Major publications by the team in recent years
  • 1D. Le Métayer (editor)

    Les technologies au service des droits, opportunités, défis, limites, Bruylant, Cahiers du CRID No 32, 2010.
  • 2D. Le Métayer, M. Maarek, E. Mazza, M.-L. Potet, S. Frenot, V. Viet Triem Tong, N. Craipeau, R. Hardouin.

    Liability in software engineering: overview of the LISE approach and application on a case study, in: International Conference on Software Engineering, ICSE'2010, ACM/IEEE, 2010, p. 135-144.
  • 3D. Le Métayer, E. Mazza, M.-L. Potet.

    Designing log architectures for legal evidence, in: 8th International Conference on Software Engineering and Formal Methods, SEFM'2010, IEEE, 2010, p. 156-165.
  • 4D. Le Métayer, S. Monteleone.

    Automated consent through privacy agents : legal requirements and technical architecture, in: The Computer Law and Security Review, Elsevier, 2009, vol. 25(2).
Publications of the year

Articles in International Peer-Reviewed Journal

  • 5D. Le Métayer, M. Maarek, E. Mazza, M.-L. Potet, S. Frenot, V. Viet Triem Tong, N. Craipeau, R. Hardouin.

    Liability issues in software engineering. The use of formal methods to reduce legal uncertainties, in: Communications of the ACM, 2011, vol. 54, 4, p. 99-106.

Articles in National Peer-Reviewed Journal

  • 6D. Le Métayer.

    Responsabilités du fait des logiciels: prendre en compte les exigences juridiques dès la phase de conception pour faciliter le règlement ultérieur des différends, in: Revue Lamy Droit de l'Immatériel, 2012, to appear.

Invited Conferences

  • 7D. Le Métayer.

    Formal methods as a link between software code and legal rules, in: 9th International Conference on Software Engineering and Formal Methods, SEFM'2011, G. Barthe, A. Pardo, G. Schneider (editors), Lecture Notes in Computer Science, Springer, 2011, vol. 7041, p. 13-18.

International Conferences with Proceedings

  • 8M. B. Ghorbel-Talbi, F. Cuppens, N. Cuppens-Boulahia, D. Le Métayer, G. Piolle.

    Delegation of Obligations and Responsibility, in: Proceedings of the IFIP SEC 2011 Conference - Future Challenges in Security and Privacy for Academia and Industry, IFIP publisher Springer Science and Business Media, 2011, p. 197-209.
  • 9D. Le Métayer, J. Le Clainche.

    From the protection of data to the protection of individuals: extending the application of non discrimination principles, in: European Data Protection: In Good Health ?, S. Gutwirth, Y. Poullet, P. De Hert (editors), Springer Verlag, 2012, to appear.
  • 10R. Thion, D. Le Métayer.

    FLAVOR: a formal language for a posteriori verification of legal rules, in: Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, IEEE, 2011, p. 1-8.

National Conferences with Proceeding

  • 11L. Astefanoaei, G. Goessler, D. Le Métayer, E. Mazza, M.-L. Potet, V. Viet Triem Tong.

    Apport des méthodes formelles pour l'exploitation de logs informatiques dans un contexte contractuel, in: Proceedings of the Conference Approches Formelles dans l'Assistance au Développement de Logiciels, AFADL, 2012, to appear.
  • 12S. Steer, N. Craipeau, D. Le Métayer, M. Maarek, M.-L. Potet, V. Viet Triem Tong.

    Définition des responsabilités pour les dysfonctionnements de logiciels: cadre contractuel et outils de mise en oeuvre, in: Proceedings of the Conference Droit, sciences et techniques, quelles responsabilités ?, Litec, LexisNexis, 2011, p. 199-216.
References in notes
  • 13L. L. Fuller.

    The morality of law, Yale University Press, 1964.
  • 14D. Le Métayer, A. Rouvroy.

    STIC et droit : défis, conflits et complémentarités, in: Interstices, November 2008.

  • 15L. Lessig.

    The future of ideas: the fate of the commons in a connected world, Random House, 2001.
  • 16L. Lessig.

    Code and other laws of cyberspace, Version 2.0, Basic Books, 2007.
  • 17Y. Poullet.

    The Directive 95/46/EC: ten years after, in: Computer Law and Security Report, 2006, vol. 22, p. 206–217.
  • 18J. Reidenberg.

    Lex informatica: the formulation of information policy rules through technology, in: Texas Law Review, 1998, vol. 76, no 3.
  • 19A. Rouvroy.

    Privacy, data protection and the unprecedented challenges of ambient intelligence, in: Studies in Ethics, Law and Technology, Berkley Electronic Press, 2008.