Bibliography
Major publications by the team in recent years
-
1E. Anceaume, F. Brasileiro, R. Ludinard, B. Sericola, F. Tronel.
Dependability Evaluation of Cluster-based Distributed Systems, in: International Journal of Foundations of Computer Science (IJFCS), Aug 2011, vol. 22, no 5, p. 1123-1142. -
2M. A. Ayachi, C. Bidan, N. Prigent.
A Trust-Based IDS for the AODV Protocol, in: Proc. of the 12th international conference on Information and communications security (ICICS 2010), Barcelona, Spain, December 2010. -
3J. C. Demay, F. Majorczyk, E. Totel, F. Tronel.
Detecting illegal system calls using a data-oriented detection model, in: Proc. of the 26th IFIP TC 11 International Information Security Conference - Future Challenges in Security and Privacy for Academia and Industry (SEC2011), Lucerne, Switzerland, Jun 2011. -
4S. Gambs, B. Kégl, E. Aïmeur.
Privacy-preserving boosting, in: Data Mining and Knowledge Discovery, 2007, vol. 14, no 1, p. 131-170. -
5G. Hiet, V. Viet Triem Tong, L. Mé, B. Morin.
Policy-based intrusion detection in web applications by monitoring Java information flows, in: International Journal of Information and Computer Security, 2009, vol. 3, no 3/4, p. 265–279. -
6L. Mé, H. Debar.
New Directions in Intrusion Detection and Alert Correlation, in: The Information - Interaction - Intelligence (I3) Journal, 2010, vol. 10, no 1. -
7G. Piolle, Y. Demazeau.
Representing privacy regulations with deontico-temporal operators, in: Web Intelligence and Agent Systems, Jul 2011, vol. 9, no 3, p. 209-226. -
8G. Piolle.
A dyadic operator for the gradation of desirability, in: Proc. of the 10th international conference on deontic logic in computer science (DEON'10), Fiesole, Italy, LNAI, Springer, July 2010, vol. 6181, p. 33-49. -
9E. Totel, F. Majorczyk, L. Mé.
COTS Diversity based Intrusion Detection and Application to Web Servers, in: Proc. of the International Symposium on Recent Advances in Intrusion Detection (RAID'2005), Seattle, USA, September 2005. -
10D. Zou, N. Prigent, J. Bloom.
Compressed Video Stream Watermarking for Peer-to-Peer-Based Content Distribution Network, in: Proc. of the IEEE International Conference on Multimedia and Expo (IEEE ICME), New York City, USA, June 2009.
Doctoral Dissertations and Habilitation Theses
-
11H. Borba Ribeiro.
L'Exploitation de Codes Fontaines pour un Stockage Persistant des Données dans les Réseaux d'Overlay Structurés, Université Rennes 1, October 2012.
http://hal. inria. fr/ tel-00763284 -
12E. Totel.
Techniques de détection d'erreur appliquées à la détection d'intrusion, Université Rennes 1, December 2012, Habilitation à Diriger des Recherches.
http://hal. inria. fr/ tel-00763746
Articles in International Peer-Reviewed Journals
-
13E. Anceaume, F. Castella, B. Sericola.
Analysis of a large number of Markov chains competing for transitions, in: International Journal of Systems Science, July 2012, 9 p. [ DOI : 10.1080/00207721.2012.704090 ]
http://hal. inria. fr/ hal-00736916 -
14E. Anceaume, R. Ludinard, B. Sericola.
Performance evaluation of large-scale dynamic systems, in: ACM SIGMETRICS Performance Evaluation Review, April 2012, vol. 39, no 4, p. 108-117. [ DOI : 10.1145/2185395.2185447 ]
http://hal. inria. fr/ hal-00736918 -
15R. Andriatsimandefitra, V. Viet Triem Tong, L. Mé.
User Data on Androïd Smartphone Must be Protected, in: ERCIM News, July 2012, no 90, 18 p.
http://hal. inria. fr/ hal-00735993 -
16E. Aïmeur, G. Brassard, S. Gambs.
Quantum speed-up for unsupervised learning, in: Machine Learning, September 2012.
http://hal. inria. fr/ hal-00736948 -
17E. Aïmeur, G. Brassard, S. Gambs, D. Schönfeld.
P3ERS: Privacy-Preserving PEer Review System, in: Transactions on Data Privacy, October 2012.
http://hal. inria. fr/ hal-00737755 -
18T. Demongeot, E. Totel, V. Viet Triem Tong, Y. Le Traon.
User Data Confidentiality in an Orchestration of Web Services, in: International Journal of Information Assurance and Security, 2012, vol. 7.
http://hal. inria. fr/ hal-00735996 -
19S. Gambs.
Inference attacks on geolocated data, in: ERCIM News, July 2012, 23 p.
http://hal. inria. fr/ hal-00736946 -
20C. Humphries, N. Prigent, C. Bidan.
Visualization for Monitoring Network Security Events, in: ERCIM News, July 2012, no 90, 31 p.
http://hal. inria. fr/ hal-00735995
Articles in National Peer-Reviewed Journals
-
21Y. Deswarte, S. Gambs.
Cyber-attaques et cyber-défenses: problématique et évolution, in: La Revue de l'Electricité et de l'Electronique, May 2012, no 2, p. 23-35.
http://hal. inria. fr/ hal-00736950 -
22M. Jaume, V. Viet Triem Tong, G. Hiet.
Spécification et mécanisme de détection de flots d'information illégaux, in: Technique et Science Informatiques (TSI), 2012, vol. 31, no 6, p. 713-742. [ DOI : 10.3166/tsi.31.713-742 ]
http://hal. inria. fr/ hal-00761351 -
23I. Moise, M. Hurfin, J.-P. Le Narzul, F. Majorczyk.
Évaluation de politiques d'adaptation au risque de collisions dans un consensus de type " Fast Paxos ", in: Technique et Science Informatiques (TSI), December 2012, vol. 31, no 8-9-10, p. 1301-1325. [ DOI : 10.3166/TSI.31.1301-1325 ]
http://hal. inria. fr/ hal-00765487
Invited Conferences
-
24G. Piolle.
Protection de la vie privée : appréhension de concepts éthiques par un agent autonome, in: Atelier D2A2 "Agents Autonomes et Éthique" à RFIA 2012, Lyon, France, January 2012.
http://hal. inria. fr/ hal-00682660
International Conferences with Proceedings
-
25M. Alaggan, S. Gambs, A.-M. Kermarrec.
BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom Filters, in: 14th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2012), Toronto, Canada, October 2012.
http://hal. inria. fr/ hal-00724829 -
26E. Anceaume, Y. Busnel.
An Information Divergence Estimation over Data Streams, in: 11th IEEE International Symposium on Network Computing and Applications (IEEE NCA12), Cambridge, MA, United States, C. Elks (editor), IEEE, August 2012, vol. 11, Number 72 p, 11 pages.
http://hal. inria. fr/ hal-00725097 -
27E. Anceaume, Y. Busnel, S. Gambs.
AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence, in: Ninth European Dependable Computing Conference (EDCC 2012), Sibiu, Romania, LNCS, Springer-Verlag, May 2012, 12 p.
http://hal. inria. fr/ hal-00677077 -
28E. Anceaume, Y. Busnel, S. Gambs.
AnKLe: détection automatique d'attaques par divergence d'information, in: 14èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications (AlgoTel), La Grande Motte, France, F. Mathieu, N. Hanusse (editors), 2012, p. 1-4, 4 pages.
http://hal. inria. fr/ hal-00688352 -
29E. Anceaume, R. Ludinard, B. Sericola, E. Le Merrer, G. Straub.
FixMe: A Self-organizing Isolated Anomaly Detection Architecture for Large Scale Distributed Systems, in: Proceedings of the 16th International Conference On Principles Of Distributed Systems (OPODIS), Rome, Italy, December 2012, 12 p.
http://hal. inria. fr/ hal-00736922 -
30R. Andriatsimandefitra, S. Geller, V. Viet Triem Tong.
Designing information flow policies for Android's operating system, in: IEEE ICC 2012, Ottawa, Canada, June 2012, p. 976-981.
http://hal. inria. fr/ hal-00736034 -
31C. Artigues, Y. Deswarte, J. Guiochet, M.-J. Huguet, M.-O. Killijian, D. Powell, M. Roy, C. Bidan, N. Prigent, E. Anceaume, S. Gambs, G. Guette, M. Hurfin, F. Schettini.
AMORES: an architecture for mobiquitous resilient systems, in: ARMOR'12, Sibiu, Romania, April 2012, no 7, 7 p, ISBN: 978-1-4503-1150-2. [ DOI : 10.1145/2222436.2222443 ]
http://hal. inria. fr/ hal-00736020 -
32G. Bossert, F. Guihéry, G. Hiet.
Netzob : un outil pour la rétro-conception de protocoles de communication, in: SSTIC 2012, Rennes, France, June 2012, 43 p.
http://hal. inria. fr/ hal-00763751 -
33S. Gambs, A. Gmati, M. Hurfin.
Reconstruction attack through classifier analysis, in: DBSEC - 26th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy - 2012, Paris, France, Springer, July 2012, vol. 7371, p. 274-281.
http://hal. inria. fr/ hal-00736945 -
34S. Gambs, M.-O. Killijian, M. Nunez Del Prado Cortez.
Next place prediction using mobility Markov chains, in: MPM - EuroSys 2012 Workshop on Measurement, Privacy, and Mobility - 2012, Bern, Switzerland, April 2012.
http://hal. inria. fr/ hal-00736947 -
35S. Gambs, M.-O. Killijian, M. Roy, M. Traoré.
Locanyms: Towards Privacy-Preserving Location-Based Services, in: 1st European Workshop on AppRoaches to MObiquiTous Resilience, Sibiu, Romania, May 2012, 6 p.
http://hal. inria. fr/ hal-00699742 -
36S. Gambs, J. Lolive.
SlopPy: Slope One with Privacy, in: DPM - 7th DPM International Workshop on Data Privacy Management - 2012, Pisa, Italy, September 2012.
http://hal. inria. fr/ hal-00736949 -
37S. Gambs, G. Rachid, H. Hamza, F. Huc, A.-M. Kermarrec.
Scalable and Secure Polling in Dynamic Distributed Networks, in: 31st International Symposium on Reliable Distributed Systems (SRDS), Irvine, California, United States, October 2012.
http://hal. inria. fr/ hal-00723566 -
38C. Hauser, F. Tronel, J. Reid, C. Fidge.
A taint marking approach to confidentiality violation detection, in: AISC 2012, Melbourne, Australia, CRPIT, Pieprzyk, Josef & Thomborson, Clark (Eds.), February 2012, vol. 125, p. 83-90.
http://hal. inria. fr/ hal-00736045 -
39M. Hurfin, I. E. Moise, J.-P. Le Narzul, F. Majorczyk.
Adaptive Strategies for Speeding Up Sequences of Consensus, in: 26th International Conference on Advanced Information Networking and Applications, Fukuoka, Japan, 2012, p. 435-442.
http://hal. inria. fr/ hal-00725049 -
40C. Li, M. Hurfin, Y. Wang.
Brief Announcement: Reaching Approximate Byzantine Consensus in Partially-Connected Mobile Networks, in: DISC - 26th International Symposium on Distributed Computing, Salvador, Brazil, M. K. Aguilera (editor), LNCS, Springer, October 2012, vol. 7611, p. 405-406. [ DOI : 10.1007/978-3-642-33651-5 ]
http://hal. inria. fr/ hal-00745112 -
41R. Ludinard, E. Totel, F. Tronel, V. Nicomette, M. Kaaniche, E. Alata, R. Akrout, Y. Bachy.
Detecting Attacks against Data in Web Applications, in: CRiSIS 2012, Cork, Ireland, October 2012.
http://hal. inria. fr/ hal-00735997 -
42L. Zeghache, N. Badache, M. Hurfin, I. Moise.
Providing Reliability for transactional mobile agents, in: 5th International Conference on Advanced Infocomm Technology, Paris, France, V. Guyot (editor), Springer, July 2012.
http://hal. inria. fr/ hal-00763197
National Conferences with Proceeding
-
43T. Demongeot, E. Totel, V. Viet Triem Tong.
User Defined Control Flow Policy for Web Service Orchestration, in: C&ESAR 2012, Rennes, France, November 2012.
http://hal. inria. fr/ hal-00761354
Conferences without Proceedings
-
44S. Gambs, A. Gmati, M. Hurfin.
Reconstruction Attack through Classifier Analysis, in: APVP'12 - 3ième édition Atelier Protection de la Vie Privée, Ile de Groix, France, June 2012.
http://hal. inria. fr/ hal-00747531 -
45S. Gambs, M.-O. Killijian, M. Nunez Del Prado Cortez.
De-anonymization attack on geolocated datasets, in: Atelier Protection de la Vie Privée (APVP 2012), 3ième édition, Ile de Groix, France, June 2012.
http://hal. inria. fr/ hal-00765525 -
46S. Gambs, M.-O. Killijian, M. Roy, M. Traoré.
Locanyms: Towards privacy-preserving location-based services, in: Atelier Protection de la Vie Privée (APVP 2012), 3ième édition, Ile de Groix, France, June 2012.
http://hal. inria. fr/ hal-00765530 -
47S. Gambs, J. Lolive.
SlopPy: Slope One with privacy, in: Atelier Protection de la Vie Privée (APVP 2012), 3ième édition, Ile de Groix, France, June 2012.
http://hal. inria. fr/ hal-00765519 -
48P. Lajoie Mazenc.
Système de réputation préservant la vie privée, in: 3ième édition Atelier Protection de la vie privée, Groix, France, November 2012.
http://hal. inria. fr/ hal-00763377 -
49R. Paiva Melo Marin, G. Piolle, C. Bidan.
Privacy Policy Requirements for Distributed Social Network Systems, in: APVP'12, Groix, France, June 2012.
http://hal. inria. fr/ hal-00736023
Scientific Books (or Scientific Book chapters)
-
50Y. Deswarte, S. Gambs.
The challenges raised by the privacy-preserving identity card, in: Cryptography and Security: From Theory to Applications, D. Naccache (editor), Lecture Notes in Computer Science, Springer, 2012, vol. 6805, p. 383-404. [ DOI : 10.1007/978-3-642-28368-0 ]
http://hal. inria. fr/ hal-00736944
Internal Reports
-
51E. Anceaume, Y. Busnel.
Sketch -metric: Comparing Data Streams via Sketching, IRISA, December 2012, no 2001.
http://hal. inria. fr/ hal-00764772 -
52E. Anceaume, G. Guette, P. Lajoie Mazenc, N. Prigent, V. Viet Triem Tong.
A Privacy Preserving Distributed Reputation Mechanism, IRISA, October 2012, no 2000.
http://hal. inria. fr/ hal-00763212 -
53C. Li, M. Hurfin, Y. Wang.
Reaching Approximate Byzantine Consensus in Partially-Connected Mobile Networks, Inria, May 2012, no RR-7985, 17 p.
http://hal. inria. fr/ hal-00703111
-
54Jonathan Christopher. Demay, F. Majorczyk, E. Totel, F. Tronel.
Detecting illegal system calls using a data-oriented detection model, in: In Proc. of the 26th IFIP TC 11 International Information Security Conference - Future Challenges in Security and Privacy for Academia and Industry (SEC2011), Lucerne, Switzerland, Jun 2011. -
55G. Hiet, V. Viet Triem Tong, L. Mé, B. Morin.
Policy-Based Intrusion Detection in Web Applications by Monitoring Java Information Flows, in: 3nd International Conference on Risks and Security of Internet and Systems (CRiSIS 2008), 2008. -
56A. Myers, F. Schneider, K. Birman.
Nsf project security and fault tolerance, nsf cybertrust grant 0430161, 2004.
http://www. cs. cornell. edu/ Projects/ secft/ -
57G. Piolle, Y. Demazeau.
Obligations with deadlines and maintained interdictions in privacy regulation frameworks, in: Proc. of the 8th IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT'08), Sidney, Australia, December 2008, p. 162–168. -
58O. Sarrouy, E. Totel, B. Jouga.
Building an application data behavior model for intrusion detection, in: Proc. of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Montreal Canada, 07 2009, p. 299–306. -
59J. Zimmermann, L. Mé, C. Bidan.
An improved reference flow control model for policy-based intrusion detection, in: Proc. of the 8th European Symposium on Research in Computer Security (ESORICS), October 2003.