. Toahchoodee",
    	title = "Verification and Trade-off Analysis of Security Properties in UML System Models",
    	journal = "IEEE Transactions on Software Engineering",
    	year = 2009,
    	volume = 36,
    	pages = "338-356",
    	number = 3,
    	annote = "revint",
    	x-editorial-board = "yes",
    	x-international-audience = "yes",
    	x-pays = "US"
    }
    
  2. F Dang-Ngoc. CSXA: Sécurisation du Contrôle d'Accès pour les Documents XML. Revue Technique et Science Informatiques (TSI), 2009. numéro spécial des Prix de Thèse ASTI et SPECIF. BibTeX

    @article{Dang09,
    	author = "F. Dang-Ngoc",
    	title = "{CSXA}: S\'{e}curisation du Contr\^{o}le d'Acc\`{e}s pour les Documents {XML}",
    	journal = "Revue Technique et Science Informatiques (TSI)",
    	year = 2009,
    	note = "num\'{e}ro sp\'{e}cial des Prix de Th\`{e}se ASTI et SPECIF",
    	annote = "revnat",
    	x-editorial-board = "yes",
    	x-international-audience = "no"
    }
    
  3. T Allard, N Anciaux, L Bouganim, P Pucheral and R Thion. Seamless Access to Healthcare Folders with Strong Privacy Guarantees. International Journal of Healthcare Delivery Reform Initiatives 1(4):82-107, 2009. BibTeX

    @article{AAB+09b,
    	author = "T. Allard and N. Anciaux and L. Bouganim and P. Pucheral and R. Thion",
    	title = "Seamless Access to Healthcare Folders with Strong Privacy Guarantees",
    	journal = "International Journal of Healthcare Delivery Reform Initiatives",
    	year = 2009,
    	volume = 1,
    	pages = "82-107",
    	number = 4,
    	annote = "revint",
    	x-editorial-board = "yes",
    	x-international-audience = "yes"
    }
    

Inbook

  1. L Bouganim and Y Guo. Encyclopedia of Cryptography and Security. Chapter Database Encryption, Springer, 2009. BibTeX

    @inbook{BoGu09,
    	chapter = "Database Encryption",
    	title = "Encyclopedia of Cryptography and Security",
    	publisher = "Springer",
    	year = 2009,
    	author = "L. Bouganim and Y. Guo",
    	annote = "chapitre"
    }
    
  2. N Anciaux, L Bouganim and P Pucheral. Handbook of research on Secure Multimedia Distribution. Chapter A Hardware Approach for Trusted Access and Usage Control, IGI Global, 2009. BibTeX

    @inbook{ABPu09,
    	chapter = "A Hardware Approach for Trusted Access and Usage Control",
    	title = "Handbook of research on Secure Multimedia Distribution",
    	publisher = "IGI Global",
    	year = 2009,
    	author = "N. Anciaux and L. Bouganim and P. Pucheral",
    	annote = "chapitre"
    }
    

Inproceedings

  1. M Toahchoodee, X Xie and I Ray. Towards Trustworthy Delegation in Role-Based Access Control Model. In Proceedings of the 12th International Information Security Conference (ISC). 2009. BibTeX

    @inproceedings{TXRa09,
    	author = "M. Toahchoodee and X. Xie and I. Ray",
    	title = "Towards Trustworthy Delegation in Role-Based Access Control Model",
    	booktitle = "Proceedings of the 12th International Information Security Conference (ISC)",
    	year = 2009,
    	address = "Pisa, Italy",
    	annote = "confint",
    	x-international-audience = "yes",
    	x-pays = "US",
    	x-proceedings = "yes"
    }
    
  2. Y Guo and S Jacob. Confidentialité et intégrité des grandes bases de données. In Journées Codage et Cryptographie. 2009. BibTeX

    @inproceedings{GuJa09,
    	author = "Y. Guo and S. Jacob",
    	title = "Confidentialité et intégrité des grandes bases de données",
    	booktitle = "Journ\'{e}es Codage et Cryptographie",
    	year = 2009,
    	address = "Fr\'{e}jus",
    	annote = "confnat",
    	x-international-audience = "no",
    	x-proceedings = "no"
    }
    
  3. R Dewri, I Ray, I Ray and D Whitley. POkA: Identifying Pareto-Optimal k-Anonymous Points in a Domain Hierarchy Lattice. In Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM 2009). 2009. BibTeX

    @inproceedings{DRRW09,
    	author = "R. Dewri and I. Ray and I. Ray and D. Whitley",
    	title = "POkA: Identifying Pareto-Optimal k-Anonymous Points in a Domain Hierarchy Lattice",
    	booktitle = "Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM 2009)",
    	year = 2009,
    	address = "Hong Kong, China",
    	annote = "confint",
    	x-international-audience = "yes",
    	x-pays = "US",
    	x-proceedings = "yes"
    }
    
  4. L Bouganim, B Jónsson and P Bonnet. uFLIP: Un banc d'essai pour l'étude des performances de composants Flash. In 25èmes journées Bases de Données Avancées (BDA). 2009. BibTeX

    @inproceedings{BJBo09,
    	author = "L. Bouganim and B. J\'{o}nsson and P. Bonnet",
    	title = "uFLIP: Un banc d'essai pour l'étude des performances de composants Flash",
    	booktitle = "25\`{e}mes journ\'{e}es Bases de Donn\'{e}es Avanc\'{e}es (BDA)",
    	year = 2009,
    	address = "Namur, Belgium",
    	annote = "confnat",
    	x-international-audience = "no",
    	x-pays = "DK,IS",
    	x-proceedings = "yes"
    }
    
  5. N Anciaux and J -J Vandewalle. Demonstration of electronic Health Records (eHR) on Java Card${^TM}$ 3.0 Technology.. In BOF-4576, CS Advanced Based Devices, JavaOne Conference. 2009. BibTeX

    @inproceedings{AnVa09,
    	author = "N. Anciaux and J.-J. Vandewalle",
    	title = "Demonstration of electronic Health Records (eHR) on Java Card${^{TM}}$ 3.0 Technology.",
    	booktitle = "BOF-4576, CS Advanced Based Devices, JavaOne Conference",
    	year = 2009,
    	annote = "confint"
    }
    

Misc

  1. L Bouganim. Dossier médico-social sécurisé. Office Parlementaire d'Evaluation des Choix Scientifiques et Technologiques, 2009. BibTeX

    @misc{Boug09d,
    	author = "L. Bouganim",
    	title = "Dossier médico-social sécurisé",
    	howpublished = "Office Parlementaire d'Evaluation des Choix Scientifiques et Technologiques",
    	year = 2009,
    	annote = "confinv"
    }
    
  2. L Bouganim. Logiciel uFLIP version 2.1, enregistré à l'Agence pour la Protection des Programmes (APP) sous le numéro IDDN.FR.001.110020.000.S.P.2009.0000.10000 en date du 10 mars 2009. 2009. BibTeX

    @misc{Boug09c,
    	author = "L. Bouganim",
    	title = "Logiciel uFLIP version 2.1, enregistr\'{e} \`{a} l'Agence pour la Protection des Programmes (APP) sous le num\'{e}ro IDDN.FR.001.110020.000.S.P.2009.0000.10000 en date du 10 mars 2009",
    	year = 2009,
    	annote = "brevet"
    }
    
  3. N Anciaux, L Bouganim, P Pucheral, S Yin, M Benzine, K Jacquemin, D Shasha, C Salperwyck and El M Kholy. Logiciel PlugDB-engine version 2, enregistré à l'Agence pour la Protection des Programmes (APP) sous le numéro IDDN.FR.001.280004.000.S.C.2008.0000.10000 en date du 27 avril 2009. 2009. BibTeX

    @misc{ABP+09,
    	author = "N. Anciaux and L. Bouganim and P. Pucheral and S. Yin and M. Benzine and K. Jacquemin and D. Shasha and C. Salperwyck and M. El Kholy",
    	title = "Logiciel PlugDB-engine version 2, enregistr\'{e} \`{a} l'Agence pour la Protection des Programmes (APP) sous le num\'{e}ro IDDN.FR.001.280004.000.S.C.2008.0000.10000 en date du 27 avril 2009",
    	year = 2009,
    	annote = "brevet",
    	x-pays = "US"
    }
    

 Imprimer 

Our website is protected by DMC Firewall!