Guillaume Piolle

According to our database1, Guillaume Piolle authored at least 21 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
URSID: Using formalism to Refine attack Scenarios for vulnerable Infrastructure Deployment.
CoRR, 2023

URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

2022
Hidden Issuer Anonymous Credential.
Proc. Priv. Enhancing Technol., 2022

2020
Norms and Deontic Logic.
Proceedings of the A Guided Tour of Artificial Intelligence Research: Volume I: Knowledge Representation, 2020

2017
Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory.
Proceedings of the Software Engineering and Formal Methods - 15th International Conference, 2017

Connectivity graph reconstruction for networking cloud infrastructures.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux.
Proceedings of the 5th IEEE/ACM International FME Workshop on Formal Methods in Software Engineering, 2017

Connectivity extraction in cloud infrastructures.
Proceedings of the 13th International Conference on Network and Service Management, 2017

2013
An Analysis Grid for Privacy-Related Properties of Social Network Systems.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

2011
Representing privacy regulations with deontico-temporal operators.
Web Intell. Agent Syst., 2011

Delegation of Obligations and Responsibility.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

From SSIR to CIDre: A New Security Research Group in Rennes, France.
Proceedings of the First SysSec Workshop 2011, 2011

2010
Une architecture pour la protection étendue des données personnelles.
Rev. d'Intelligence Artif., 2010

Déléguer la protection des données personnelles à des agents cognitifs.
Rev. d'Intelligence Artif., 2010

A Dyadic Operator for the Gradation of Desirability.
Proceedings of the Deontic Logic in Computer Science, 10th International Conference, 2010

2009
Agents utilisateurs pour la protection des données personnelles : modélisation logique et outils informatiques. (User agents for personal data protection: logical modelling and computing tools).
PhD thesis, 2009

Délégation d'agents pour la protection étendue des données personnelles.
Proceedings of the Systèmes Multi-Agents, Génie logiciel multi-agents - JFSMA 09, 2009

2008
Obligations with Deadlines and Maintained Interdictions in Privacy Regulation Frameworks.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2008

Addressing Temporal Aspects of Privacy-Related Norms.
Proceedings of the ECAI 2008, 2008

2006
From Theory to Practice: Forgiveness as a Mechanism to Repair Conflicts in CMC.
Proceedings of the Trust Management, 4th International Conference, 2006

Privacy Management in User-Centred Multi-agent Systems.
Proceedings of the Engineering Societies in the Agents World VII, 2006


  Loading...