default search action
Yves Deswarte
- > Home > Persons > Yves Deswarte
Publications
- 2014
- [j15]Anas Abou El Kalam, Mohammed Gad El Rab, Yves Deswarte:
A model-driven approach for experimental evaluation of intrusion detection systems. Secur. Commun. Networks 7(11): 1955-1973 (2014) - 2011
- [p2]Anas Abou El Kalam, Carlos Aguilar Melchor, Stefan Berthold, Jan Camenisch, Sebastian Clauß, Yves Deswarte, Markulf Kohlweiss, Andriy Panchenko, Lexi Pimenidis, Matthieu Roy:
Further Privacy Mechanisms. Digital Privacy - PRIME 2011: 485-555 - 2009
- [j10]Anas Abou El Kalam, Yves Deswarte, Amine Baïna, Mohamed Kaâniche:
PolyOrBAC: A security framework for Critical Infrastructures. Int. J. Crit. Infrastructure Prot. 2(4): 154-169 (2009) - [c43]Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte:
Manipulation of Network Traffic Traces for Security Evaluation. AINA Workshops 2009: 1124-1129 - [e7]Anas Abou El Kalam, Yves Deswarte, Mahmoud Mostafa:
CRiSIS 2009, Post-Proceedings of the Fourth International Conference on Risks and Security of Internet and Systems, Toulouse, France, October 19-22, 2009. IEEE 2009, ISBN 978-1-4244-4498-4 [contents] - 2008
- [c40]Amine Baïna, Yves Deswarte, Anas Abou El Kalam, Mohamed Kaâniche:
Access control for cooperative systems: A comparative analysis. CRiSIS 2008: 19-26 - [c39]Anas Abou El Kalam, Yves Deswarte:
Critical Infrastructures Security Modeling, Enforcement and Runtime Checking. CRITIS 2008: 95-108 - [c37]Amine Baïna, Anas Abou El Kalam, Yves Deswarte, Mohamed Kaâniche:
Collaborative Access Control For Critical Infrastructures. Critical Infrastructure Protection 2008: 189-201 - [c36]Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte:
Execution Patterns in Automatic Malware and Human-Centric Attacks. NCA 2008: 29-36 - 2007
- [c34]Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte:
Defining categories to select representative attack test-cases. QoP 2007: 40-42 - [c33]Paulo Veríssimo, Nuno Ferreira Neves, Miguel Correia, Yves Deswarte, Anas Abou El Kalam, Andrea Bondavalli, Alessandro Daidone:
The CRUTIAL Architecture for Critical Information Infrastructures. WADS 2007: 1-27 - [c32]Anas Abou El Kalam, Yves Deswarte, Amine Baïna, Mohamed Kaâniche:
Access Control for Collaborative Systems: A Web Services Based Approach. ICWS 2007: 1064-1071 - 2005
- [c29]Anas Abou El Kalam, Yves Deswarte:
Privacy Requirements Implemented with a JavaCard. ACSAC 2005: 527-536 - [c28]Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier:
Personal data anonymization for security and privacy in collaborative environments. CTS 2005: 56-61 - 2004
- [j2]Yves Deswarte, Anas Abou El Kalam:
Modèle de sécurité pour le secteur de la santé. Tech. Sci. Informatiques 23(3): 291-321 (2004) - [c26]Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier:
Smartcard-based Anonymization. CARDIS 2004: 49-66 - [c23]Anas Abou El Kalam, Yves Deswarte, Gilles Trouessin, Emmanuel Cordonnier:
A generic approach for healthcare data anonymization. WPES 2004: 31-32 - [e6]Jean-Jacques Quisquater, Pierre Paradinas, Yves Deswarte, Anas Abou El Kalam:
Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8/WG8.8 & TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France. IFIP 153, Kluwer/Springer 2004, ISBN 1-4020-8146-4 [contents] - 2003
- [c20]Anas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida, Frédéric Cuppens, Claire Saurel, Philippe Balbiani, Yves Deswarte, Gilles Trouessin:
Organization based access contro. POLICY 2003: 120- - [c19]Anas Abou El Kalam, Yves Deswarte:
Security Model for Health Care Computing and Communication Systems. SEC 2003: 277-288
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint