On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems, IFIP, vol.201, pp.329-339, 2006. ,
DOI : 10.1007/0-387-33406-8_28
Information security economics ? and beyond Information Security Summit (IS2), 2009. ,
Analyzing multiple logs for forensic evidence, Digital Investigation, pp.82-91, 2007. ,
DOI : 10.1016/j.diin.2007.06.013
Fundamental concepts of computer system dependability, IARP/IEEE-RAS Workshop on Robot Dependability: Technological Challenge of Dependable Robots in Human Environments, 2001. ,
Abstract appliances and software: The importance of the buyer's warranty and the developer's liability in promoting the use of systematic quality assurance and formal methods ,
Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination, 2008 11th IEEE High Assurance Systems Engineering Symposium, 2008. ,
DOI : 10.1109/HASE.2008.24
Optimal observability for diagnosability, International Workshop on Principles of Diagnosis, 2008. ,
La preuvé electronique, 2009. ,
USING THE EVENT CALCULUS FOR TRACKING THE NORMATIVE STATE OF CONTRACTS, International Journal of Cooperative Information Systems, vol.14, issue.02n03, pp.99-129, 2005. ,
DOI : 10.1142/S0218843005001110
Rigorous development of automated inconsistency checks for digital evidence using the B method, International Journal of Digital Evidence, vol.6, issue.2, pp.1-21, 2007. ,
Compliance checking between business processes and business contracts, 2006 10th IEEE International Enterprise Distributed Object Computing Conference (EDOC'06), pp.221-232, 2006. ,
DOI : 10.1109/EDOC.2006.22
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.2592
Organizational structure and responsibility, Artificial Intelligence and Law, vol.3, issue.3, pp.223-249, 2007. ,
DOI : 10.1007/s10506-007-9054-0
URL : http://dx.doi.org/10.1007/s10506-007-9054-0
Le sens des responsabilitiés enmatì ere de contrats informatiques, 2009. ,
Computer system intrusion detection: a survey, 1999. ,
Flexible Encoding of Mathematics on the Computer, Mathematical Knowledge Management, 3rd Int'l Conf., Proceedings, pp.160-174, 2004. ,
DOI : 10.1007/3-540-36469-2_15
A Formal Privacy Management Framework, Formal Aspects in Security and Trust (FAST), pp.162-176, 2009. ,
DOI : 10.1007/978-3-642-01465-9_11
Les clauses limitatives de responsabilité et de garantie dans les contrats informatiques ,
Software reliability and dependability, Proceedings of the conference on The future of Software engineering , ICSE '00, pp.175-188, 2000. ,
DOI : 10.1145/336512.336551
Challenges in the Specification of Full Contracts, Lecture Notes in Computer Science, vol.12, issue.1, pp.292-306, 2009. ,
DOI : 10.1007/11786849_21
Model-based system monitoring and diagnosis of failures using statecharts and fault trees, Reliability Engineering & System Safety, vol.81, issue.3, pp.325-341, 2003. ,
DOI : 10.1016/S0951-8320(03)00095-4
Security benchmarks of OSGi platforms: toward hardened OSGi. Software -Practice and Experience (SPE), pp.471-499, 2009. ,
Principles-driven forensic analysis, Proceedings of the 2005 workshop on New security paradigms , NSPW '05, pp.85-93, 2005. ,
DOI : 10.1145/1146269.1146291
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.8325
How to write a financial contract, The Fun of Programming, Cornerstones of Computing, 2003. ,
Idd: Integrating diagnosis in the design of automotive systems, ECAI, pp.628-632, 2002. ,
A Formal Language for Electronic Contracts, Lecture Notes in Computer Science, vol.12, issue.3, pp.174-189, 2007. ,
DOI : 10.1111/1467-9337.00106
A Temporal Logic-Based Model for Forensic Investigation in Networked System Security, Computer Network Security, vol.3685, pp.325-338, 2005. ,
DOI : 10.1007/11560326_25
Two views on security software liability. Let the legal system decide, IEEE Security & Privacy Magazine, vol.99, issue.1, pp.70-72, 2003. ,
DOI : 10.1109/MSECP.2003.1176999
Accountability for perfection. Security & Privacy, IEEE, vol.7, issue.2, pp.3-4, 2009. ,
DOI : 10.1109/msp.2009.30
Secure audit logs to support computer forensics, ACM Transactions on Information and System Security, vol.2, issue.2, pp.159-176, 1999. ,
DOI : 10.1145/317087.317089
Preparing evidence for court, Digital Investigation, vol.1, issue.4, pp.279-283, 2004. ,
DOI : 10.1016/j.diin.2004.11.005
Modeling of post-incident root cause analysis, International Journal of Digital Evidence, vol.2, issue.2, 2003. ,
The inference validity problem in legal discovery, 2009 31st International Conference on Software Engineering, Companion Volume, pp.303-306, 2009. ,
DOI : 10.1109/ICSE-COMPANION.2009.5071007
Logic-based diagnosis for distributed systems, Perspectives in Concurrency Theory: A Festschrift for P. S. Thiagarajan, 2009. ,