Alban Gabillon

Orcid: 0000-0003-2220-0305

Affiliations:
  • Université de la Polynésie Française


According to our database1, Alban Gabillon authored at least 71 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The MauMe network - A LoRa multi-hop collaborative protocol and low-cost implementation example.
Comput. Stand. Interfaces, August, 2023

Appraisal of Paradise: A Sentiment Analysis Dataset of French Tourists' Experiences in French Polynesia.
Proceedings of the Leveraging Generative Intelligence in Digital Libraries: Towards Human-Machine Collaboration, 2023

2022
Linguistic Steganography for Messaging Applications.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

2021
A Comprehensive Review on Non-Neural Networks Collaborative Filtering Recommendation Systems.
CoRR, 2021

A Possible Artificial Intelligence Ecosystem Avatar: the Moorea case (IDEA).
CoRR, 2021

2020
Access Controls for IoT Networks.
SN Comput. Sci., 2020

A kernel machine for hidden object-ranking problems (HORPs).
Multim. Tools Appl., 2020

2019
Enforcing Access Controls in IoT Networks.
Proceedings of the Future Data and Security Engineering - 6th International Conference, 2019

2018
A Machine Learning Algorithm for Solving Hidden Object-Ranking Problems.
Proceedings of the Recent Trends in Image Processing and Pattern Recognition, 2018

Regulating IoT Messages.
Proceedings of the Information Security Practice and Experience, 2018

Ordinal Learning with Vector Space Based Binary Predicates and Its Application to Tahitian Pearls' Luster Automatic Assessment.
Proceedings of the Image and Signal Processing - 8th International Conference, 2018

A Security Model for IoT Networks.
Proceedings of the Future Data and Security Engineering - 5th International Conference, 2018

2017
A comprehensive view on quantity based aggregation for cadastral databases.
J. Inf. Secur. Appl., 2017

Computer vision based nacre thickness measurement of Tahitian pearls.
Proceedings of the Thirteenth International Conference on Quality Control by Artificial Vision, 2017

Chromatic Indices in the Normalized rgb Color Space.
Proceedings of the 2017 International Conference on Digital Image Computing: Techniques and Applications, 2017

Tahitian Pearls' Luster Assessment Automation.
Proceedings of the 2017 IEEE Applied Imagery Pattern Recognition Workshop, 2017

2016
A Quantity Based Aggregation Control Model for Graph Databases.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

2015
Automatic Nacre Thickness Measurement of Tahitian Pearls.
Proceedings of the Image Analysis and Recognition - 12th International Conference, 2015

2014
Implementing Quantity Based Aggregation Control for Cadastral Databases.
Proceedings of the 2014 IEEE World Congress on Services, 2014

Automatic Classification of Tahitian Pearls.
Proceedings of the Image Processing and Communications Challenges 6, 2014

Hue and Saturation in the RGB Color Space.
Proceedings of the Image and Signal Processing - 6th International Conference, 2014

Quantity based aggregation for cadastral databases.
Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis, 2014

2013
A Flexible Image-Based Access Control Model for Social Networks.
Proceedings of the Security and Privacy Preserving in Social Networks, 2013

Toward a Normalized XML Schema for the GGP Data Archives.
Data Sci. J., 2013

Information Security Risk Management in a World of Services.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Collusion Resistant Inference Control for Cadastral Databases.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

2012
Enforcing Protection Mechanisms for Geographic Data.
Proceedings of the Web and Wireless Geographical Information Systems, 2012

A Fine-Grained Image Access Control Model.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

2011
Web Access Control Strategies.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

A Privacy Model for Social Networks.
Proceedings of the WOSIS 2011, 2011

The Image Protector - A Flexible Security Rule Specification Toolkit .
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

2010
A View Based Access Control Model for SPARQL.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Security mechanisms for geographic data.
Proceedings of the MEDES '10: International ACM Conference on Management of Emergent Digital EcoSystems, 2010

Rule-based policy enforcement point for map services.
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2010

2009
On Key Distribution in MANETs.
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009

Multisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key Model.
Proceedings of the Pairing-Based Cryptography, 2009

Security policies for the visualization of Geo Data.
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS, 2009

Dynamic Security Rules for Geo Data.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

2008
A general approach to securely querying XML.
Comput. Stand. Interfaces, 2008

Signtiming scheme based on aggregate signature.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper).
Proceedings of the Information Systems Security, 4th International Conference, 2008

DRM policies for web map service.
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008

2007
Etude des systèmes d'horodatage.
Tech. Sci. Informatiques, 2007

Introduction Selection of articles from the SAR-SSI 2006.
Ann. des Télécommunications, 2007

Securely Updating XML.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

2006
Availability of ARINC 629 Avionic Data Bus.
J. Networks, 2006

A New Persistent Labelling Scheme for XML.
J. Digit. Inf. Manag., 2006

A logical formalization of secure XML database.
Comput. Syst. Sci. Eng., 2006

Secure time-stamping schemes: a distributed point of view.
Ann. des Télécommunications, 2006

Directions and trends of XML and web service security.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

A New Digital Notary System.
Proceedings of the Advanced Internet Based Systems and Applications, 2006

A New Timestamping Scheme Based on Skip Lists.
Proceedings of the Computational Science and Its Applications, 2006

Availability Constraints for Avionic Data Buses.
Proceedings of the The First International Conference on Availability, 2006

2005
CHRONOS: an authenticated dictionary based on skip lists for timestamping systems.
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005

A persistent labelling scheme for XML and tree databases.
Proceedings of the 1st International Conference on Signal-Image Technology and Internet-Based Systems, 2005

A Formal Access Control Model for XML Databases.
Proceedings of the Secure Data Management, 2005

Multilevel Databases.
Proceedings of the Encyclopedia of Database Technologies and Applications, 2005

2004
An authorization model for XML databases.
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004

2002
An Access Control Model for Tree Data Structures.
Proceedings of the Information Security, 5th International Conference, 2002

2001
Cover story management.
Data Knowl. Eng., 2001

A Two-level Time-Stamping System.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Regulating Access to XML documents.
Proceedings of the Database and Application Security XV, 2001

Contrôles d'accès pour documents XML.
Proceedings of the 17èmes Journées Bases de Données Avancées, 2001

1999
Logical Foundations of Multilevel Databases.
Data Knowl. Eng., 1999

1998
Rules for Designing Multilevel Object-Oriented Databases.
Proceedings of the Computer Security, 1998

1996
A Logical Approach to Model a Multilevel Object-Oriented Database.
Proceedings of the Database Security Volume X, 1996

Formalisation de la Confidentialité dans une Base de Données à Objets.
Proceedings of the 12èmes Journées Bases de Données Avancées, 1996

1995
Modelling a Multilevel Database with Temporal Downgrading Functionalities.
Proceedings of the Database Security IX: Status and Prospects, 1995

1994
Decomposition of Multilevel Objects in an Object-Oriented Database.
Proceedings of the Computer Security, 1994

1993
Multilevel Security in Object-Oriented Databases.
Proceedings of the Security for Object-Oriented Systems, 1993

MultiView model for object-oriented database.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993


  Loading...