Romain Laborde
Orcid: 0000-0002-0943-6180
According to our database1,
Romain Laborde
authored at least 86 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Implementing the principle of least administrative privilege on operating systems: challenges and perspectives.
Ann. des Télécommunications, December, 2024
A Model for Assessing the Adherence of E-Identity Solutions to Self-Sovereign Identity.
Proceedings of the Good Practices and New Perspectives in Information Systems and Technologies, 2024
Article 45 of the eIDAS Directive Unveils the need to implement the X.509 4-cornered trust model for the WebPKI.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Enhancing Secure Deployment with Ansible: A Focus on Least Privilege and Automation for Linux.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the General Aspects of Applying Generative AI in Higher Education: Opportunities and Challenges, 2024
Proceedings of the General Aspects of Applying Generative AI in Higher Education: Opportunities and Challenges, 2024
2023
How to Design and Deliver Courses for Higher Education in the AI Era: Insights from Exam Data Analysis.
CoRR, 2023
Proceedings of the Ubiquitous Security, 2023
Towards Reliable Collaborative Data Processing Ecosystems: Survey on Data Quality Criteria.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Enhancing the ACME Protocol to Automate the Management of All X.509 Web Certificates.
Proceedings of the ICT Systems Security and Privacy Protection, 2023
The Interplay Between Policy and Technology in Metaverses: Towards Seamless Avatar Interoperability Using Self-Sovereign Identity.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
An Adaptive, Situation-Based Risk Assessment and Security Enforcement Framework for the Maritime Sector.
Sensors, 2022
Proceedings of the Emerging Information Security and Applications, 2022
2021
A Methodological Approach to Evaluate Security Requirements Engineering Methodologies: Application to the IREHDO2 Project Context.
J. Cybersecur. Priv., July, 2021
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators.
Proceedings of the ICT Systems Security and Privacy Protection, 2021
2020
Proceedings of the 4th Cyber Security in Networking Conference, 2020
A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020
2019
IEEE Commun. Stand. Mag., 2019
Ann. des Télécommunications, 2019
Logic-based methodology to help security architects in eliciting high-level network security requirements.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Dynamic security management driven by situations: An exploratory analysis of logs for the identification of security situations.
Proceedings of the 3rd Cyber Security in Networking Conference, 2019
2018
Applying a requirement engineering based approach to evaluate the security requirements engineering methodologies.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
2017
Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker.
Secur. Commun. Networks, 2017
EURASIP J. Inf. Secur., 2017
Proceedings of the 1st Cyber Security in Networking Conference, 2017
Proceedings of the 1st Cyber Security in Networking Conference, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Le projet ANR INCOME, processus et outils logiciels pour des gestionnaires de contexte au dessus de l'Internet des objets.
Proceedings of the 11èmes journées francophones Mobilité et Ubiquité, 2016
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Proceedings of the Risks and Security of Internet and Systems, 2016
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
A Recommender-Based System for Assisting Non-technical Users in Managing Android Permissions.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Proceedings of the International Symposium on Networks, Computers and Communications, 2015
2014
KAPUER : un assistant à l'écriture de politiques d'autorisation pour la protection de la vie privée.
Ingénierie des Systèmes d Inf., 2014
A data flow-oriented specification method for analysing network security configurations.
Int. J. Internet Protoc. Technol., 2014
A survey on addressing privacy together with quality of context for context management in the Internet of Things.
Ann. des Télécommunications, 2014
Specification and Enforcement of Dynamic Authorization Policies Oriented by Situations.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
Proceedings of the Group Decision and Negotiation. A Process-Oriented View, 2014
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014
2013
Authorization Policies: Using Decision Support System for Context-Aware Protection of User's Private Data.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 16th Communications & Networking Symposium, 2013
Proceedings of the Information Assurance and Security Education and Training, 2013
A specification method for analyzing fine grained network security mechanism configurations.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the Ambient Intelligence - Third International Joint Conference, 2012
2011
Secur. Commun. Networks, 2011
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011
2010
Proceedings of the 6th International Conference on Network and Service Management, 2010
2009
Int. J. Web Based Communities, 2009
An Extensible XACML Authorization Web Service: Application to Dynamic Web Sites Access Control.
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009
Proceedings of the Emerging Challenges for Security, 2009
An organizational pattern for contributing to the deployment of secure Virtual Enterprises.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
A trust-based virtual collaborative environment.
J. Digit. Inf. Manag., 2008
Authentication in Virtual Organizations: A Reputation Based PKI Interconnection Model.
Proceedings of the Systems and Virtualization Management. Standards and New Technologies, 2008
An Extension of XACML to Improve the Performance of Decision Making Processes When Dealing with Stable Conditions.
Proceedings of the Systems and Virtualization Management. Standards and New Technologies, 2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008
A best practices-oriented approach for establishing trust chains within Virtual Organisations.
Proceedings of the Workshops Proceedings of the 12th International IEEE Enterprise Distributed Object Computing Conference, 2008
2007
J. Netw. Syst. Manag., 2007
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007
2006
J. High Speed Networks, 2006
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Proceedings of the 4th international workshop on Middleware for grid computing, 2006
2005
Proceedings of the On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, 2005
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005
A Security Management Information Model Derivation Framework: From Goals to Configurations.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005
Access Control Model for Grid Virtual Organizations.
Proceedings of the ICEIS 2005, 2005
Proceedings of the First International Conference on e-Science and Grid Technologies (e-Science 2005), 2005
2004
A Formal Approach for the Evaluation of Network Security Mechanisms Based on RBAC Policies.
Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models, 2004
Proceedings of the Network Control and Engineering for QoS, Security and Mobility, III, 2004
2003
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003
Proceedings of the 3rd Latin American Network Operations and Management Symposium, 2003
2002
A Multi-Domain Security Policy Distribution Architecture for Dynamic IP Based VPN Management.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002