Laurent Bussard

According to our database1, Laurent Bussard authored at least 21 papers between 2002 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Secondary Use Regulations.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Abstract Privacy Policy Framework: Addressing Privacy Problems in SOA.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2011

Privacy for Service Oriented Architectures.
Proceedings of the Privacy and Identity Management for Life, 2011

Matching Privacy Policies and Preferences: Access Control, Obligations, Authorisations, and Downstream Usage.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
Downstream Usage Control.
Proceedings of the POLICY 2010, 2010

A Practical Generic Privacy Language.
Proceedings of the Information Systems Security - 6th International Conference, 2010

2009
Obligation Language and Framework to Enable Privacy-Aware SOA.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

2008
An Approach to Identity Management for Service Centric Systems.
Proceedings of the Towards a Service-Based Internet, 2008

2006
An Infrastructure for Gaining Trust in Context Information.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Context-Aware Access Control; Making Access Control Decisions Based on Context Information.
Proceedings of the 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, 2006

2005
Distance-Bounding Proof of Knowledge to Avoid Real-Time Attacks.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

2004
Secure mobile business applications - framework, architecture and implementation.
Inf. Secur. Tech. Rep., 2004

Establishing Trust with Privacy.
Proceedings of the Security Protocols, 2004

Establishing Trust with Privacy (Transcript of Discussion).
Proceedings of the Security Protocols, 2004

Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension.
Proceedings of the 2004 Symposium on Applications and the Internet Workshops (SAINT 2004 Workshops), 2004

Untraceable Secret Credentials: Trust Establishment with Privacy.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

One-Time Capabilities for Authorizations without Trust.
Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), 2004

History-Based Signature or How to Trust Anonymous Documents.
Proceedings of the Trust Management, Second International Conference, 2004

2003
Embedding Distance-Bounding Protocols within Intuitive Interactions.
Proceedings of the Security in Pervasive Computing, 2003

Trust and Authorization in Pervasive B2E Scenarios.
Proceedings of the Information Security, 6th International Conference, 2003

2002
Extending Tamper-Proof Hardware Security to Untrusted Execution Environments.
Proceedings of the Fifth Smart Card Research and Advanced Application Conference, 2002


  Loading...