EN FR
EN FR


Bibliography

Major publications by the team in recent years
  • 1E. Anceaume, F. Brasileiro, R. Ludinard, B. Sericola, F. Tronel.

    Dependability Evaluation of Cluster-based Distributed Systems, in: International Journal of Foundations of Computer Science (IJFCS), Aug 2011, vol. 22, no 5, p. 1123-1142.
  • 2M. A. Ayachi, C. Bidan, N. Prigent.

    A Trust-Based IDS for the AODV Protocol, in: Proc. of the 12th international conference on Information and communications security (ICICS 2010), Barcelona, Spain, December 2010.
  • 3J. C. Demay, F. Majorczyk, E. Totel, F. Tronel.

    Detecting illegal system calls using a data-oriented detection model, in: Proc. of the 26th IFIP TC 11 International Information Security Conference - Future Challenges in Security and Privacy for Academia and Industry (SEC2011), Lucerne, Switzerland, Jun 2011.
  • 4S. Gambs, B. Kégl, E. Aïmeur.

    Privacy-preserving boosting, in: Data Mining and Knowledge Discovery, 2007, vol. 14, no 1, p. 131-170.
  • 5G. Hiet, V. Viet Triem Tong, L. , B. Morin.

    Policy-based intrusion detection in web applications by monitoring Java information flows, in: International Journal of Information and Computer Security, 2009, vol. 3, no 3/4, p. 265–279.
  • 6L. , H. Debar.

    New Directions in Intrusion Detection and Alert Correlation, in: The Information - Interaction - Intelligence (I3) Journal, 2010, vol. 10, no 1.
  • 7G. Piolle, Y. Demazeau.

    Representing privacy regulations with deontico-temporal operators, in: Web Intelligence and Agent Systems, Jul 2011, vol. 9, no 3, p. 209-226.
  • 8G. Piolle.

    A dyadic operator for the gradation of desirability, in: Proc. of the 10th international conference on deontic logic in computer science (DEON'10), Fiesole, Italy, LNAI, Springer, July 2010, vol. 6181, p. 33-49.
  • 9E. Totel, F. Majorczyk, L. .

    COTS Diversity based Intrusion Detection and Application to Web Servers, in: Proc. of the International Symposium on Recent Advances in Intrusion Detection (RAID'2005), Seattle, USA, September 2005.
  • 10D. Zou, N. Prigent, J. Bloom.

    Compressed Video Stream Watermarking for Peer-to-Peer-Based Content Distribution Network, in: Proc. of the IEEE International Conference on Multimedia and Expo (IEEE ICME), New York City, USA, June 2009.
Publications of the year

Doctoral Dissertations and Habilitation Theses

  • 11M. Ali Ayachi.

    Contributions à la détection de comportements malhonnêtes dans les réseaux ad hoc AODV par analyse de la confiance implicite, université de Rennes 1, february 2011.
  • 12J.-M. Borello.

    Etude du métamorphisme viral : modélisation, conception et détection, université de Rennes 1, april 2011.
  • 13J. C. Demay.

    Génération et évaluation de mécanismes de détection des intrusions au niveau applicatif, Supélec, july 2011.
  • 14I. Moise.

    Efficient Agreement Protocols for Asynchronous Distributed Systems (Des protocoles d'accord efficaces pour des systèmes répartis asynchrones), université de Rennes 1, december 2011.

Articles in International Peer-Reviewed Journal

  • 15E. Anceaume, F. Brasileiro, R. Ludinard, B. Sericola, F. Tronel.

    Dependability Evaluation of Cluster-based Distributed Systems, in: International Journal of Foundations of Computer Science (IJFCS), Aug 2011, vol. 22, no 5, p. 1123-1142.
  • 16S. Gambs, M.-O. Killijian, M. Núnez del Prado Cortez.

    Show Me How You Move and I Will Tell You Who You Are, in: Transactions on Data Privacy, Aug 2011, vol. 4, no 2, p. 103-126.
  • 17D. Le Métayer, M. Maarek, E. Mazza, M.-L. Potet, S. Frénot, V. Viet Triem Tong, N. Craipeau, R. Hardouin.

    Liability Issues in Software Engineering: The Use of Formal Methods to Reduce Legal Uncertainties, in: Communications of the ACM, Apr 2011, vol. 54, no 4, p. 99-106.
  • 18G. Piolle, Y. Demazeau.

    Representing privacy regulations with deontico-temporal operators, in: Web Intelligence and Agent Systems, Jul 2011, vol. 9, no 3, p. 209-226.

International Conferences with Proceedings

  • 19M. Alaggan, A.-M. Kermarrec, S. Gambs.

    Private similarity computation in distributed systems: from cryptography to differential privacy, in: Proc. of the 15th International Conference On Principles Of Distributed Systems (OPODIS'11), Toulouse, France, Dec 2011.
  • 20E. Anceaume, C. Bidan, G. Hiet, L. , G. Piolle, N. Prigent, E. Totel, F. Tronel, V. Viet Triem Tong, S. Gambs, M. Hurfin.

    From SSIR to CIDre: a New Security Research Group in Rennes, France, in: Proc. of the 1st SysSec Workshop, Amsterdam, The Netherlands, Jul 2011, p. 89-92.
  • 21E. Anceaume, Y. Busnel, S. Gambs.

    Characterizing the adversarial power in uniform and ergodic node sampling, in: Proc. of the 1st Int. Workshop on Algorithms and Models for Distributed Event Processing (AIMoDEP'11), Rome, Italy, Sep 2011, p. 12-19.

    http://hal.inria.fr/inria-00617866/en
  • 22E. Anceaume, B. Sericola, R. Ludinard, F. Tronel.

    Modeling and Evaluating Targeted Attacks in Large Scale Dynamic Systems, in: Proc. of the 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2011) - The Performance and Dependability Symposium (PDS), Hong Kong, China, Jun 2011.
  • 23E. Aïmeur, S. Gambs, A. T. Ho.

    Maintaining sovereignty on personal data on social networking sites, in: Proc of the Conference Privacy and Accountability (PATS'11), Berlin, Germany, april 2011.
  • 24M. Ben Ghorbel-Talbi, F. Cuppens, N. Cuppens-Boulahia, D. Le Métayer, G. Piolle.

    Delegation of Obligations and Responsibility, in: Proc. of the 26th IFIP TC 11 International Information Security Conference - Future Challenges in Security and Privacy for Academia and Industry (SEC2011), Lucerne, Switzerland, Jun 2011, p. 197-209.
  • 25J.-M. Borello, L. , E. Filiol.

    Dynamic Malware Detection by Similarity Measures Between Behavioral Profiles: an Introduction in French, in: Proc. of the 6th conference on network and information systems security (SAR-SSI), La Rochelle, France, May 2011, p. 125-132.
  • 26G. Bossert, G. Hiet, T. Henin.

    Modelling to Simulate Botnet Command and Control Protocols for the Evaluation of Network Intrusion Detection Systems, in: Proc. of the 6th Conference on Network Architecture and Information Systems Security (SAR-SSI 2011), La Rochelle, France, May 2011, p. 1-8.
  • 27Jonathan Christopher. Demay, F. Majorczyk, E. Totel, F. Tronel.

    Detecting illegal system calls using a data-oriented detection model, in: Proc. of the 26th IFIP TC 11 International Information Security Conference - Future Challenges in Security and Privacy for Academia and Industry (SEC2011), Lucerne, Switzerland, Jun 2011.
  • 28T. Demongeot, E. Totel, V. Viet Triem Tong, Y. Le Traon.

    Preventing data leakage in service orchestration, in: Proc. of the 7th Int. Conference on Information Assurance and Security (IAS 2011), Malacca, Malaysia, Dec 2011.
  • 29S. Gambs, O. Heen, C. Potin.

    A Comparative Privacy Analysis of Geosocial Networks, in: Proc of the 4th Int. Workshop on Security and Privacy in GIS and LBS (SPRINGL 2011), Chicago, USA, Nov 2011.
  • 30S. Geller, C. Hauser, F. Tronel, V. Viet Triem Tong.

    Information Flow Control for Intrusion Detection Derived from MAC Policy, in: Proc. of the IEEE International Conference on Communication (ICC 2011), Kyoto, Japan, Jun 2011.
  • 31M. Hurfin, I. Moise, J.-P. Le Narzul.

    An Adaptive Fast Paxos for Making Quick Everlasting Decisions, in: Proc. of the 25th IEEE International Conference on Advanced Information Networking and Applications (AINA), Biopolis, Singapore, Mar 2011, p. 208-215.
  • 32M. Jaume, V. Viet Triem Tong, L. .

    Flow based interpretation of access control: Detection of illegal information flows, in: Proc. of the 7th International Conference on Information Systems Security (ICISS), Kolkata, India, LNCS, Springer Verlag, Dec 2011, vol. 7093, p. 72-86.
  • 33I. Moise, M. Hurfin, L. Zeghache, N. Badache.

    Cloud-Based Support for Transactional Mobile Agents, in: Proc. of the 7th International Symposium on Frontiers of Information Systems and Network Applications (FINA) in conjunction with the 25th IEEE International Conference on Advanced Information Networking and Applications (AINA), Biopolis, Singapore, Mar 2011, p. 190-197.
  • 34I. Moise, M. Hurfin, J.-P. Le Narzul, F. Majorczyk.

    Evaluation du caractère adaptatif d'un protocole de consensus de type "Fast Paxos", in: Proc. of the 13es Rencontres Francophones sur les Aspects Algorithmiques de Télécommunications (AlgoTel), Cap Estérel, France, B. Ducourthial, P. Felber (editors), Mai 2011.

    http://hal.inria.fr/inria-00588203/en
  • 35K. Tabia, S. Benferhat, P. Leray, L. .

    Alert correlation in intrusion detection: Combining AI-based approaches for exploiting security operators' knowledge and preferences, in: Proc. of the 3rd Workshop on Intelligent Security - Security and Artificial Intelligence (Sec-Art 2011), Barcelona, Spain, Jul 2011, p. 42-49.

National Conferences with Proceeding

  • 36I. Moise, M. Hurfin, J.-P. Le Narzul, F. Majorczyk.

    Évaluation de politiques d'adaptation au risque de collisions dans un consensus de type "Fast Paxos", in: Proc. of the 20ièmes Rencontres francophones du parallélisme (RenPar'20), Saint-Malo, France, Mai 2011.
  • 37V. Viet Triem Tong, R. Andriatsimandefitra, S. Geller, S. Boche, F. Tronel, C. Hauser.

    Mise en oeuvre de politiques de protection des flux d'information dans l'environnement Androïd, in: Proc. of the Computer & Electronics Security Applications Rendez-vous (C&ESAR 2011), Rennes, France, Nov 2011.

Conferences without Proceedings

  • 38E. Anceaume, R. Ludinard, B. Sericola, F. Tronel.

    Modélisation et Evaluation des Attaques Ciblées dans un Overlay Structuré, in: Colloque Francophone sur l Ingénierie des Protocoles (CFIP 2011), Sainte Maxime, France, May 2011.

    http://hal.inria.fr/inria-00586875/en
  • 39G. Aucher, C. Barreau-Saliou, G. Boella, A. Blandin-Obernesser, S. Gambs, G. Piolle, L. Van Der Torre.

    The Coprelobri project: the logical approach to privacy, in: 2e Atelier Protection de la Vie Privée (APVP 2011), Sorèze, France, Jun 2011.

    http://hal.inria.fr/hal-00606014/en
  • 40R. Ludinard, L. Le Hennaff, E. Totel.

    RRABIDS, un système de détection d'intrusion pour les applications Ruby on Rails, in: Proc. of the Symposium sur la sécurité des technologies de l'information et des communications (SSTIC 2011), Rennes, France, Jun 2011.

Internal Reports

  • 41G. Brassard, F. Dupuis, S. Gambs, A. Tapp.

    An optimal quantum algorithm to approximate the mean and its application for approximating the median of a set of points over an arbitrary distance, INRIA, June 2011, Ten pages, no figures, three algorithms.
  • 42S. Gambs, R. Guerraoui, H. Harkous, F. Huc, A.-M. Kermarrec.

    Scalable and Secure Aggregation in Distributed Networks, INRIA, November 2011.
  • 43R. Ludinard, E. Totel, F. Tronel, V. Nicomette, M. Kaaniche, E. Alata, R. Akrout, Y. Bachy.

    RRABIDS: ruby on rails anomaly based intrusion detection system, LAAS, June 2011, no 11294.

Scientific Popularization

  • 44G. Piolle.

    Outils informatiques pour la protection de la vie privée, June 2011, Interstices.
References in notes
  • 45Jonathan Christopher. Demay, F. Majorczyk, E. Totel, F. Tronel.

    Detecting illegal system calls using a data-oriented detection model, in: In Proc. of the 26th IFIP TC 11 International Information Security Conference - Future Challenges in Security and Privacy for Academia and Industry (SEC2011), Lucerne, Switzerland, Jun 2011.
  • 46G. Hiet, V. Viet Triem Tong, L. , B. Morin.

    Policy-Based Intrusion Detection in Web Applications by Monitoring Java Information Flows, in: 3nd International Conference on Risks and Security of Internet and Systems (CRiSIS 2008), 2008.
  • 47L. Lamport.

    Paxos Made Simple, in: ACM SIGACT News, December 2001, vol. 32, no 4, p. 51–58.
  • 48L. Lamport.

    Fast Paxos, in: Distributed Computing, 2006, vol. 19, no 2, p. 79–103.
  • 49L. Lamport.

    The part-time parliament, in: ACM Transaction on Computer Systems, May 1998, vol. 16, no 2, p. 133–169.
  • 50A. Myers, F. Schneider, K. Birman.

    Nsf project security and fault tolerance, nsf cybertrust grant 0430161, 2004.

    http://www.cs.cornell.edu/Projects/secft/
  • 51G. Piolle, Y. Demazeau.

    Obligations with deadlines and maintained interdictions in privacy regulation frameworks, in: Proc. of the 8th IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT'08), Sidney, Australia, December 2008, p. 162–168.
  • 52O. Sarrouy, E. Totel, B. Jouga.

    Building an application data behavior model for intrusion detection, in: Proc. of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Montreal Canada, 07 2009, p. pp. 299–306.
  • 53J. Zimmermann, L. , C. Bidan.

    An improved reference flow control model for policy-based intrusion detection, in: Proc. of the 8th European Symposium on Research in Computer Security (ESORICS), October 2003.