Publications de Yannick CHEVALIER
Igor Kotenko, Maksim Kalameyets, Andrey Chechulin, Yannick Chevalier
A visual analytics approach for the cyber forensics based on different views of the network traffic
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2018, 9 (2), pp.57–73. ⟨10.22667/JOWUA.2018.06.30.057⟩
Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani
Satisfiability of General Intruder Constraints with and without a Set Constructor
Journal of Symbolic Computation, 2017, Special issue: SI: Program Verification, 80, pp.27-61. ⟨10.1016/j.jsc.2016.07.009⟩
Tigran Avanesov, Yannick Chevalier, Michael Rusinowitch, Mathieu Turuani
Intruder deducibility constraints with negation. Decidability and application to secured service compositions
Journal of Symbolic Computation, 2017, 80, pp.4 – 26. ⟨10.1016/j.jsc.2016.07.008⟩
Walid Belkhir, Yannick Chevalier, Michael Rusinowitch
Parametrized automata simulation and application to service composition
Journal of Symbolic Computation, 2015, 69, pp.40–60. ⟨10.1016/j.jsc.2014.09.029⟩
Wiem Tounsi, Nora Cuppens-Boulahia, Joaquin Garcia Alfaro, Yannick Chevalier, Frédéric Cuppens
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems
Journal of Network and Computer Applications (JNCA), 2014, 39, pp.152 – 166. ⟨10.1016/j.jnca.2013.06.002⟩
Yannick Chevalier, Michaël Rusinowitch
Decidability of Equivalence of Symbolic Derivations
Dans : Journal of Automated Reasoning, Springer-Verlag, Heidelberg, Allemagne, Vol. 48 N. 2, p. 263-292, août 2012.
Symbolic protocol analysis in the union of disjoint intruder theories: Combining decision procedures
Dans : Theoretical Computer Science, Elsevier, Vol. 411 N. 10, p. 1261-1282, juin 2010.
Yannick Chevalier, Michaël Rusinowitch
Compiling and securing cryptographic protocols
Dans : Information Processing Letters, Elsevier, Vol. 110 N. 3, p. 116-122, mars 2010.
Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption
Dans : ACM Transactions on Computational Logic (TOCL), ACM Digital Library, Vol. 9 N. 4, p. 1-25, août 2008.
Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani
Hierarchical combination of intruder theories
Dans : Information and Computation, Elsevier, Vol. 206 N. 2-4, p. 352-377, juin 2008.
Yannick Chevalier, Denis Lugiez, Michaël Rusinowitch
Verifying Cryptographic Protocols with Subterms Constraints
Dans : Lecture Notes in Computer Science (LNCS), Springer-Verlag, Heidelberg, Allemagne, Numéro spécial Logic for Programming, Artificial Intelligence, and Reasoning, 14th International Conference, Vol. 4790, p. 181-195, octobre 2007.
Résumé Accès : http://dx.doi.org/10.1007/978-3-540-75560-9_15
BibTeXYannick Chevalier, Denis Lugiez, Michaël Rusinowitch
Towards an Automatic Analysis of Web Service Security
Dans : Lecture Notes in Artificial Intelligence (LNAI), Springer-Verlag, Heidelberg, Allemagne, Numéro spécial Frontiers of Combining Systems, 6th International Symposium, Vol. 4720, p. 133-147, septembre 2007.
Résumé Accès : http://dx.doi.org/10.1007/978-3-540-75560-9_15
BibTeXYannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani
An NP Decision Procedure for Protocol Insecurity with XOR
Dans : Theoretical Computer Science B, Elsevier Science B.V., Elsevier Science B.V. Mathematics & Computer Science P.O. Box 103 1000 AC Amsterdam The Netherlands, Vol. 1060, mars 2005.
Résumé Accès : http://www.sciencedirect.com
BibTeXYannick Chevalier, Laurent Vigneron
Strategy for Verifying Security Protocols with Unbounded Message Size
Dans : Journal of Automated Software Engineering, Springer-Verlag, Heidelberg, Allemagne, Vol. 11 N. 2, p. 141-166, mars 2004.
Nathalie Aussenac-Gilles, Jérémy Bouché-Pillon, Pascale Zaraté, Yannick Chevalier, Pierre-Yves Gicquel
Éléments d’état de l’art sur l’extraction et la modélisation de règles formelles à partir de textes légaux
34es Journées francophones d’Ingénierie des Connaissances (IC 2023) @ PFIA 2023, Collège SIC (Science de l’Ingénierie des Connaissances) de l’AFIA, Jul 2023, Strasbourg, France. pp.79-84
Pierre-Yves Gicquel, Jérémy Bouché-Pillon, Pascale Zaraté, Nathalie Aussenac-Gilles, Yannick Chevalier
Ontologies and Rules for Access Control: a Feature Oriented Survey
1st Workshop on Collaboration in knowledge discovery and decision making: Applications to sustainable agriculture (DECISIONING 2022), Jun 2022, La Plata, Argentina. pp.1-12
Yannick Chevalier, Michaël Rusinowitch
Implementing Security Protocol Monitors
SCSS 2021 – 9th International Symposium on Symbolic Computation in Software Science, Sep 2021, Linz/virtual, Austria. pp.22-34, ⟨10.4204/EPTCS.342.3⟩
Benito Fabian Romero Jimenez, Yannick Chevalier
Decidability of Deterministic Process Equivalence for Finitary Deduction Systems
28th Euromicro International Conference on Parallel, Distributed and network-based Processing – PDP 2020, Mar 2020, Västerås, Sweden. pp.441-444, ⟨10.1109/PDP50117.2020.00074⟩
Self-Correcting Unsound Reasoning Agents (DARe 2017)
4th International Workshop on Defeasible and Ampliative Reasoning (DARe 2017), Jul 2017, Espoo, Finland. pp.16-28
Tushant Jha, Walid Belkhir, Yannick Chevalier, Michael Rusinowitch
Expressive Equivalence and Succinctness of Parametrized Automata with respect to Finite Memory Automata
FOR-MOVES 2015: FORmal MOdeling and VErification of Service-based systems, Nov 2015, Goa, India
Belkhir Walid, Yannick Chevalier, Michaël Rusinowitch
Fresh-Variable Automata for Service Composition
Dans : SYNASC, Timisoara, 23/09/13-26/09/13, Tudor Jebelean, Laura Kovacs (Eds.).
Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch
Orchestration under Security Constraints (regular paper)
Dans : Formal Methods for Components and Objects, Graz, Austria, 29/11/10-01/12/10, Vol. 6957, Bernhard Aichernig, Frank de Boer, Marcello Bonsangue (Eds.), Springer, LNCS, p. 23-44, mai 2012.
Alessandro Armando, Wihem Arsac, Tigran Avanesov, Michele Barletta, Alberto Calvi, Alessandro Cappai, Roberto Carbone, Yannick Chevalier, Luca Compagna, Jorge Cuellar, Gabriel Erzse, Simone Frau, Marius Minea, David Von Oheimb, Sebastian Mödersheim, Giancarlo Pellegrino, Serena Elisa Ponta, Marco Rochetto, Michaël Rusinowitch, Mohamad Torabi Dashti, Mathieu Turuani, Luca Vigano
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures (regular paper)
Dans : TACAS, Talinn, Estonie, 24/03/12-01/04/12, Vol. 7214, Cormac Flanagan, Barbara Koenig (Eds.), Springer, LNCS, p. 267-282, mars 2012.
Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani
Towards the Orchestration of Secured Services under Non-disclosure Policies (regular paper)
Dans : MMM-ACNS, St-Petersbourg, 17/10/12-20/10/12, Vol. 7531, Igor Kotenko, Victor Skormin (Eds.), Springer, LNCS, p. 130-145, octobre 2012.
Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch, Mathieu Turuani
Distributed Orchestration of Web Services under Security Constraints (regular paper)
Dans : DTM-SETOP, Leeuwen, Belgique, 15/09/11-16/09/11, Vol. 7122, J. Garcia-Alfaro, Nora Bouhoulia-Cuppens, Sabrina De Capitani di Vim. (Eds.), Springer, LNCS, p. 235-252, septembre 2011.
Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch
Web Services Verification and Prudent Implementation (regular paper)
Dans : DTM-SETOP, Leeuwen, Belgique, 15/09/11-16/09/11, Vol. 7122, J. Garcia-Alfaro, Nora Cuppens-Boulahia, Sabrina De Capitani di Vim. (Eds.), Springer, LNCS, p. 173-189, septembre 2011.
Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch
Automatic Composition of Web Services with Security Policies (regular paper)
Dans : Service computing, Context-aware, Location aware and Positioning techniques – Worksop at International Conference on New Technologies, Mobility and Security (NTMS 2011) (SCLP 2008), Honolulu, 05/07/08-10/07/08, IEEE : Institute of Electrical and Electronics Engineers, Services I, p. 529-537, 2010.
Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani
Satisfiability of General Intruder Constraints with a Set Constructor (regular paper)
Dans : International Conference on Risks and Security of Internet and Systems (CRiSIS 2010), Montréal, Québec, Canada, 20/10/10-27/10/10, Marius Minea, Nora Boulahia-Cuppens (Eds.), IEEE : Institute of Electrical and Electronics Engineers, p. 1-8, octobre 2010.
Philippe Balbiani, Yannick Chevalier, Marwa El Houri
An intruder model for trust negotiation (regular paper)
Dans : International Conference on Risks and Security of Internet and Systems (CRiSIS 2010), Montréal, 10/10/10-13/10/10, Yannick Chevalier, Marwa El Houri (Eds.), IEEE : Institute of Electrical and Electronics Engineers, p. 1-8, 2010.
Philippe Balbiani, Yannick Chevalier, Marwa El Houri
A Logical Framework for Reasoning about Policies with Trust Negotiations and Workflows in a Distributed Environment (regular paper)
Dans : International Conference on Risks and Security of Internet and Systems (CRiSIS 2009), Toulouse – France, 19/10/09-22/10/09, Anas Abou El Kalam, Yves Deswarte, Mahmoud Mostafa (Eds.), IEEE : Institute of Electrical and Electronics Engineers, p. 3-11, décembre 2009.
Philippe Balbiani, Yannick Chevalier, Marwa El Houri
Approche logique pour les contraintes de contrôle daccès dans les services Web
Dans : Atelier sur les droits daccès à des Services et des Données définis dans un Environnement Collaboratif (SDEC09), Toulouse, 26/05/09.
Philippe Balbiani, Yannick Chevalier, Marwa El Houri
A logical approach to dynamic role-based access control in a distributed environment
Dans : International Conference on Artificial Intelligence: Methodology, Systems, Applications (AIMSA 2008), Varna (Bulgarie), 01/01/08-31/12/08, Springer-Verlag, p. 194-208, 2008.
Yannick Chevalier, Mounira Kourjieh
Key Substitution in the Symbolic Analysis of Cryptographic Protocols
Dans : Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2007), India, New Delhi, 12/12/07-14/12/07, Vol. 4855/2007, Springer, LNCS 978-3-540-77049-7, p. 121-132, novembre 2007.
Yannick Chevalier, Mounira Kourjieh
A Symbolic Intruder Model for Hash-Collision Attacks
Dans : Annual Asian Computing Science Conference (ASIAN 2006), Tokyo, 06/12/06-08/12/06, Vol. 4435, Mitsu Okada, Ichiro Satoh (Eds.), Springer, Lecture Notes in Computer Science 4435, p. 13-27, janvier 2007.
Résumé Accès : http://www.irit.fr/publis/LILAC/main.pdf
BibTeXYannick Chevalier, Michaël Rusinowitch
Hierarchical Combination of Intruder Theories
Dans : Rewriting Techniques and Applications (RTA 2006), Seattle, 12/08/06-14/08/06, Mark Pfenning (Eds.), Springer-Verlag, Lecture Notes in Computer Science 4098, p. 108-122, août 2006.
Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani
Deciding the Security of Protocols with Commuting Public Key Encryption (regular paper)
Dans : ARSPA, Cork, Ireland, 20/06/04-21/06/04, Vol. 125, Luca Vigano, Alessandro Armando (Eds.), Science Direct, 1, p. 55-66, mars 2005.
Yannick Chevalier, Laurent Vigneron
Rule-based Programs Describing Internet Security Protocols (regular paper)
Dans : Rule-based Programming, Aachen, 01/06/04-01/06/04, Vol. 124, Slim Abdennadher, Christophe Ringeissen (Eds.), Science Direct, 1, p. 113-132, mars 2005.
Yannick Chevalier, Michaël Rusinowitch
Combining Intruder Theories
Dans : International Colloqium on Automata, Languages and Programming, Lisbonne, 11/07/05-15/07/05, Vol. 1, Giuseppe F. Italiano, Catuscia Palamidessi, Moti Yung (Eds.), Springer, Lecture Notes in Computer Science 3580, p. 639-651, juillet 2005.
Alessandro Armando, David Basin , Yohann Boichut, Yannick Chevalier, Al. Et
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
Dans : Computer-Aided Verification, Edinburgh, Scotland, UK, 06/07/05-10/07/05, Etessami Kousha, Rajamani Sriram (Eds.), Springer-Verlag, p. 1-5, juillet 2005.
Muriel Foulonneau, Valentin Grouès, Yannick Naudet, Max Chevalier
Recommandeurs et diversité : Exploitation de la longue traîne et diversité des listes de recommandations
Chartron, Ghislaine; Saleh, Imad; Kembellec, Gérald. Les systèmes de recommandation, 4, ISTE editions, pp.85–104, 2014
Muriel Foulonneau, Valentin Groues, Yannick Naudet, Max Chevalier
Recommender Systems and Diversity: Taking Advantage of the Long Tail and the Diversity of Recommendation Lists
Kembellec, Gérald; Chartron, Ghislaine; Saleh, Imad. Recommender Systems, chapter 4, Wiley-ISTE, pp.71–92, 2014, 978-1848217683. ⟨10.1002/9781119054252⟩
Alexandre Dey, Benjamin Costé, Éric Totel, Adrien Bécue, Elkin Aguas, Anthony Lambert, Gregory Blanc, Hervé Debar, Yannick Chevalier, Amine Medad, Baptiste Gregorutti, Edouard Genetay, Alexandre Peter Nguema, Grégoire Menguy, Sébastien Bardin, Richard Bonichon, Cauim de de Souza Lima, Rémy Charayron, Thierry Lefèvre, Nathalie Bartoli, Joseph Morlier, Zakaria Chihani, Bruno Carron, Stephan Brunessaux, Léonard Caquot, Tristan Charrier, Badre El Bezzaz Semlali, Oudomsack Pierre Pasquero, Alexis Bazin, Pierre-Elisée Flory, Katarzyna Kapusta, Oana Stan, Vincent Thouvenot, Karel Hynek, Romain Ferrari, Aymen Boudguiga, Renaud Sirdey, Alice Héliou, Thomas Cejka, Daria La Rocca, Martin Zuber, George Vardoulias, Ioannis Papaioannou, Andreas Vekinis, Georgia Papadopoulou, Marc Vincent, Amal El Fallah-Seghrouchni, Vincent Corruble, Narayan Bernardin, Rami Kassab, Frédéric Barbaresco, Karim Tit, Teddy Furon, Mathias Rousset, Louis-Marie Traonouez, Pierre-Yves Lagrave, Vincent Vidal, Marie-Caroline Corbineau, Tugdual Ceillier, Aleksei Iancheruk, Ahmed Allali, Julien Rodriguez, Tejas Bhor, Ricardo Garcia, Jean-Eudes Guilhot-Gaudeffroy, Robert Plana
Actes de la conférence CAID 2021 (Conference on Artificial Intelligence for Defense)
CAID 2021 (Conference on Artificial Intelligence for Defense), pp.1-152, 2021