Team Adept

Members
Overall Objectives
Scientific Foundations
Application Domains
Software
New Results
Other Grants and Activities
Dissemination
Bibliography

Bibliography

Major publications by the team in recent years

[1]
E. Aïmeur, G. Brassard, S. Gambs.
Quantum clustering algorithms, in: Proc. of the 24th international conference on Machine learning (ICML), Corvalis, Oregon, Z. Ghahramani (editor), ACM International Conference Proceeding Series, ACM, June 2007, vol. 227, p. 1-8.
[2]
E. Anceaume, A. Datta, M. Gradinariu, G. Simon.
Publish/Subscribe Scheme for Mobile Networks, in: Proc. of the 2nd ACM International Workshop on Principles of Mobile Computing (POMC), Toulouse, France, October 2002, p. 74–81.
[3]
E. Anceaume, M. Hurfin, P. Raipin Parvédy.
An Efficient Solution to the k-set Agreement Problem, in: Proc. of the 4th European Dependable Computing Conference (EDCC), Toulouse, France, LNCS 2485, Springer Verlag, October 2002, p. 62–78.
[4]
E. Anceaume, C. Delporte-Gallet, H. Fauconnier, M. Hurfin, G. Le Lann.
Designing Modular Services in the Scattered Byzantine Failure Model, in: Proc. of the 3rd International Symposium on Parallel and Distributed Computing (ISPDC), Cork, Ireland, July 2004, p. 262–269.
[5]
F. Brasileiro, F. Greve, M. Hurfin, J.-P. Le Narzul, F. Tronel.
Eva: an Event-Based Framework for Developing Specialised Communication Protocols, in: Proc. of the 1st IEEE International Symposium on Network Computing and Applications (NCA), Cambridge, MA, February 2002.
[6]
G. Brassard, A. Broadbent, J. Fitzsimons, S. Gambs, A. Tapp.
Anonymous Quantum Communication, in: Proc. of the 13th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), Kuching, Malaysia, LNCS 4833, Springer Verlag, December 2007, p. 460-473.
[7]
S. Gambs, B. Kégl, E. Aïmeur.
Privacy-preserving boosting, in: Data Mining and Knowledge Discovery, 2007, vol. 14, no 1, p. 131-170.
[8]
J.-M. Helary, M. Hurfin, A. Mostéfaoui, M. Raynal, F. Tronel.
Computing Global Functions in Asynchronous Distributed Systems with Process Crashes, in: Proc. of the 20th International Conference on Distributed Computing Systems (ICDCS), April 2000, p. 584–591, Best paper award.
[9]
M. Hurfin, A. Mostéfaoui, M. Raynal.
A Versatile Family of Consensus Protocols Based on Chandra-Toueg's Unreliable Failure Detectors, in: IEEE Transactions on Computers, April 2002, vol. 51, no 4, p. 395–408.
[10]
Y. Wang, E. Anceaume, F. Brasileiro, F. Greve, M. Hurfin.
Solving the Group Priority Inversion Problem in a Timed Asynchronous System, in: IEEE Transactions on Computers. Special Issue on Asynchronous Real-Time Distributed Systems, August 2002, vol. 51, no 8, p. 900–915.

Publications of the year

Articles in National Peer-Reviewed Journal

[11]
Y. Deswarte, S. Gambs.
Protection de la vie privée: principes et technologies, in: Cahiers du CRID (Centre de Recherches Informatique et Droit), January 2010, vol. 32, To appear.

International Peer-Reviewed Conference/Proceedings

[12]
E. Aïmeur, S. Gambs, A. Ho.
Towards a Privacy-enhanced Social Networking Site, in: Proc. of the 5th International Conference on Availability, Reliability and Security (ARES 2010), Krakow, Poland, February 2010.
[13]
E. Anceaume, F. Brasileiro, R. Ludinard, B. Sericola, F. Tronel.
Brief Announcement: Induced Churn to Face Adversarial Behavior in Peer-to-Peer Systems, in: Proc. of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2009), Lyon, France, LNCS 5873, Springer Verlag, November 2009, p. 773–774
http://hal.archives-ouvertes.fr/hal-00420559/en/.
[14]
E. Anceaume, R. Ludinard, B. Sericola, F. Tronel, F. Brasileiro.
Analytical Study of Adversarial Strategies in Cluster-based Overlays, in: Proc of the 2nd International Workshop on Reliability, Availability, and Security (WRAS 2009), Hiroshima, Japan, December 2009, 6 pages p.
[15]
Y. Deswarte, S. Gambs.
Towards a Privacy-Preserving National Identity Card, in: Proc. of the 4tn International Workshop on Data Privacy Management (DPM 2009) in conjunction with ESORICS'09, Saint Malo, France, LNCS 5939, Springer Verlag, September 2009, p. 30–43.
[16]
S. Gambs, M.-O. Killijian, M. Nunez del Prado.
GEPETO: a GEoPrivacy-Enhancing TOolkit, in: Proc. of the International Workshop on Advances in Mobile Computing and Applications: Security, Privacy and Trust, held in conjunction with International Conference on Advanced Information Networking and Applications (AINA 2010), Perth, Australia, 2010.
[17]
F. Majorczyk, J.-C. Demay.
Automated Instruction-Set Randomization for Web Applications in Diversified Redundant Systems, in: Proc. of the 4th IEEE International Conference on Availability, Reliability and Security, (ARES - WAIS 2009), Fukuoka, Japan, March 2009, p. 978-983.
[18]
H. Ribeiro, E. Anceaume.
DataCube: a P2P persistent Storage Architecture based on Hybrid Redundancy Schema, in: Proc. of the 18th Euromicro International Conference on Parallel, Distributed and Network-Based Computing (PDP 2010), Pisa, Italy, 2010, 5 pages p, Short paper.
[19]
H. Ribeiro, E. Anceaume.
Exploiting Rateless Coding in Structured Overlays to Achieve Data Persistence, in: Proc. of the International Conference on Advanced Information Networking and Applications (AINA 2010), Perth, Australia, 2010.

Internal Reports

[20]
M. Hurfin, I. Moise.
A Multiple Integrated Consensus Protocol based on Paxos, FastPaxos, and Fast Paxos, IRISA, 2009, no 1941, 25 pages.

References in notes

[21]
E. Anceaume, F. Brasileiro, R. Ludinard, A. Ravoaja.
PeerCube: an Hypercube-based P2P Overlay Robust against Collusion and Churn, in: Proceedings of the International Conference on Self- Autonomous and Self-Organizing Systems (SASO), 2008.
[22]
E. Anceaume, A. Ravoaja.
Incentive-based Robust Reputation Mechanism for P2P Services, in: Proc. of the 10th International Conference On Principles Of Distributed Systems (OPODIS 2006), Bordeaux, France, December 2006.
[23]
B. Awerbuch, C. Scheideler.
Towards a Scalable and Robust DHT, in: Proc. of the ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), 2006.
[24]
B. Awerbuch, B. Patt-Shamir, D. Peleg, Mark R. Tuttle.
Collaboration of untrusting peers with changing interests, in: ACM Conference on Electronic Commerce, 2004.
[25]
R. Boichat, P. Dutta, S. Frolund, R. Guerraoui.
Deconstructing Paxos, in: ACM SIGACT News, March 2003, vol. 34, no 1, p. 47–67.
[26]
Tushar Deepak. Chandra, S. Toueg.
Unreliable failure detectors for reliable distributed systems, in: Journal of the ACM, 1996, vol. 43, no 2, p. 225–267.
[27]
Z. Despotovic, K. Aberer.
P2P reputation management: Probabilistic estimation vs social networks, in: Computer Networks, 2006, vol. 50, no 4, p. 485–500.
[28]
Y. Deswarte, L. Blain, Jean-Charles. Fabre.
Intrusion Tolerance in Distributed Computing Systems, in: Proceedings of the IEEE Symposium on Research in Security and Privacy, May 1991, p. 110-122
ftp://ftp.laas.fr/pub/Publications/1990/90373.ps.
[29]
M. J. Fischer, N. A. Lynch, M. S. Paterson.
Impossibility of distributed consensus with one faulty process, in: J. ACM, 1985, vol. 32, no 2, p. 374–382.
[30]
V. Hadzilacos, S. Toueg.
Fault-tolerant broadcasts and related problems, in: Distributed systems (2nd Ed.), 1993, p. 97–145.
[31]
M. N. Krohn, M. J. Freedman, D. Mazieres.
On-the-fly verification of rateless erasure codes for efficient content distribution, in: Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on, 2004.
[32]
L. Lamport.
Paxos Made Simple, in: ACM SIGACT News, December 2001, vol. 32, no 4, p. 51–58.
[33]
L. Lamport.
Fast Paxos, in: Distributed Computing, 2006, vol. 19, no 2, p. 79–103.
[34]
L. Lamport.
The part-time parliament, in: ACM Transaction on Computer Systems, May 1998, vol. 16, no 2, p. 133–169.
[35]
B. Lampson.
The ABCDs of Paxos, in: Proc. of the 20th Annual ACM Symposium on Principles of Distributed Computing, 2001.
[36]
Jean-Philippe. Martin, L. Alvisi.
Fast Byzantine consensus, in: Proc. of the Int. Conference on Dependable Systems and Networks, June 2005, p. 402–411.
[37]
D. Powell, G. Bonn, D. Seaton, P. Verissimo, F. Waeselynck.
The Delta-4 Approach to Dependability in Open Distributed Computing Systems, in: Proceedings of Twenty-Fifth International Symposium on Fault-Tolerant Computing, IEEE, 27-30 june 1995, 56 p.
[38]
D. Powell.
Group Communication, in: Communications of the ACM, 1996, vol. 39, no 4, p. 50–53.
[39]
A. Ravoaja, E. Anceaume.
Storm: A Secure Overlay for P2P Reputation Management, in: Proceedings of the IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007), 2007.
[40]
R. Rodrigues, B. Liskov.
High Availability in DHTs: Erasure Coding vs. Replication, in: Proceedings of the International Workshop on Peer-to- Peer Systems (IPTPS), 2005.
[41]
A. Saidane, Y. Deswarte, V. Nicomette.
An Intrusion Tolerant Architecture for Dynamic Content Internet Servers, in: Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems (SSRS-03), Fairfax, VA, P. Liu, P. Pal (editors), ACM Press, October 2003, p. 110-114.
[42]
E. Sit, R. Morris.
Security Considerations for Peer-to-Peer Distributed Hash Tables, in: Proc. for the Int'l Workshop on Peer-to-Peer Systems (IPTPS), 2002.
[43]
The Appia project.
APPIA Communication Framework
http://appia.di.fc.ul.pt.
[44]
The Samoa project.
Samoa Project
http://lsrwww.epfl.ch/page13488.html.
[45]
E. Union.
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, in: Official Journal, 11 1995, vol. L 281, p. 0031-0050
http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:EN:HTML.
[46]
R. Vitenberg, I. Keidar, Gregory V. Chockler, D. Dolev.
Group Communication Specifications: A Comprehensive Study., in: ACM Computing Surveys, September 2001, vol. 33, no 4.
[47]
J. Yin, Jean-Philippe. Martin, A. Venkataramani, L. Alvisi, M. Dahlin.
Separating Agreement from Execution for Byzantine Fault Tolerant Services, in: Proceedings of the 19th ACM Symp. on Operating Systems Principles (SOSP-2003), 2003.

previous
next