Name
Affiliation
Papers
ROMAIN LABORDE
Univ Toulouse, IRIT, UMR 5505, Toulouse, France
62
Collaborators
Citations 
PageRank 
71
162
28.88
Referers 
Referees 
References 
325
783
448
Search Limit
100783
Title
Citations
PageRank
Year
On the Validation of Web X.509 Certificates by TLS Interception Products00.342022
Know Your Customer: Opening A New Bank Account Online Using Uaaf00.342020
A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework00.342020
Foundations and Practice of Security - 12th International Symposium, FPS 2019, Toulouse, France, November 5-7, 2019, Revised Selected Papers00.342020
Detecting abnormal DNS traffic using unsupervised machine learning00.342020
Improved Identity Management with Verifiable Credentials and FIDO10.402019
A situation-driven framework for dynamic security management20.462019
Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situations00.342019
Logic-based methodology to help security architects in eliciting high-level network security requirements.00.342019
Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies.00.342018
A new approach for managing Android permissions: learning users' preferences.00.342017
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker.20.432017
Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach10.432017
Tls Connection Validation By Web Browsers: Why Do Web Browsers Still Not Agree?00.342017
Demonstration of KAPUER: A privacy policy manager on Android10.482016
Towards the Weaving of the Characteristics of Good Security Requirements.00.342016
A Recommender-Based System for Assisting Non-technical Users in Managing Android Permissions.00.342016
Le projet ANR INCOME, processus et outils logiciels pour des gestionnaires de contexte au dessus de l'Internet des objets.00.342016
Difficulties to enforce your privacy preferences on Android? Kapuer will help you00.342016
How Can I Trust an X.509 Certificate? An Analysis of the Existing Trust Approaches00.342016
G-Cloud on Openstack: Adressing access control and regulation requirements30.422015
KAPUER : un assistant à l'écriture de politiques d'autorisation pour la protection de la vie privée.00.342014
Kapuer: A Decision Support System for Protecting Privacy.00.342014
A data flow-oriented specification method for analysing network security configurations00.342014
An Adaptive XACMLv3 Policy Enforcement Point20.402014
A survey on addressing privacy together with quality of context for context management in the Internet of Things.50.492014
Specification and Enforcement of Dynamic Authorization Policies Oriented by Situations50.552014
A specification method for analyzing fine grained network security mechanism configurations.00.342013
Toward authorization as a service: a study of the XACML standard30.442013
Authorization Policies: Using Decision Support System for Context-Aware Protection of User's Private Data60.712013
PKI Interoperability: Still an Issue? A Solution in the X.509 Realm.00.342013
INCOME - Multi-scale Context Management for the Internet of Things.120.772012
A formal model of trust for calculating the quality of X.509 certificate.80.762011
A Generic Data Flow Security Model.00.342011
Toward Self-Contained Authorization Policies10.362010
A secure collaborative web-based environment for virtual organisations30.582009
Which Web Browsers Process SSL Certificates in a Standardized Way?40.632009
An Extensible XACML Authorization Web Service: Application to Dynamic Web Sites Access Control20.412009
An organizational pattern for contributing to the deployment of secure Virtual Enterprises00.342009
Validating X.509 Certificates Based on their Quality10.382008
Coordinating access control in grid services111.202008
A best practices-oriented approach for establishing trust chains within Virtual Organisations30.482008
A trust-based virtual collaborative environment20.372008
PERMIS: a modular authorization infrastructure201.412008
Authentication in Virtual Organizations: A Reputation Based PKI Interconnection Model00.342008
The X.509 certificate quality00.342008
PEP = Point to Enhance Particularly40.532008
An Extension of XACML to Improve the Performance of Decision Making Processes When Dealing with Stable Conditions10.382008
Implementation of a Formal Security Policy Refinement Process in WBEM Architecture50.482007
Dealing with Stable Environmental Conditions in XACML Systems10.372007
  • 1
  • 2