Follow
Briffaut Jeremy
Briffaut Jeremy
ENSIB/LIFO
Verified email at ensi-bourges.fr
Title
Cited by
Cited by
Year
Security and Results of a Large-Scale High-Interaction Honeypot.
J Briffaut, JF Lalande, C Toinard
J. Comput. 4 (5), 395-404, 2009
332009
Extending atomic cross-chain swaps
JY Zie, JC Deneuville, J Briffaut, B Nguyen
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2019
242019
Formalization of security properties: enforcement for mac operating systems and verification of dynamic mac policies
J Briffaut, JF Lalande, C Toinard
International journal on advances in security 2 (4), 325-343, 2009
202009
A collaborative approach for access control, intrusion detection and security testing
M Blanc, J Briffaut, P Clemente, MG El Rab, C Toinard
International Symposium on Collaborative Technologies and Systems (CTS'06 …, 2006
202006
Formalisation et garantie de propriétés de sécurité système: application à la détection d'intrusions
J Briffaut
Université d'Orléans, 2007
162007
Mandatory access control for the android dalvik virtual machine
A Bousquet, J Briffaut, L Clevy, C Toinard, B Venelle
2013 Workshop on Embedded Self-Organizing Systems (ESOS 13), 2013
152013
Collaboration between MAC policies and ids based on a meta-policy approach
M Blanc, J Briffaut, C Toinard
International Symposium on Collaborative Technologies and Systems (CTS'06 …, 2006
142006
Piga-hips: Protection of a shared hpc cluster
M Blanc, J Briffaut, D Gros, C Toinard
International Journal on Advances in Security Volume 4, 2011
122011
Enforcing security and assurance properties in cloud environment
A Bousquet, J Briffaut, E Caron, EM Dominguez, J Franco, A Lefray, ...
2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing …, 2015
112015
An advanced security-aware cloud architecture
L Bobelin, A Bousquet, J Briffaut, JF Couturier, C Toinard, E Caron, ...
2014 International Conference on High Performance Computing & Simulation …, 2014
112014
Mandatory access protection within cloud systems
M Blanc, A Bousquet, J Briffaut, L Clévy, D Gros, A Lefray, ...
Security, Privacy and Trust in Cloud Systems, 145-173, 2013
112013
Piga-virt: an advanced distributed mac protection of virtual systems
J Briffaut, E Lefebvre, J Rouzaud-Cornabas, C Toinard
Euro-Par 2011: Parallel Processing Workshops: CCPI, CGWS, HeteroPar, HiBB …, 2012
102012
A new approach to enforce the security properties of a clustered high-interaction honeypot
J Briffaut, J Rouzaud-Cornabas, C Toinard, Y Zemali
2009 International Conference on High Performance Computing & Simulation …, 2009
102009
Bridging the gap: Data exfiltration in highly secured environments using bluetooth IoTs
E Carpentier, C Thomasset, J Briffaut
2019 IEEE 37th International Conference on Computer Design (ICCD), 297-300, 2019
82019
An autonomous cloud management system for in-depth security
A Bousquet, J Briffaut, C Toinard
2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), 368-374, 2014
82014
Security-aware models for clouds
A Lefray, E Caron, J Rouzaud-Cornabas, ZH Yulin, A Bousquet, J Briffaut, ...
22th IEEE International Symposium on High Performance Distributed Computing, 2013
82013
Seeding the cloud: An innovative approach to grow trust in cloud based infrastructures
S Betgé-Brezetz, A Bousquet, J Briffaut, E Caron, L Clevy, MP Dupont, ...
The Future Internet: Future Internet Assembly 2013: Validated Results and …, 2013
82013
Security enhanced java: Mandatory access control for the java virtual machine
B Venelle, J Briffaut, L Clévy, C Toinard
16th IEEE International Symposium on Object/component/service-oriented Real …, 2013
72013
MAC protection of the OpenNebula Cloud environment
Z Afoulki, A Bousquet, J Briffaut, J Rouzaud-Cornabas, C Toinard
2012 International Conference on High Performance Computing & Simulation …, 2012
72012
Mandatory access control with a multi-level reference monitor: PIGA-cluster
M Blanc, D Gros, J Briffaut, C Toinard
Proceedings of the first workshop on Changing landscapes in HPC security, 1-8, 2013
62013
The system can't perform the operation now. Try again later.
Articles 1–20