Bibliography
Major publications by the team in recent years
- [1]
- F. Besson, T. Jensen, D. Le Métayer, T. Thorn.
Model checking security properties of control flow graphs, in: Journal of Computer Security, 2001, vol. 9. - [2]
- P. Fradet, D. Le Métayer.
Shape types, in: ACM Symposium on Principles of Programming Languages (POPL'97), ACM, 1997. - [3]
- T. Jensen, D. Le Métayer, T. Thorn.
Verification of control-flow based security properties, in: IEEE Symposium on Security and Privacy, IEEE, 1999. - [4]
- D. Le Métayer.
Describing software architecture styles using graph grammars, in: IEEE Transactions on Software Engineering, 1998, vol. 24, no 7.
Publications of the year
Articles in International Peer-Reviewed Journal
- [5]
- T. Allard, N. Anciaux, L. Bouganim, P. Pucheral, R. Thion.
Seamless Access to Healthcare Folders with Strong Privacy Guarantees, in: Journal of Healthcare Delivery Reform Initiatives, 2009, to appear. - [6]
- D. Le Métayer, S. Monteleone.
Automated consent through privacy agents : legal requirements and technical architecture, in: The Computer Law and Security Review, Elsevier, 2009, vol. 25(2). - [7]
- G. Piolle, Y. Demazeau.
Representing privacy regulations with deontico-temporal operators, in: Web Intelligence and Agent Systems: an International Journal (WIAS), 2009, to appear.
Articles in National Peer-Reviewed Journal
- [8]
- J. Le Clainche.
Chronique du droit de l'internet, in: JCP, Semaine juridique, 2009. - [9]
- D. Le Métayer, S. Monteleone, J. Moret-Bailly.
Les ressources du droit alliées aux moyens de la technologie : application à la protection des données personnelles, in: Revue Lamy Droit de l'Immatériel (RLDI), 2009, vol. 51.
Invited Conferences
- [10]
- T. Allard, N. Anciaux, L. Bouganim, P. Pucheral, R. Thion.
Concilier ubiquité et sécurité des données médicales, in: Les technologies au service des droits, opportunités, défis, limites, Bruylant, 2009, to appear. - [11]
- D. Le Métayer.
Privacy by design: a matter of choice, in: Conference on Computers, Privacy and Data Protection (CPDP), Springer Verlag, 2009, to appear.
International Peer-Reviewed Conference/Proceedings
- [12]
- C. Alleaume, C. Bidan, V.-L. Benabou, D. Beras, N. Crepeau, S. Frenot, G. Goessler, R. Hardouin, L. Mé, J. Le Clainche, D. Le Métayer, M. Maarek, E. Mazza, M.-L. Potet, S. Steer, V. Viet Triem Tong.
Liability in software engineering: overview of the LISE approach and application on a case study, in: International Conference on Software Engineering, ICSE'2010 (conference version of the research report with same title), ACM/IEEE, 2009, to appear. - [13]
- R. Thion, S. Coulondre.
Data Dependencies for Access Control Policies, in: International Workshop on Logic in Databases (LID'09), RR 127, Roskilde University, 2009.
Scientific Books (or Scientific Book chapters)
- [14]
- T. Allard, N. Anciaux, L. Bouganim, P. Pucheral, R. Thion.
Trustworthiness of Pervasive Healthcare Folders, in: Pervasive and Smart Technologies for Healthcare: Ubiquitous Methodologies and Tools, IGI Global Publishing, 2009, to appear.
Books or Proceedings Editing
- [15]
- D. Le Métayer (editor)
Les technologies au service des droits, opportunités, défis, limites, Bruylant, 2009, to appear.
Internal Reports
- [16]
- C. Alleaume, C. Bidan, V.-L. Benabou, D. Beras, N. Crepeau, S. Frenot, G. Goessler, R. Hardouin, L. Mé, J. Le Clainche, D. Le Métayer, M. Maarek, E. Mazza, M.-L. Potet, S. Steer, V. Viet Triem Tong.
Liability in software engineering: overview of the LISE approach and application on a case study, INRIA, 2009, no RR-7148
http://hal.inria.fr/inria-00440437/en/, Research Report.
References in notes
- [17]
- L. L. Fuller.
The morality of law, Yale University Press, 1964. - [18]
- D. Le Métayer, A. Rouvroy.
STIC et droit : défis, conflits et complémentarités, in: Interstices, November 2008
http://interstices.info/jcms/c_34521/stic-et-droit-defis-conflits-et-complementarites. - [19]
- L. Lessig.
The future of ideas: the fate of the commons in a connected world, Random House, 2001. - [20]
- L. Lessig.
Code and other laws of cyberspace, Version 2.0, Basic Books, 2007. - [21]
- Y. Poullet.
The Directive 95/46/EC: ten years after, in: Computer Law and Security Report, 2006, vol. 22, p. 206–217. - [22]
- J. Reidenberg.
Lex informatica: the formulation of information policy rules through technology, in: Texas Law Review, 1998, vol. 76, no 3. - [23]
- A. Rouvroy.
Privacy, data protection and the unprecedented challenges of ambient intelligence, in: Studies in Ethics, Law and Technology, Berkley Electronic Press, 2008.