Schéma d'autorisation pour les applications réparties sur Internet, Thèse de l'Institut National Polytechnique, 2004. ,
Etat des lieux sectoriel, conceptuel et terminologie en sécurité pour les systèmes d'information et de communications en santé et social, 2002. ,
Computer Security Threat Monitoring and Surveillance, 1980. ,
Fault Tolerance : Principles and Practice, 1981. ,
Fault Tolerance, the Survival Attribute of Digital SystemsSecure Computer Systems: Unified Exposition and Multics Interpretation The MITRE Corporation, Proceedings of the IEEE, pp.299775-306, 1976. ,
Integrity Consideration for Secure Computer Systems, 1977. ,
Intrusion-Tolerant Security Servers for Delta-4, ESPRIT Conference 90, 1990. ,
DOI : 10.1007/978-94-009-0705-8_25
The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, 1989. ,
DOI : 10.1109/SECPRI.1989.36295
Random oracles in Constantinople : Practical asynchronous Byzantine agreement using cryptography, Proc. of the 19th ACM Symposium on Principles of Distributed Computing, 2000. ,
Active replication in Delta-4, [1992] Digest of Papers. FTCS-22: The Twenty-Second International Symposium on Fault-Tolerant Computing, pp.28-37, 1992. ,
DOI : 10.1109/FTCS.1992.243618
The Design of GrIDS. A Graph-Based Intrusion Detection SystemA Comparison of Commercial and Military Computer Security Policies, Proc. Int. Symp. on Security and Privacy, 1987. ,
Buffer overflows: Attacks and defenses for the vulnerability of the decade, DARPA Information Survivability Conference and Exposition. Janvier, 2000. ,
Towards a formalization of availability and denialof service, Information Systems Technology Panel Symposium on Protecting Nato Information Systems in the 21st Century, 1999. ,
Vers une Evaluation Quantitative de la Sécurité Informatique, Thèse de l'Institut National Polytechnique de Toulouse, 1994. ,
Implementing Secure Dependencies over a Network by Designing a Distributed Security SubSystem Refrence audit information generation for intrusion detection systems, Third European Symposium on Research in Computer Security, Brington Proc. IFIPSec 98, 1994. ,
An intrusion-detection model, IEEE Symposium on Security and Privacy, 1986. ,
Intrusion tolerance in distributed computing systems, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991. ,
DOI : 10.1109/RISP.1991.130780
Diversity against accidental and deliberate faults Computer Security, Dependability, & Assurance: from needs to solutions, IEEE Computer Society, 1999. ,
An Intrusion- Tolerant Authorization Scheme for Internet Applications, Internationnal Conference on Dependable Systems &Networks (DSN'2002). Workshop on Intrusion Tolerant Systems, pp.1-1, 2002. ,
La sécurité des systèmes d'information et de communication, Sécurité des réseaux et des systèmes répartis Traité IC2, pp.2-7462, 2003. ,
Remote Integrity Checking, Working Conference on Integrity and Internal Control in Information Systems (IICIS'2003), 2003. ,
DOI : 10.1007/1-4020-7901-X_1
An Object-Oriented view of fragmented data processing for fault and intrusion tolerance in distributed systems, Proc. European Symposium in Computer Security (ESORICS'92), pp.193-208, 1992. ,
DOI : 10.1007/BFb0013899
Impossibility of Distributed Consensus with one Faulty Process, Journal of the ACM, 1985. ,
A Fault and Intrusion-Tolerant File System Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering, 3rd International Congress on Computer Security Proc. IEEE. Symposium on Security and Privacy, 1985. ,
Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976. ,
DOI : 10.1145/360303.360333
A Linear time algorithm for deciding security, 17th Annual Symposium on Foundations of Computer Science (sfcs 1976), 1976. ,
DOI : 10.1109/SFCS.1976.1
The design and implementation of tripwire, Proceedings of the 2nd ACM Conference on Computer and communications security , CCS '94, 1993. ,
DOI : 10.1145/191177.191183
Error Recoverable and Securable Data Communication for Computer Networks, Proc. of the 12th Symposium on Fault-Tolerant Computing (FTCS-12), pp.183-186, 1982. ,
Password authentication with insecure communication, Communications of the ACM, vol.24, issue.11, pp.770-772, 1981. ,
DOI : 10.1145/358790.358797
Protection, Proceedings of the 5th Annual Princeton Conference on Information Sciences and Systems, 1971. ,
DOI : 10.1145/775265.775268
A Taxonomy of Computer Program Security Flaws, with Examples, ACM Computing Surveys, 1994. ,
S??ret?? de fonctionnement des syst??mes : concepts de base et terminologie, Revue de l'Electricit?? et de l'Electronique, vol.-, issue.10, 2004. ,
DOI : 10.3845/ree.2004.109
Guide de la Sûreté de FonctionnementCombining monitors for run-time system verification, Electronic Notes in Theoretical Computer Science, p.2, 2002. ,
The Design of an Adaptative Intrusion Tolerant Database Server, IEEE workshop on Intrusion Tolerant Systems, 2002. ,
Complete Specification of APIs and Protocols for the MAFTIA Middleware, Conceptual Model and Architectureof MAFTIA, 2002. ,
Architectural Analysis of MAFTIA's Intrusion Tolerance CapabilitiesLa détection d'intrusion : les outils doivent coopérer, Z. Marrakchi, C. Michel, H. Debar et F. Cuppens, 2001. ,
A resource allocation model for denial of service, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992. ,
DOI : 10.1109/RISP.1992.213265
Experience with EMERALD to Date, First USENIX Workshop on Intrusion Detection and Network Monitoring, 1999. ,
Design rules based on analyses of human error, Communications of the ACM, vol.26, issue.4, pp.254-258, 1983. ,
DOI : 10.1145/2163.358092
Restating the foundation of information security, Proceedings of the Eighth International Conference on Information Security, 1992. ,
DOI : 10.1016/0960-2593(91)90013-Y
High-Profile Thefts Show Insiders Do the Most Damage Gartner Inc. http://www.waveset.com/Features Efficient Dispersal of Information for Security, Load Balancing and Fault Tolerance, Journal of the ACM, vol.36, issue.2, pp.335-348, 1989. ,
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
Majority Algorithm Solution An intrusion tolerant architecture for dynamic content internet servers, ACM Workshop on Survivable and Self-Regenerative Systems, 2003. ,
The typed access matrix model, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992. ,
DOI : 10.1109/RISP.1992.213266
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.30.3867
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
Politique d'intégrité multiniveau pour la protection en ligne de tâches critiques, Thèse de l'Institut National Polytechnique, Rapport LAAS N°98533, 1998. ,
Towards Trustworthy Security for Healthcare InformationSystems, 2000. ,
Adaptive, Model-Based Monitoring for Cyber Attack Detection, Recent Advances in Intrusion Detection, 1907. ,
DOI : 10.1007/3-540-39945-3_6
An Adaptative Intrusion-Tolerant Server Architecture, Proc. 10th International Workshop on Security Protocols, 2002. ,
A Scalable Intrusion Tolerance Achitecture for Distributed Server, IEEE 2nd SMC Information Assurance Workshop, 2001. ,