Name
Affiliation
Papers
ALBAN GABILLON
Univ Polynesie Francaise, Lab GePaSud, BP 6570, F-98702 Tahiti, Polynesie Franc, France
59
Collaborators
Citations 
PageRank 
41
220
28.65
Referers 
Referees 
References 
323
644
568
Search Limit
100644
Title
Citations
PageRank
Year
A Kernel Machine For Hidden Object-Ranking Problems (Horps) Formalization And Application To Tahitian Black Pearls Quality Assessment00.342020
Access Controls for IoT Networks.10.362020
Ordinal Learning With Vector Space Based Binary Predicates And Its Application To Tahitian Pearls' Luster Automatic Assessment00.342018
Regulating Iot Messages00.342018
A Security Model for IoT Networks.00.342018
Computer vision based nacre thickness measurement of Tahitian pearls.00.342017
A comprehensive view on quantity based aggregation for cadastral databases.00.342017
Tahitian Pearls' Luster Assessment Automation00.342017
A Quantity Based Aggregation Control Model for Graph Databases.00.342016
Automatic Nacre Thickness Measurement Of Tahitian Pearls20.442015
Implementing Quantity Based Aggregation Control for Cadastral Databases20.372014
Quantity based aggregation for cadastral databases20.382014
Automatic Classification of Tahitian Pearls10.402014
Cover story management160.742014
Collusion Resistant Inference Control for Cadastral Databases30.392013
Toward a Normalized XML Schema for the GGP Data Archives.00.342013
Information Security Risk Management in a World of Services10.362013
Enforcing protection mechanisms for geographic data10.352012
A Fine-Grained Image Access Control Model20.382012
A Privacy Model For Social Networks00.342011
The Image Protector - A Flexible Security Rule Specification Toolkit .40.412011
A View Based Access Control Model for SPARQL70.492010
Security mechanisms for geographic data10.362010
Rule-based policy enforcement point for map services20.372010
Dynamic security rules for geo data60.482009
Multisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key Model10.362009
On Key Distribution in MANETs00.342009
Security policies for the visualization of Geo Data30.412009
A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper)10.372008
Signtiming scheme based on aggregate signature10.372008
A General Approach to Securely Querying XML200.732008
DRM policies for web map service10.362008
Introduction Selection of articles from the SAR-SSI 2006.00.342007
Securely Updating XML60.462007
Etude des systèmes d'horodatage10.392007
Availability Constraints for Avionic Data Buses20.412006
Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006162.452006
A New Persistent Labelling Scheme for XML00.342006
A Logical Formalization Of Secure Xml Database00.342006
A new timestamping scheme based on skip lists50.442006
Directions and trends of XML and web service security00.342006
Secure time-stamping schemes: a distributed point of view.70.602006
Availability of ARINC 629 Avionic Data Bus10.392006
A New Digital Notary System00.342006
A persistent labelling scheme for XML and tree databases10.362005
A formal access control model for XML databases150.772005
CHRONOS: an authenticated dictionary based on skip lists for timestamping systems160.892005
An authorization model for XML databases170.912004
An Access Control Model for Tree Data Structures50.512002
A two-level time-stamping system20.442001
  • 1
  • 2