Automated Detection of Information Leakage in Access Control

Charles Morisset , Anderson Santana de Oliveira
international workshop on security

5
2007
Contrôler le contrôle d'accès

Charles Morisset , Mathieu Jaume
AFADL'07, Approches Formelles dans l'Assistance au Développement de Logiciels

2007
Formal definition and comparison of access control models

Charles Morisset , Mathieu Jaume , Lionel Habib
information assurance and security 4 ( 4) 372 -381

15
2009
Towards a formal specification of access control

Charles Morisset , Mathieu Jaume
Proceedings of the LICS-Affiliated Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis

13
2006
Trusted Software within Focal

Charles Morisset , David Delahaye , Matthieu Carlier , Mathieu Jaume
C&ESAR 2008 - Computer & Electronics Security Applications Rendez-vous 162 -179

5
2008
Consolidated dependability framework

Francesca Lonetti , Mario Fusani , Valerie Issarny , Charles Morisset
116

2012
Finalised dependability framework and evaluation results

Francesca Lonetti , Charles Morisset , Silvano Chiaradonna , Fabio Martinelli

2
2012
Final CONNECT Architecture

Vatsala Nundloll , Valerie Issarny , Pierre-Guillaume Raverdy , Charles Morisset

2
2012
Automated Certification of Authorisation Policy Resistance

Andreas Griesmayer , Charles Morisset
arXiv: Cryptography and Security

2013
Formalisation et implantation d'une politique de sécurité d'une base de données

Julien Blond , Charles Morisset
Journées Francophones des Langages Applicatifs (JFLA) 71 -86

2006
Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems

Charles Morisset , Luca Arnaboldi
international workshop on security 224 -233

5
2017
Systematic review of features for co-simulating security incidents in Cyber-Physical Systems

Charles Morisset , John A. Clark , Charalampos Patsios , Sadegh Soudjani
Security and Privacy 4 ( 3)

2021
Securing the Electric Vehicle Charging Infrastructure.

Myriam Neaimeh , Charles Morisset , Carsten Maple , Xavier J. A. Bellekens
arXiv: Cryptography and Security

11
2021
A Component-Based Access Control Monitor

Zhiming Liu , Charles Morisset , Volker Stolz
leveraging applications of formal methods 17 339 -353

2
2008
A Quantitative Approach for Inexact Enforcement of Security Policies

Peter Drábik , Fabio Martinelli , Charles Morisset
Lecture Notes in Computer Science 306 -321

8
2012
A framework for the extended evaluation of ABAC policies

Charles Morisset , Tim A. C. Willemse , Nicola Zannone
Cybersecurity 2 ( 1) 6

1
2019
Probabilistic cost enforcement of security policies

Yannis Mallios , Lujo Bauer , Dilsun Kaynar , Fabio Martinelli
Journal of Computer Security 23 ( 6) 759 -787

1
2015
Smart Building Risk Assessment Case Study: Challenges, Deficiencies and Recommendations

John C. Mace , Ricardo Melo Czekster , Charles Morisset , Carsten Maple
european dependable computing conference 59 -64

2020
A Decision Making Model of Influencing Behavior in Information Security

Iryna Yevseyeva , Charles Morisset , Thomas Groß , Aad van Moorsel
Computer Performance Engineering - 11th European Workshop, EPEW 2014, Florence, Italy, September 11-12, 2014. Proceedings 194 -208

3
2014
Specification and validation of behavioural protocols in the rCOS modeler

Zhenbang Chen , Charles Morisset , Volker Stolz
fundamentals of software engineering 387 -401

13
2009