Secure, resilient computing clusters: Selfcleansing intrusion tolerance with hardware enforced security (scit/hes), The Second International Conference on Availability, Reliability and Security (ARES'07), pp.343-350, 2007. ,
On the impact of malware on internet voting, 1st Luxembourg Day on security and reliability, 2009. ,
URL : https://hal.archives-ouvertes.fr/inria-00425584
Design of a secure shield for internet and web-based services using software reflection, In Web Services -ICWS, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-02017535
Exploiting the client vulnerabilities in internet e-voting systems: Hacking helios 2.0 as an example, Proceedings of the 2010 International Conference on Electronic Voting Technology/Workshop on Trustworthy Elections, pp.1-9, 2010. ,
Intrusion tolerant approach for denial of service attacks to web services, Proceedings of the 2011 First International Conference on Data Compression, Communications and Processing, CCP '11, pp.285-292, 2011. ,
A middleware for reflective web service choreographies on the cloud, Proceedings of the 13th Workshop on Adaptive and Reflective Middleware, ARM '14, vol.9, pp.1-9, 2014. ,
Symbolic bisimulations, Theor. Comput. Sci, vol.138, issue.2, pp.353-389, 1995. ,
Security modeling and quantification of intrusion tolerant systems using attack-response graph, Journal of High Speed Networks, vol.13, issue.4, pp.297-308, 2004. ,
Une Approche Symbolique pour la Vérification et le Test des Chorégraphies de Services, 2013. ,
Intrusion tolerance via network layer controls, Proceedings DARPA Information Survivability Conference and Exposition, vol.1, pp.90-96, 2003. ,
A java implementation of a component model with explicit symbolic protocols, Software Composition, 2005. ,
URL : https://hal.archives-ouvertes.fr/hal-00342152
Towards the Theoretical Foundation of Choreography, Proc. of WWW'07, 2007. ,
A new architecture for intrusion-tolerant web services based on design diversity techniques, Journal of Information Systems and Telecommunication, 2015. ,
The forever service for fault/intrusion removal, Proceedings of the 2Nd Workshop on Recent Advances on Intrusiton-tolerant Systems, WRAITS '08, vol.5, pp.1-5, 2008. ,
Resilient intrusion tolerance through proactive and reactive recovery, 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007), pp.373-380, 2007. ,
An architecture for an adaptive intrusion-tolerant server, Security Protocols, 10th International Workshop, pp.158-178, 2002. ,
An architecture for an adaptive intrusion-tolerant server, Security Protocols, pp.158-178, 2004. ,
Intrusion-tolerant middleware: the road to automatic security, IEEE Security Privacy, vol.4, issue.4, pp.54-62, 2006. ,
Analysis of techniques for building intrusion tolerant server systems, IEEE Military Communications Conference (MILCOM), vol.2, pp.729-734, 2003. ,