A Tool to Analyze Potential I/O Attacks against PCs | 0 | 0.34 | 2014 |
A model-driven approach for experimental evaluation of intrusion detection systems | 0 | 0.34 | 2014 |
Low-Level Attacks on Avionics Embedded Systems | 0 | 0.34 | 2013 |
Security of embedded automotive networks: state of the art and a research proposal. | 0 | 0.34 | 2013 |
Potential Attacks on Onboard Aerospace Systems | 3 | 0.47 | 2012 |
The challenges raised by the privacy-preserving identity card | 0 | 0.34 | 2012 |
AMORES: an architecture for mobiquitous resilient systems | 3 | 0.42 | 2012 |
Protecting critical infrastructures while preserving each organization's autonomy | 0 | 0.34 | 2011 |
I/O Attacks in Intel PC-based Architectures and Countermeasures | 10 | 0.51 | 2011 |
Tolerance of design faults | 2 | 0.42 | 2011 |
Enforcing kernel constraints by hardware-assisted virtualization | 5 | 0.61 | 2011 |
Exploiting an I/OMMU vulnerability | 22 | 1.55 | 2010 |
A Proposal for a Privacy-preserving National Identity Card | 4 | 0.43 | 2010 |
The Design of a Generic Intrusion-Tolerant Architecture for Web Servers | 28 | 1.59 | 2009 |
Enhancing dependability in avionics using virtualization | 1 | 0.35 | 2009 |
Manipulation of Network Traffic Traces for Security Evaluation | 2 | 0.39 | 2009 |
Towards a privacy-preserving national identity card | 1 | 0.36 | 2009 |
CRiSIS 2009, Post-Proceedings of the Fourth International Conference on Risks and Security of Internet and Systems, Toulouse, France, October 19-22, 2009 | 19 | 2.10 | 2009 |
Critical Infrastructures Security Modeling, Enforcement and Runtime Checking | 2 | 0.39 | 2008 |
Execution Patterns in Automatic Malware and Human-Centric Attacks | 2 | 0.41 | 2008 |
Collaborative Access Control For Critical Infrastructures | 4 | 0.45 | 2008 |
Efficient Remote Data Possession Checking in Critical Information Infrastructures | 95 | 3.32 | 2008 |
Closed-Circuit Unobservable Voice over IP | 7 | 0.46 | 2007 |
The CRUTIAL Architecture for Critical Information Infrastructures | 13 | 0.77 | 2007 |
Defining categories to select representative attack test-cases | 1 | 0.40 | 2007 |
Access Control for Collaborative Systems: A Web Services Based Approach | 5 | 0.53 | 2007 |
Empirical analysis and statistical modeling of attack processes based on honeypots | 19 | 1.34 | 2007 |
Current and future privacy enhancing technologies for the Internet | 12 | 0.73 | 2006 |
Intrusion-Tolerant Middleware: The Road to Automatic Security | 40 | 1.95 | 2006 |
Internet security: an intrusion-tolerance approach | 12 | 0.64 | 2006 |
From DC-Nets to pMIXes: Multiple Variants for Anonymous Communications | 6 | 0.46 | 2006 |
Single-Database private information retrieval schemes: overview, performance study, and usage with statistical databases | 3 | 0.46 | 2006 |
Le projet européen PRIME: protection de la vie privée et gestion des identités pour l'Europe. | 0 | 0.34 | 2006 |
Personal data anonymization for security and privacy in collaborative environments | 4 | 0.51 | 2005 |
Privacy Requirements Implemented with a JavaCard | 2 | 0.45 | 2005 |
pMIX: Untraceability for Small Hiding Groups. | 3 | 0.39 | 2005 |
Smartcard-based Anonymization | 3 | 0.65 | 2004 |
Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8/WG8.8 & TC11/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS), 22-27 August 2004, Toulouse, France | 20 | 4.67 | 2004 |
A generic approach for healthcare data anonymization | 3 | 0.51 | 2004 |
Modèle de sécurité pour le secteur de la santé. | 0 | 0.34 | 2004 |
Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France | 24 | 28.66 | 2004 |
Intrusion Tolerance for Internet Applications | 3 | 0.40 | 2004 |
Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France | 34 | 3.59 | 2004 |
Security Model for Health Care Computing and Communication Systems | 1 | 0.37 | 2003 |
Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers. | 7 | 0.54 | 2003 |
An intrusion tolerant architecture for dynamic content internet servers | 3 | 0.46 | 2003 |
Organization based access control | 297 | 12.58 | 2003 |
Dependable Intrusion Tolerance: Technology Demo | 2 | 0.38 | 2003 |
An Architecture for an Adaptive Intrusion-Tolerant Server | 23 | 2.18 | 2002 |
An Internet Authorization Scheme Using Smart-Card-Based Security Kernels | 0 | 0.34 | 2001 |