Mathieu Jaume

Orcid: 0000-0002-5714-3251

According to our database1, Mathieu Jaume authored at least 24 papers between 1997 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
PWNJUTSU: A Dataset and a Semantics-Driven Approach to Retrace Attack Campaigns.
IEEE Trans. Netw. Serv. Manag., December, 2022


2021
From TTP to IoC: Advanced Persistent Graphs for Threat Hunting.
IEEE Trans. Netw. Serv. Manag., 2021

2017
Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory.
Proceedings of the Software Engineering and Formal Methods - 15th International Conference, 2017

Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux.
Proceedings of the 5th IEEE/ACM International FME Workshop on Formal Methods in Software Engineering, 2017

2014
Teaching Formal Methods and Discrete Mathematics.
Proceedings of the Proceedings 1st Workshop on Formal Integrated Development Environment, 2014

2013
Secure States versus Secure Executions - From Access Control to Flow Control.
Proceedings of the Information Systems Security - 9th International Conference, 2013

2012
Spécification et mécanisme de détection de flots d'information illégaux.
Tech. Sci. Informatiques, 2012

Semantic Comparison of Security Policies: From Access Control Policies to Flow Properties.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

Development of secured systems by mixing programs, specifications and proofs in an object-oriented programming environment: a case study within the FoCaLiZe environment.
Proceedings of the 2012 Workshop on Programming Languages and Analysis for Security, 2012

2011
Flow Based Interpretation of Access Control: Detection of Illegal Information Flows.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Formal Specification and Validation of Security Policies.
Proceedings of the Foundations and Practice of Security, 2011

2010
Security Rules <i>versus</i> Security Properties.
Proceedings of the Information Systems Security - 6th International Conference, 2010

2008
Un cadre sémantique pour le contrôle d'accès.
Tech. Sci. Informatiques, 2008

A Formal Comparison of the Bell & LaPadula and RBAC Models.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2005
Coq, un outil pour l'enseignement. Une expérience avec les étudiants du DESS Développement de logiciels srs.
Tech. Sci. Informatiques, 2005

Formalisation and implementation of Access control models.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

2003
Réutilisation de preuves formelles : une étude pour le système FoC.
Proceedings of the Journées francophones des langages applicatifs (JFLA'03), 2003

2002
On Greatest Fixpoint Semantics of Logic Programming.
J. Log. Comput., 2002

2000
Preuves infinies en Programmation logique.
Proceedings of the Programmation en logique avec contraintes, 2000

Logic Programming and Co-inductive Definitions.
Proceedings of the Computer Science Logic, 2000

1999
Contributions à la sémantique de la programmation logique.
PhD thesis, 1999

A Full Formalization of SLD-Resolution in the Calculus of Inductive Constructions.
J. Autom. Reason., 1999

1997
Formalisation de la SLD-résolution dans le calcul des constructions inductives.
Proceedings of the JFPLC'97, 1997


  Loading...