Publications of Yannick CHEVALIER
Igor Kotenko, Maksim Kalameyets, Andrey Chechulin, Yannick Chevalier
A visual analytics approach for the cyber forensics based on different views of the network traffic
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2018, 9 (2), pp.57–73. ⟨10.22667/JOWUA.2018.06.30.057⟩
Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani
Satisfiability of General Intruder Constraints with and without a Set Constructor
Journal of Symbolic Computation, 2017, Special issue: SI: Program Verification, 80, pp.27-61. ⟨10.1016/j.jsc.2016.07.009⟩
Tigran Avanesov, Yannick Chevalier, Michael Rusinowitch, Mathieu Turuani
Intruder deducibility constraints with negation. Decidability and application to secured service compositions
Journal of Symbolic Computation, 2017, 80, pp.4 – 26. ⟨10.1016/j.jsc.2016.07.008⟩
Walid Belkhir, Yannick Chevalier, Michael Rusinowitch
Parametrized automata simulation and application to service composition
Journal of Symbolic Computation, 2015, 69, pp.40–60. ⟨10.1016/j.jsc.2014.09.029⟩
Wiem Tounsi, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro, Yannick Chevalier, Frédéric Cuppens
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems
Journal of Network and Computer Applications (JNCA), 2014, 39, pp.152 – 166. ⟨10.1016/j.jnca.2013.06.002⟩
Yannick Chevalier, Michaël Rusinowitch
Decidability of Equivalence of Symbolic Derivations
In : Journal of Automated Reasoning, Springer-Verlag, Heidelberg, Allemagne, Vol. 48 N. 2, pp. 263-292, August 2012.
Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures
In : Theoretical Computer Science, Elsevier, Vol. 411 N. 10, pp. 1261-1282, June 2010.
Yannick Chevalier, Michaël Rusinowitch
Compiling and securing cryptographic protocols
In : Information Processing Letters, Elsevier, Vol. 110 N. 3, pp. 116-122, March 2010.
Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption
In : ACM Transactions on Computational Logic (TOCL), ACM Digital Library, Vol. 9 N. 4, pp. 1-25, August 2008.
Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani
Hierarchical combination of intruder theories
In : Information and Computation, Elsevier, Vol. 206 N. 2-4, pp. 352-377, June 2008.
Yannick Chevalier, Denis Lugiez, Michaël Rusinowitch
Verifying Cryptographic Protocols with Subterms Constraints
In : Lecture Notes in Computer Science (LNCS), Springer-Verlag, Heidelberg, Allemagne, Special issue Logic for Programming, Artificial Intelligence, and Reasoning, 14th International Conference, Vol. 4790, pp. 181-195, October 2007.
Abstract URL : http://dx.doi.org/10.1007/978-3-540-75560-9_15
BibTeXYannick Chevalier, Denis Lugiez, Michaël Rusinowitch
Towards an Automatic Analysis of Web Service Security
In : Lecture Notes in Artificial Intelligence (LNAI), Springer-Verlag, Heidelberg, Allemagne, Special issue Frontiers of Combining Systems, 6th International Symposium, Vol. 4720, pp. 133-147, September 2007.
Abstract URL : http://dx.doi.org/10.1007/978-3-540-75560-9_15
BibTeXYannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani
An NP Decision Procedure for Protocol Insecurity with XOR
In : Theoretical Computer Science B, Elsevier Science B.V., Elsevier Science B.V. Mathematics & Computer Science P.O. Box 103 1000 AC Amsterdam The Netherlands, Vol. 1060, March 2005.
Yannick Chevalier, Laurent Vigneron
Strategy for Verifying Security Protocols with Unbounded Message Size
In : Journal of Automated Software Engineering, Springer-Verlag, Heidelberg, Allemagne, Vol. 11 N. 2, pp. 141-166, March 2004.
Nathalie Aussenac-Gilles, Jérémy Bouché-Pillon, Pascale Zaraté, Yannick Chevalier, Pierre-Yves Gicquel
Éléments d’état de l’art sur l’extraction et la modélisation de règles formelles à partir de textes légaux
34es Journées francophones d’Ingénierie des Connaissances (IC 2023) @ PFIA 2023, Collège SIC (Science de l’Ingénierie des Connaissances) de l’AFIA, Jul 2023, Strasbourg, France. pp.79-84
Pierre-Yves Gicquel, Jérémy Bouché-Pillon, Pascale Zaraté, Nathalie Aussenac-Gilles, Yannick Chevalier
Ontologies and Rules for Access Control: a Feature Oriented Survey
1st Workshop on Collaboration in knowledge discovery and decision making: Applications to sustainable agriculture (DECISIONING 2022), Jun 2022, La Plata, Argentina. pp.1-12
Yannick Chevalier, Michaël Rusinowitch
Implementing Security Protocol Monitors
SCSS 2021 – 9th International Symposium on Symbolic Computation in Software Science, Sep 2021, Linz/virtual, Austria. pp.22-34, ⟨10.4204/EPTCS.342.3⟩
Benito Fabian Romero Jimenez, Yannick Chevalier
Decidability of Deterministic Process Equivalence for Finitary Deduction Systems
28th Euromicro International Conference on Parallel, Distributed and network-based Processing – PDP 2020, Mar 2020, Västerås, Sweden. pp.441-444, ⟨10.1109/PDP50117.2020.00074⟩
Self-Correcting Unsound Reasoning Agents (DARe 2017)
4th International Workshop on Defeasible and Ampliative Reasoning (DARe 2017), Jul 2017, Espoo, Finland. pp.16-28
Tushant Jha, Walid Belkhir, Yannick Chevalier, Michael Rusinowitch
Expressive Equivalence and Succinctness of Parametrized Automata with respect to Finite Memory Automata
FOR-MOVES 2015: FORmal MOdeling and VErification of Service-based systems, Nov 2015, Goa, India
Belkhir Walid, Yannick Chevalier, Michaël Rusinowitch
Fresh-Variable Automata for Service Composition
In : SYNASC, Timisoara, 23/09/13-26/09/13, Tudor Jebelean, Laura Kovacs (Eds.).
Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch
Orchestration under Security Constraints (regular paper)
In : Formal Methods for Components and Objects, Graz, Austria, 29/11/10-01/12/10, Vol. 6957, Bernhard Aichernig, Frank de Boer, Marcello Bonsangue (Eds.), Springer, LNCS, pp. 23-44, May 2012.
Alessandro Armando, Wihem Arsac, Tigran Avanesov, Michele Barletta, Alberto Calvi, Alessandro Cappai, Roberto Carbone, Yannick Chevalier, Luca Compagna, Jorge Cuellar, Gabriel Erzse, Simone Frau, Marius Minea, David Von Oheimb, Sebastian Mödersheim, Giancarlo Pellegrino, Serena Elisa Ponta, Marco Rochetto, Michaël Rusinowitch, Mohamad Torabi Dashti, Mathieu Turuani, Luca Vigano
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures (regular paper)
In : TACAS, Talinn, Estonie, 24/03/12-01/04/12, Vol. 7214, Cormac Flanagan, Barbara Koenig (Eds.), Springer, LNCS, pp. 267-282, March 2012.
Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani
Towards the Orchestration of Secured Services under Non-disclosure Policies (regular paper)
In : MMM-ACNS, St-Petersbourg, 17/10/12-20/10/12, Vol. 7531, Igor Kotenko, Victor Skormin (Eds.), Springer, LNCS, pp. 130-145, October 2012.
Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch, Mathieu Turuani
Distributed Orchestration of Web Services under Security Constraints (regular paper)
In : DTM-SETOP, Leeuwen, Belgique, 15/09/11-16/09/11, Vol. 7122, J. Garcia-Alfaro, Nora Bouhoulia-Cuppens, Sabrina De Capitani di Vim. (Eds.), Springer, LNCS, pp. 235-252, September 2011.
Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch
Web Services Verification and Prudent Implementation (regular paper)
In : DTM-SETOP, Leeuwen, Belgique, 15/09/11-16/09/11, Vol. 7122, J. Garcia-Alfaro, Nora Cuppens-Boulahia, Sabrina De Capitani di Vim. (Eds.), Springer, LNCS, pp. 173-189, September 2011.
Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch
Automatic Composition of Web Services with Security Policies (regular paper)
In : Service computing, Context-aware, Location aware and Positioning techniques – Worksop at International Conference on New Technologies, Mobility and Security (NTMS 2011) (SCLP 2008), Honolulu, 05/07/08-10/07/08, IEEE : Institute of Electrical and Electronics Engineers, Services I, pp. 529-537, 2010.
Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani
Satisfiability of General Intruder Constraints with a Set Constructor (regular paper)
In : International Conference on Risks and Security of Internet and Systems (CRiSIS 2010), Montréal, Québec, Canada, 20/10/10-27/10/10, Marius Minea, Nora Boulahia-Cuppens (Eds.), IEEE : Institute of Electrical and Electronics Engineers, pp. 1-8, October 2010.
Philippe Balbiani, Yannick Chevalier, Marwa El Houri
An intruder model for trust negotiation (regular paper)
In : International Conference on Risks and Security of Internet and Systems (CRiSIS 2010), Montréal, 10/10/10-13/10/10, Yannick Chevalier, Marwa El Houri (Eds.), IEEE : Institute of Electrical and Electronics Engineers, pp. 1-8, 2010.
Philippe Balbiani, Yannick Chevalier, Marwa El Houri
A Logical Framework for Reasoning about Policies with Trust Negotiations and Workflows in a Distributed Environment (regular paper)
In : International Conference on Risks and Security of Internet and Systems (CRiSIS 2009), Toulouse – France, 19/10/09-22/10/09, Anas Abou El Kalam, Yves Deswarte, Mahmoud Mostafa (Eds.), IEEE : Institute of Electrical and Electronics Engineers, pp. 3-11, December 2009.
Philippe Balbiani, Yannick Chevalier, Marwa El Houri
Approche logique pour les contraintes de contrôle daccès dans les services Web
In : Atelier sur les droits daccès à des Services et des Données définis dans un Environnement Collaboratif (SDEC09), Toulouse, 26/05/09.
Philippe Balbiani, Yannick Chevalier, Marwa El Houri
A logical approach to dynamic role-based access control in a distributed environment
In : International Conference on Artificial Intelligence: Methodology, Systems, Applications (AIMSA 2008), Varna (Bulgarie), 01/01/08-31/12/08, Springer-Verlag, pp. 194-208, 2008.
Yannick Chevalier, Mounira Kourjieh
Key Substitution in the Symbolic Analysis of Cryptographic Protocols
In : Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2007), India, New Delhi, 12/12/07-14/12/07, Vol. 4855/2007, Springer, LNCS 978-3-540-77049-7, pp. 121-132, November 2007.
Yannick Chevalier, Mounira Kourjieh
A Symbolic Intruder Model for Hash-Collision Attacks
In : Annual Asian Computing Science Conference (ASIAN 2006), Tokyo, 06/12/06-08/12/06, Vol. 4435, Mitsu Okada, Ichiro Satoh (Eds.), Springer, Lecture Notes in Computer Science 4435, pp. 13-27, January 2007.
Abstract URL : http://www.irit.fr/publis/LILAC/main.pdf
BibTeXYannick Chevalier, Michaël Rusinowitch
Hierarchical Combination of Intruder Theories
In : Rewriting Techniques and Applications (RTA 2006), Seattle, 12/08/06-14/08/06, Mark Pfenning (Eds.), Springer-Verlag, Lecture Notes in Computer Science 4098, pp. 108-122, August 2006.
Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani
Deciding the Security of Protocols with Commuting Public Key Encryption (regular paper)
In : ARSPA, Cork, Ireland, 20/06/04-21/06/04, Vol. 125, Luca Vigano, Alessandro Armando (Eds.), Science Direct, 1, pp. 55-66, March 2005.
Yannick Chevalier, Laurent Vigneron
Rule-based Programs Describing Internet Security Protocols (regular paper)
In : Rule-based Programming, Aachen, 01/06/04-01/06/04, Vol. 124, Slim Abdennadher, Christophe Ringeissen (Eds.), Science Direct, 1, pp. 113-132, March 2005.
Yannick Chevalier, Michaël Rusinowitch
Combining Intruder Theories
In : International Colloqium on Automata, Languages and Programming, Lisbonne, 11/07/05-15/07/05, Vol. 1, Giuseppe F. Italiano, Catuscia Palamidessi, Moti Yung (Eds.), Springer, Lecture Notes in Computer Science 3580, pp. 639-651, July 2005.
Alessandro Armando, David Basin , Yohann Boichut, Yannick Chevalier, Al. Et
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
In : Computer-Aided Verification, Edinburgh, Scotland, UK, 06/07/05-10/07/05, Etessami Kousha, Rajamani Sriram (Eds.), Springer-Verlag, pp. 1-5, July 2005.
Muriel Foulonneau, Valentin Grouès, Yannick Naudet, Max Chevalier
Recommandeurs et diversité : Exploitation de la longue traîne et diversité des listes de recommandations
Chartron, Ghislaine; Saleh, Imad; Kembellec, Gérald. Les systèmes de recommandation, 4, ISTE editions, pp.85–104, 2014
Muriel Foulonneau, Valentin Groues, Yannick Naudet, Max Chevalier
Recommender Systems and Diversity: Taking Advantage of the Long Tail and the Diversity of Recommendation Lists
Kembellec, Gérald; Chartron, Ghislaine; Saleh, Imad. Recommender Systems, chapter 4, Wiley-ISTE, pp.71–92, 2014, 978-1848217683. ⟨10.1002/9781119054252⟩
Alexandre Dey, Benjamin Costé, Éric Totel, Adrien Bécue, Elkin Aguas, Anthony Lambert, Gregory Blanc, Hervé Debar, Yannick Chevalier, Amine Medad, Baptiste Gregorutti, Edouard Genetay, Alexandre Peter Nguema, Grégoire Menguy, Sébastien Bardin, Richard Bonichon, Cauim de de Souza Lima, Rémy Charayron, Thierry Lefèvre, Nathalie Bartoli, Joseph Morlier, Zakaria Chihani, Bruno Carron, Stephan Brunessaux, Léonard Caquot, Tristan Charrier, Badre El Bezzaz Semlali, Oudomsack Pierre Pasquero, Alexis Bazin, Pierre-Elisée Flory, Katarzyna Kapusta, Oana Stan, Vincent Thouvenot, Karel Hynek, Romain Ferrari, Aymen Boudguiga, Renaud Sirdey, Alice Héliou, Thomas Cejka, Daria La Rocca, Martin Zuber, George Vardoulias, Ioannis Papaioannou, Andreas Vekinis, Georgia Papadopoulou, Marc Vincent, Amal El Fallah-Seghrouchni, Vincent Corruble, Narayan Bernardin, Rami Kassab, Frédéric Barbaresco, Karim Tit, Teddy Furon, Mathias Rousset, Louis-Marie Traonouez, Pierre-Yves Lagrave, Vincent Vidal, Marie-Caroline Corbineau, Tugdual Ceillier, Aleksei Iancheruk, Ahmed Allali, Julien Rodriguez, Tejas Bhor, Ricardo Garcia, Jean-Eudes Guilhot-Gaudeffroy, Robert Plana
Actes de la conférence CAID 2021 (Conference on Artificial Intelligence for Defense)
CAID 2021 (Conference on Artificial Intelligence for Defense), pp.1-152, 2021