Romain Laborde
Professeur des Universités, Université Toulouse 3 Paul Sabatier, Toulouse, France
63
Documents
Affiliations actuelles
- 394761
Domaines de recherche
Cryptographie et sécurité [cs.CR]
Réseaux et télécommunications [cs.NI]
Compétences
Identity and Access Management
Intrusion detection
OS security
Dynamic security management
AI and Security
Web PKI
Self-Sovereign Idenity
Cloud security
Publications
- 41
- 27
- 25
- 20
- 13
- 9
- 8
- 7
- 7
- 7
- 7
- 7
- 6
- 6
- 6
- 6
- 5
- 5
- 4
- 4
- 4
- 4
- 4
- 3
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 9
- 4
- 3
- 6
- 4
- 1
- 5
- 9
- 11
- 7
- 2
- 1
- 5
- 3
- 2
- 2
- 2
- 1
- 1
ACME Protocol to Automate the Management of All X.509 Web Certificates38th International Conference on Information Security and Privacy Protection (IFIP SEC 2023), International Federation for Information Processing (IFIP); Poznan Supercomputing and Networking Center (PSNC), Jun 2023, Poznan, Poland
Communication dans un congrès
hal-04278136v1
|
|
|
Est-il difficile de respecter le principe de moindre privilège sur Linux ?Rendez-Vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information, May 2023, Neuvy-sur-Barangeon, France
Communication dans un congrès
hal-04103463v1
|
|
Towards Reliable Collaborative Data Processing Ecosystems: Survey on Data Quality Criteria26th IEEE International Conference on Computational Science and Engineering (CSE 2023), IEEE, Nov 2023, Exeter, United Kingdom. à paraître
Communication dans un congrès
hal-04287970v1
|
Implementing the Principle of Least Privilege Using Linux Capabilities: Challenges and Perspectives7th Cyber Security in Networking Conference (CSNet 2023), IEEE Communications Society, Oct 2023, Montréal, Canada. à paraître
Communication dans un congrès
hal-04278090v1
|
|
|
A SLAHP in the face of DLL Search Order Hijacking3rd International Conference on Ubiquitous Security (UbiSec 2023), Nov 2023, Exeter, United Kingdom. pp.177--190, ⟨10.1007/978-981-97-1274-8_12⟩
Communication dans un congrès
hal-04278110v1
|
|
The Interplay Between Policy and Technology in Metaverses: Towards Seamless Avatar Interoperability Using Self-Sovereign IdentityIEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom 2023), IEEE, Jun 2023, Kyoto, Japan. pp.418-422, ⟨10.1109/MetaCom57706.2023.00080⟩
Communication dans un congrès
hal-04251837v1
|
AutoRoC-DBSCAN: Automatic Tuning of DBSCAN to Detect Malicious DNS Tunnels3rd International Symposium on Emerging Information Security and Applications (EISA 2022), Oct 2022, Wuhan, China. pp.126-144, ⟨10.1007/978-3-031-23098-1_8⟩
Communication dans un congrès
hal-04251768v1
|
|
|
RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC 2021), IFIP : International Federation for Information Processing, Jun 2021, Oslo, Norway. pp.196-209, ⟨10.1007/978-3-030-78120-0_13⟩
Communication dans un congrès
hal-03345757v1
|
|
Know Your Customer: Opening a New Bank Account Online Using UAAF17th IEEE Consumer Communications and Networking Conference (CCNC 2020), Jan 2020, Las Vegas, United States. pp.1-2, ⟨10.1109/CCNC46108.2020.9045148⟩
Communication dans un congrès
hal-02942773v1
|
|
A User-Centric Identity Management Framework based on the W3C Verifiable Credentials and the FIDO Universal Authentication Framework17th IEEE Consumer Communications and Networking Conference (CCNC 2020), Jan 2020, Las Vegas, United States. pp.1-8, ⟨10.1109/CCNC46108.2020.9045440⟩
Communication dans un congrès
hal-02930106v1
|
|
Towards Situation-based IT Management During Natural Disaster CrisisFourteenth International Conference on Emerging Security Information, Systems and Technologie (SECUREWARE 2020), Nov 2020, Valencia, Spain
Communication dans un congrès
hal-03023380v1
|
|
Detecting abnormal DNS traffic using unsupervised machine learning4th Cyber Security in Networking Conference: Cyber Security in Networking (CSNet 2020), IEEE Communications Society, Oct 2020, Lausanne, Switzerland. pp.1-8, ⟨10.1109/CSNet50428.2020.9265466⟩
Communication dans un congrès
hal-03184957v1
|
|
Logic-based Methodology to Help Security Architects in Eliciting High-Level Network Security Requirements34th ACM/SIGAPP Symposium on Applied Computing (SAC 2019), Apr 2019, Limassol, Cyprus. pp.1610-1619
Communication dans un congrès
hal-02456750v1
|
|
Dynamic security management driven by situations: An Exploratory analysis of logs for the identification of security situations3rd Cyber Security in Networking Conference (CSNet 2019), Oct 2019, Quito, Ecuador. pp.66, ⟨10.1109/CSNet47905.2019.9108976⟩
Communication dans un congrès
hal-02942298v1
|
|
Applying a requirement engineering based approach to evaluate the security requirements engineering methodologiesSAC 2018: The 33th ACM/SIGAPP Symposium on Applied Computing, Apr 2018, Pau, France. pp.1316-1318
Communication dans un congrès
hal-02625471v1
|
|
Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach12th International Conference on Availability, Reliability and Security (ARES 2017), Aug 2017, Reggio Calabria, Italy. pp.1-6
Communication dans un congrès
hal-02603703v1
|
|
TLS Connection Validation by Web Browsers: Why do Web Browsers still not agree?41st IEEE Annual Computer Software and Applications Conference (COMPSAC 2017), Jul 2017, Turin, Italy. pp. 665-674
Communication dans un congrès
hal-01873806v1
|
|
Describing Advanced Persistent Threats Using a Multi-agent System ApproachCyber Security in Networking Conference (CSNet), Oct 2017, Rio de Janeiro, Brazil. pp.0, ⟨10.1109/CSNET.2017.8241997⟩
Communication dans un congrès
hal-02863299v1
|
|
Le projet ANR INCOME, processus et outils logiciels pour des gestionnaires de contexte au dessus de l'Internet des objetsUBIMOB 2016 : 11èmes journées francophones Mobilité et Ubiquité, Jul 2016, Lorient, France. pp.1 - 7
Communication dans un congrès
hal-01444756v1
|
|
A recommender-based system for assisting non technical users in managing Android permissions11th International Conference on Availability, Reliability and Security (ARES 2016), Aug 2016, Salzburg, Austria. pp. 1-9
Communication dans un congrès
hal-01682972v1
|
|
Difficulties to enforce your privacy preferences on Android? Kapuer will help you13th IEEE Consumer Communications and Networking Conference (CCNC 2016), Jan 2016, Las Vegas, United States. pp. 315-316
Communication dans un congrès
hal-01484993v1
|
|
Demonstration of KAPUER: A privacy policy manager on AndroidIEEE Consumer Communications and Networking Conference (CCNC 2016), Jan 2016, Las Vegas, United States. pp. 282-283
Communication dans un congrès
hal-01484991v1
|
|
How Can I Trust an X.509 Certificate? an Analysis of the Existing Trust Approaches41st IEEE Conference on Local Computer Networks (LCN 2016), Nov 2016, Dubai, United Arab Emirates. pp. 531-534
Communication dans un congrès
hal-01690136v1
|
|
eGovernment Security Requirements: Managing Obligations and Authorizations Inconsistencies with XACMLv3International Conference on Security and Management (SAM 2016), Jul 2016, Las Vegas, United States. pp.89-95
Communication dans un congrès
hal-04109377v1
|
|
Towards the weaving of the characteristics of good security requirementsInternational Conference on Risks and Security of Internet and Systems (CRISIS 2016), Sep 2016, Roscoff, France. pp. 60-74
Communication dans un congrès
hal-01690137v1
|
|
Specification and Enforcement of Dynamic Authorization Policies oriented by Situations6th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2014), IFIP: International Federation for Information Processing, Mar 2014, Dubaï, United Arab Emirates. pp.1--6, ⟨10.1109/NTMS.2014.6814050⟩
Communication dans un congrès
hal-03230724v1
|
|
Gestion de contexte multi-échelle pour l'Internet des objets10èmes Journées francophones Mobilité et Ubiquité (UBIMOB 2014), Jun 2014, Sophia Antipolis, France. pp.1-8
Communication dans un congrès
hal-03665340v1
|
|
Etude du concept de confiance pour les infrastructures à clés publiques10ème Colloque francophone Gestion de REseaux et de Services (GRES 2014), Dec 2014, Paris, France. pp.1-6
Communication dans un congrès
hal-03665056v1
|
|
Managing Break-The-Glass using Situation-oriented authorizations9ème Conférence sur la Sécurité des Architectures Réseaux et Systèmes d'Information - SAR-SSI 2014, May 2014, Saint-Germain-Au-Mont-d'Or (Lyon), France, France. pp.0
Communication dans un congrès
hal-01120112v1
|
|
KAPUER: A Decision Support System for Protecting PrivacyInternational Conference Group Decision and Negotiation (GDN 2014), Jun 2014, Toulouse, France. pp.100-107, ⟨10.1007/978-3-319-07179-4_11⟩
Communication dans un congrès
hal-04080895v1
|
Système d'aide à la décision pour la protection des données de vie privée de l'utilisateurROADEF - 15ème congrès annuel de la Société française de recherche opérationnelle et d'aide à la décision, Société française de recherche opérationnelle et d'aide à la décision, Feb 2014, Bordeaux, France
Communication dans un congrès
hal-00946424v1
|
|
|
Projet INCOME : INfrastructure de gestion de COntexte Multi-Echelle pour l'Internet des ObjetsConférence Francophone sur les Architectures Logicielles (CAL), Jun 2014, Paris, France. pp. 1-2
Communication dans un congrès
hal-01133334v1
|
An adaptive XACMLv3 policy enforcement pointIEEE 38th International Workshop on Adaptive Systems for Communication Networks 2014, Jul 2014, Västerås, Sweden. pp.620--625, ⟨10.1109/COMPSACW.2014.104⟩
Communication dans un congrès
hal-03252261v1
|
|
|
Toward Authorization as a Service: A Study of the XACML Standard16th Communications and Networking Symposium (CNS 2013) @ 2013 Spring Simulation Multi-Conference, ACM Special Interest Group on Simulation and Modeling, Apr 2013, San Diego, CA, United States. pp.55-61
Communication dans un congrès
hal-04084419v1
|
|
Spécification Method for Analyzing Fine Grained Network Security Mechanism Configurations6th Symposium on Security Analytics and Automation 2013 (SafeConfig 2013), Oct 2013, Washington, D.C., United States. pp.483-487, ⟨10.1109/CNS.2013.6682764⟩
Communication dans un congrès
hal-04083309v1
|
|
Authorization policies: Using Decision Support System for context-aware protection of user's private dataIEEE International Symposium on UbiSafe Computing - TrustCom 2013, Jul 2013, Melbourne, Australia. pp. 1639-1644
Communication dans un congrès
hal-01148292v1
|
|
PKI Interoperability: Still an Issue? A Solution in the X.509 Realm8th World Conference on Information Security Education (WISE), Jul 2013, Auckland, New Zealand. pp.68-82, ⟨10.1007/978-3-642-39377-8_8⟩
Communication dans un congrès
hal-01463660v1
|
|
INCOME - Multi-scale context management for the internet of things3rd International Joint Conference on Ambient Intelligence (AML 2012), Nov 2012, Pise, Italy. pp.338-347, ⟨10.1007/978-3-642-34898-3_25⟩
Communication dans un congrès
hal-00753360v1
|
Projet INCOME : INfrastructure de gestion de COntexte Multi-Échelle pour l'Internet des ObjetsUbimob 2012 : 8èmes journées francophones Mobilité et Ubiquité, Jun 2012, Anglet, France. pp.46-48
Communication dans un congrès
hal-00724429v1
|
2020 4th Cyber Security in Networking Conference (CSNet)Solange Ghernaouti-Hélie; Abdelmalek Benzekri; Romain Laborde; Nadjib Aitsaadi; Joaquin Garcia‐Alfaro. 4th Cyber Security in Networking Conference: Cyber Security in Networking (CSNet 2020), Oct 2020, Lausanne, Switzerland. IEEE: Institute of Electrical and Electronics Engineers, 2020, 978-0-7381-4292-0. ⟨10.1109/CSNet50428.2020⟩
Proceedings/Recueil des communications
hal-03184958v1
|
Foundations and practice of securityBenzekri, Abdelmalek; Barbeau, Michel; Gong, Guang; Laborde, Romain; Garcia-Alfaro, Joaquin. FPS 2019: 12th International Symposium on Foundations and Practice of Security, Nov 2019, Toulouse, France. Lecture Notes in Computer Science, 12056, 408 p., 2020, Lecture Notes in Computer Science book series (LNCS), 978-3-030-45370-1. ⟨10.1007/978-3-030-45371-8⟩
N°spécial de revue/special issue
hal-03001571v1
|
IoT Security threats and risk analysisHandbook of Internet of Things, Springer, inPress
Chapitre d'ouvrage
hal-03417339v1
|
|
Proposition summary to X.509 committee: Adding the Role of technical and juridical expert to X.509 trust model2013
Autre publication scientifique
hal-02902193v1
|
|
Assessing e-identity solutions according to Self-Sovereign Identity: application to eIDAS2023
Pré-publication, Document de travail
hal-04185157v1
|
|
How to Design and Deliver Courses for Higher Education in the AI Era: Insights from Exam Data Analysis2023
Pré-publication, Document de travail
hal-04168693v2
|
|
Contributions à la gestion de la sécurité des infrastructures virtuellesCryptographie et sécurité [cs.CR]. Université Toulouse 3 Paul Sabatier, 2016
HDR
tel-01524399v1
|