| 2009 |
31 | | Duc-Phong Le,
Alexis Bonnecaze,
Alban Gabillon:
Multisignatures as Secure as the Diffie-Hellman Problem in the Plain Public-Key Model.
Pairing 2009: 35-51 |
| 2008 |
30 | | Duc-Phong Le,
Alexis Bonnecaze,
Alban Gabillon:
A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper).
ICISS 2008: 116-123 |
29 | | Duc-Phong Le,
Alexis Bonnecaze,
Alban Gabillon:
Signtiming scheme based on aggregate signature.
ISI 2008: 145-149 |
28 | | Alban Gabillon,
Patrick Capolsini:
DRM policies for web map service.
SPRINGL 2008: 20-29 |
27 | | Ernesto Damiani,
Majirus Fansi,
Alban Gabillon,
Stefania Marrara:
A general approach to securely querying XML.
Computer Standards & Interfaces 30(6): 379-389 (2008) |
| 2007 |
26 | | Ernesto Damiani,
Majirus Fansi,
Alban Gabillon,
Stefania Marrara:
Securely Updating XML.
KES (3) 2007: 1098-1106 |
25 | | Ernesto Damiani,
Majirus Fansi,
Alban Gabillon,
Stefania Marrara:
A General Approach to Securely Querying XML.
WOSIS 2007: 115-122 |
24 | | Kaouthar Blibech,
Alban Gabillon,
Alexis Bonnecaze:
Etude des systèmes d'horodatage.
Technique et Science Informatiques 26(3-4): 249-278 (2007) |
| 2006 |
23 | | Ari Juels,
Ernesto Damiani,
Alban Gabillon:
Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006
ACM 2006 |
22 | | Alban Gabillon,
Laurent Gallon:
Availability Constraints for Avionic Data Buses.
ARES 2006: 124-131 |
21 | | Kaouthar Blibech,
Alban Gabillon:
A New Timestamping Scheme Based on Skip Lists.
ICCSA (3) 2006: 395-405 |
20 | | Kaouthar Blibech,
Alban Gabillon:
A New Digital Notary System.
SITIS 2006: 103-114 |
19 | | Ernesto Damiani,
Alban Gabillon,
Anne Anderson,
David Staggs,
Bhavani M. Thuraisingham,
Marianne Winslett:
Directions and trends of XML and web service security.
SWS 2006: 1-2 |
18 | | Alban Gabillon,
Laurent Gallon:
Availability of ARINC 629 Avionic Data Bus.
JNW 1(6): 1-9 (2006) |
| 2005 |
17 | | Alban Gabillon,
Majirus Fansi:
A persistent labelling scheme for XML and tree databases.
SITIS 2005: 110-115 |
16 | | Kaouthar Blibech,
Alban Gabillon:
CHRONOS: an authenticated dictionary based on skip lists for timestamping systems.
SWS 2005: 84-90 |
15 | | Alban Gabillon:
A Formal Access Control Model for XML Databases.
Secure Data Management 2005: 86-103 |
14 | | Alban Gabillon:
Multilevel Databases.
Encyclopedia of Database Technologies and Applications 2005: 386-389 |
| 2004 |
13 | | Alban Gabillon:
An authorization model for XML databases.
SWS 2004: 16-28 |
| 2002 |
12 | | Alban Gabillon,
Manuel Munier,
Jean-Jacques Bascou,
Laurent Gallon,
Emmanuel Bruno:
An Access Control Model for Tree Data Structures.
ISC 2002: 117-135 |
| 2001 |
11 | | Alban Gabillon,
Emmanuel Bruno:
Contrôles d'accès pour documents XML.
BDA 2001 |
10 | | Alban Gabillon,
Emmanuel Bruno:
Regulating Access to XML documents.
DBSec 2001: 299-314 |
9 | | Alban Gabillon,
J. Byun:
A Two-level Time-Stamping System.
SEC 2001: 139-150 |
8 | | Frédéric Cuppens,
Alban Gabillon:
Cover story management.
Data Knowl. Eng. 37(2): 177-201 (2001) |
| 1999 |
7 | | Frédéric Cuppens,
Alban Gabillon:
Logical Foundations of Multilevel Databases.
Data Knowl. Eng. 29(3): 259-291 (1999) |
| 1998 |
6 | | Frédéric Cuppens,
Alban Gabillon:
Rules for Designing Multilevel Object-Oriented Databases.
ESORICS 1998: 159-174 |
| 1996 |
5 | | Frédéric Cuppens,
Alban Gabillon:
Formalisation de la Confidentialité dans une Base de Données à Objets.
BDA 1996: 417- |
4 | | Frédéric Cuppens,
Alban Gabillon:
A Logical Approach to Model a Multilevel Object-Oriented Database.
DBSec 1996: 145-166 |
| 1995 |
3 | | Frédéric Cuppens,
Alban Gabillon:
Modelling a Multilevel Database with Temporal Downgrading Functionalities.
DBSec 1995: 145-164 |
| 1994 |
2 | | Nora Boulahia-Cuppens,
Frédéric Cuppens,
Alban Gabillon,
Kioumars Yazdanian:
Decomposition of Multilevel Objects in an Object-Oriented Database.
ESORICS 1994: 375-402 |
| 1993 |
1 | | Nora Boulahia-Cuppens,
Frédéric Cuppens,
Alban Gabillon,
Kioumars Yazdanian:
Multilevel Security in Object-Oriented Databases.
Security for Object-Oriented Systems 1993: 79-89 |