Skip to Main content Skip to Navigation

hal-02287108v1  Conference papers
Mounira MsahliAhmed SerhrouchniXiuzhen Chen. Towards a Fine-Grained Access Control for Cloud
2014 IEEE 11th International Conference on e-Business Engineering, Oct 2013, Guangzhou, China
hal-02287105v1  Journal articles
Mounira MsahliAhmed Serhrouchni. Profile Centric Model.
International Journal of Internet Technology and Secured Transactions, 2014, 5 (ISSN online: 1748-5703)
hal-02343634v1  Conference papers
Mounira MsahliXiuzhen ChenAhmed Serhrouchni. Towards a Fine-Grained Access Control for Cloud
2014 IEEE 11th International Conference on e-Business Engineering (ICEBE), Nov 2014, Guangzhou, France. pp.286-291, ⟨10.1109/ICEBE.2014.56⟩
hal-02147191v1  Conference papers
Maryline LaurentJean LeneutreSophie ChabridonImane Laaouane. Authenticated and Privacy-Preserving Consent Management in the Internet of Things
ANT 2019: 10th International Conference on Ambient Systems, Networks and Technologies (ANT), Apr 2019, Leuven, Belgium. pp.256-263, ⟨10.1016/j.procs.2019.04.037⟩
hal-00922522v1  Conference papers
Vincent LegoutMathieu JanLaurent Pautet. Mixed-Criticality Multiprocessor Real-Time Systems: Energy Consumption vs Deadline Misses
First Workshop on Real-Time Mixed Criticality Systems (ReTiMiCS), Aug 2013, Taipei, Taiwan. pp.1-6
hal-02354927v1  Journal articles
Mounira MsahliAhmed Serhrouchni. Profile centric modelling
INDERSCIENCE International Journal of Internet Technology and Secured Transactions., Inderscience Enterprises, 2014, 5 (4), pp.344. ⟨10.1504/IJITST.2014.068713⟩
hal-02910407v1  Conference papers
Nathanaël DenisPierre ChaffardonDenis ConanMaryline LaurentSophie Chabridon et al.  Privacy-preserving content-based publish/subscribe with encrypted matching and data splitting
SECRYPT 2020: 17th International Conference on Security and Cryptography, Jul 2020, Lieusaint - Paris, France. pp.405-414, ⟨10.5220/0009833204050414⟩
hal-02450312v1  Conference papers
Han QiuQinkai ZhengMeikang QiuGérard Memmi. DC Coefficients Recovery from AC Coefficients in the JPEG Compression Scenario
Smart Computing and Communication, Oct 2019, Birmingham, United Kingdom. pp.266-276, ⟨10.1007/978-3-030-34139-8_26⟩
hal-03089815v3  Reports
Gérard Memmi. Description de la méthode SCRUM à travers deux expériences en entreprise
[Rapport de recherche] LTCI - Laboratoire Traitement et Communication de l'Information [Paris]. 2020
hal-03628457v1  Directions of work or proceedings
Joaquin Garcia‐alfaroJean LeneutreNora CuppensReda Yaich. Risks and security of internet and systems
CRISIS 2020: 15th International Conference on Risks and Security of Internet and Systems, Nov 2020, Paris, France. 12528, Springer, pp.xi-378, 2021, Lecture Notes in Computer Science (LNCS), 978-3-030-68886-8. ⟨10.1007/978-3-030-68887-5⟩
hal-02287746v1  Conference papers
Arles RodriguezJonatan GomezAda Diaconescu. Replication-Based Self-healing of Mobile Agents Exploring Complex Networks
15th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS), Springer LNAI,, Jun 2017, Porto, Portugal. pp.222-233, ⟨10.1007/978-3-319-59930-4_18⟩
hal-03340371v1  Conference papers
Ankica BarisicDominique BlouinVasco AmaralMiguel Goulao. A Requirements Engineering Approach for Usability-Driven DSL Development
International Conference on Software Language Engineering, Oct 2017, Vancouver, Canada
hal-02009646v1  Journal articles
Christophe KiennertIsmail ZiadHervé DebarJean Leneutre. A survey on game-theoretic approaches for intrusion detection and response optimization
ACM Computing Surveys, Association for Computing Machinery, 2019, 51 (5), pp.article 90 -. ⟨10.1145/3232848⟩
hal-02278638v1  Conference papers
Elie Najm. Service Orchestration with Orcharts and Typecharts
Seminaire INRIA, Mar 2010, Rennes, France
cea-01846864v1  Journal articles
V. LegoutM. JanLaurent Pautet. Scheduling algorithms to reduce the static energy consumption of real-time systems
Experiments in Fluids, Springer Verlag (Germany), 2015, 56 (3), pp.153-191. ⟨10.1007/s11241-014-9207-7⟩
hal-02288430v1  Conference papers
Trung NguyenJean Leneutre. A Secure and Effective Device Pairing Protocol
12th IEEE Consumer Communications and Networking Conference (CCNC), Jan 2015, Las Vegas, United States
hal-01649727v1  Conference papers
Ankica BarisicDominique BlouinVasco AmaralMiguel Goulao. A Requirements Engineering Approach for Usability-Driven DSL Development
International Conference on Software Language Engineering, Oct 2017, Vancouver, Canada
hal-01113214v1  Journal articles
Ziad IsmailJean LeneutreDavid BatemanLin Chen. A Game Theoretical Analysis of Data Confidentiality Attacks on Smart-Grid AMI
IEEE Journal on Selected Areas in Communications, Institute of Electrical and Electronics Engineers, 2014, 32 (7), pp.12. ⟨10.1109/JSAC.2014.2332095⟩
hal-01207895v1  Conference papers
Claire CapdevielleColette JohnenPetr KuznetsovAlessia Milani. Brief Announcement: On the Uncontended Complexity of Anonymous Consensus
DISC 2015, Toshimitsu Masuzawa; Koichi Wada, Oct 2015, Tokyo, Japan
hal-02288439v1  Conference papers
Robin DespouysRémi SharrockIsabelle Demeure. Sensemaking in the autonomic smart-home
UBICOMP Ubiquitous computing, Sep 2014, Seattle, United States
hal-01855989v1  Conference papers
Stephen MarshAda DiaconescuDavid EvansTracy Ann KosaPeter R. Lewis et al.  Public Privacy and Brick Houses Made of Glass
12th IFIP International Conference on Trust Management (TM), Jul 2018, Toronto, ON, Canada. pp.137-148, ⟨10.1007/978-3-319-95276-5_10⟩
hal-03559623v1  Conference papers
Petr KuznetsovAndrei TonkikhYan Zhang. Revisiting Optimal Resilience of Fast Byzantine Consensus
PODC '21: ACM Symposium on Principles of Distributed Computing, Jul 2021, Virtual Event Italy, France. pp.343-353, ⟨10.1145/3465084.3467924⟩
hal-01113223v1  Conference papers
Ziad IsmailJean LeneutreDavid BatemanLin Chen. A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures
IEEE 16th International Symposium on High Assurance Systems Engineering (HASE), Jan 2015, Daytona Beach Shores, FL, United States. ⟨10.1109/HASE.2015.24⟩
hal-03559711v1  Conference papers
Dongmin SonSawsan Al ZahrGerard Memmi. Performance Analysis of an Energy Trading Platform Using the Ethereum Blockchain
2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), May 2021, Sydney, France. pp.1-3, ⟨10.1109/ICBC51069.2021.9461115⟩
hal-03559899v1  Conference papers
Florian BrandnerBenjamin BinderMihail AsavoaeBelgacem Ben HediaMathieu Jan. Is This Still Normal? Putting Definitions of Timing Anomalies to the Test
2021 IEEE 27th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA), Aug 2021, Houston, France. pp.139-148, ⟨10.1109/RTCSA52859.2021.00024⟩
hal-02274532v1  Conference papers
Eric CousinGérald OuvradouC. BacO. BergerP. Lalevee et al.  Développer une nouvelle approche pédagogique ", questionnement autour du cas de PicoLibre
Questions de pédagogies dans l'enseignement supérieur : réflexions, projets et pratiques : actes du 2e colloque, Brest, 25-27 juin 2003, organisé par l'ENSIETA et l'ENST Bretagne, Jun 2003, Brest, France. pp.109 - 114
hal-03560232v1  Conference papers
Petr KuznetsovVitaly AksenovVincent GramoliSrivatsan Ravi. Optimal Concurrency for List-Based Sets
Parallel Computing Technologies - 16th International Conference, Sep 2021, Kaliningrad, Russia
hal-02287739v1  Conference papers
Farouk HebbacheMathieu JanFlorian BrandnerLaurent Pautet. Dynamic Arbitration of Memory Requests with TDM-like Guarantees
Workshop on Compositional Theory and Technology for Real-Time Embedded Systems, Dec 2017, Paris, France
hal-02288493v1  Conference papers
Florian BrandnerNaji Amine. Worst-Case Execution Time Analysis of Predicated Architectures
Workshop on Worst-Case Execution Time Analysis, Jun 2017, Dubrovnik, Croatia. pp.1-13, ⟨10.4230/OASIcs.WCET.2017.6⟩
hal-01887733v1  Conference papers
Vitalii AksenovDan AlistarhPetr Kuznetsov. Brief Announcement: Performance Prediction for Coarse-Grained Locking
PODC 2018 - ACM Symposium on Principles of Distributed Computing, Jul 2018, Egham, United Kingdom. ⟨10.1145/3212734.3212785⟩
hal-03042230v1  Conference papers
Mounira MsahliRached AbdeljaouedAhmed Serhrouchni. Access control in probative value cloud
8th International Conference for Internet Technology and Secured Transactions (ICITST 2013), Dec 2013, London, France. pp.607-611, ⟨10.1109/ICITST.2013.6750274⟩