Team LICIT

Members
Overall Objectives
Scientific Foundations
Application Domains
New Results
Contracts and Grants with Industry
Other Grants and Activities
Dissemination
Bibliography

Bibliography

Major publications by the team in recent years

[1]
F. Besson, T. Jensen, D. Le Métayer, T. Thorn.
Model checking security properties of control flow graphs, in: Journal of Computer Security, 2001, vol. 9.
[2]
P. Fradet, D. Le Métayer.
Shape types, in: ACM Symposium on Principles of Programming Languages (POPL'97), ACM, 1997.
[3]
T. Jensen, D. Le Métayer, T. Thorn.
Verification of control-flow based security properties, in: IEEE Symposium on Security and Privacy, IEEE, 1999.
[4]
D. Le Métayer.
Describing software architecture styles using graph grammars, in: IEEE Transactions on Software Engineering, 1998, vol. 24, no 7.

Publications of the year

Articles in International Peer-Reviewed Journal

[5]
T. Allard, N. Anciaux, L. Bouganim, P. Pucheral, R. Thion.
Seamless Access to Healthcare Folders with Strong Privacy Guarantees, in: Journal of Healthcare Delivery Reform Initiatives, 2009, to appear.
[6]
D. Le Métayer, S. Monteleone.
Automated consent through privacy agents : legal requirements and technical architecture, in: The Computer Law and Security Review, Elsevier, 2009, vol. 25(2).
[7]
G. Piolle, Y. Demazeau.
Representing privacy regulations with deontico-temporal operators, in: Web Intelligence and Agent Systems: an International Journal (WIAS), 2009, to appear.

Articles in National Peer-Reviewed Journal

[8]
J. Le Clainche.
Chronique du droit de l'internet, in: JCP, Semaine juridique, 2009.
[9]
D. Le Métayer, S. Monteleone, J. Moret-Bailly.
Les ressources du droit alliées aux moyens de la technologie : application à la protection des données personnelles, in: Revue Lamy Droit de l'Immatériel (RLDI), 2009, vol. 51.

Invited Conferences

[10]
T. Allard, N. Anciaux, L. Bouganim, P. Pucheral, R. Thion.
Concilier ubiquité et sécurité des données médicales, in: Les technologies au service des droits, opportunités, défis, limites, Bruylant, 2009, to appear.
[11]
D. Le Métayer.
Privacy by design: a matter of choice, in: Conference on Computers, Privacy and Data Protection (CPDP), Springer Verlag, 2009, to appear.

International Peer-Reviewed Conference/Proceedings

[12]
C. Alleaume, C. Bidan, V.-L. Benabou, D. Beras, N. Crepeau, S. Frenot, G. Goessler, R. Hardouin, L. , J. Le Clainche, D. Le Métayer, M. Maarek, E. Mazza, M.-L. Potet, S. Steer, V. Viet Triem Tong.
Liability in software engineering: overview of the LISE approach and application on a case study, in: International Conference on Software Engineering, ICSE'2010 (conference version of the research report with same title), ACM/IEEE, 2009, to appear.
[13]
R. Thion, S. Coulondre.
Data Dependencies for Access Control Policies, in: International Workshop on Logic in Databases (LID'09), RR 127, Roskilde University, 2009.

Scientific Books (or Scientific Book chapters)

[14]
T. Allard, N. Anciaux, L. Bouganim, P. Pucheral, R. Thion.
Trustworthiness of Pervasive Healthcare Folders, in: Pervasive and Smart Technologies for Healthcare: Ubiquitous Methodologies and Tools, IGI Global Publishing, 2009, to appear.

Books or Proceedings Editing

[15]
D. Le Métayer (editor)
Les technologies au service des droits, opportunités, défis, limites, Bruylant, 2009, to appear.

Internal Reports

[16]
C. Alleaume, C. Bidan, V.-L. Benabou, D. Beras, N. Crepeau, S. Frenot, G. Goessler, R. Hardouin, L. , J. Le Clainche, D. Le Métayer, M. Maarek, E. Mazza, M.-L. Potet, S. Steer, V. Viet Triem Tong.
Liability in software engineering: overview of the LISE approach and application on a case study, INRIA, 2009, no RR-7148
http://hal.inria.fr/inria-00440437/en/, Research Report.

References in notes

[17]
L. L. Fuller.
The morality of law, Yale University Press, 1964.
[18]
D. Le Métayer, A. Rouvroy.
STIC et droit : défis, conflits et complémentarités, in: Interstices, November 2008
http://interstices.info/jcms/c_34521/stic-et-droit-defis-conflits-et-complementarites.
[19]
L. Lessig.
The future of ideas: the fate of the commons in a connected world, Random House, 2001.
[20]
L. Lessig.
Code and other laws of cyberspace, Version 2.0, Basic Books, 2007.
[21]
Y. Poullet.
The Directive 95/46/EC: ten years after, in: Computer Law and Security Report, 2006, vol. 22, p. 206–217.
[22]
J. Reidenberg.
Lex informatica: the formulation of information policy rules through technology, in: Texas Law Review, 1998, vol. 76, no 3.
[23]
A. Rouvroy.
Privacy, data protection and the unprecedented challenges of ambient intelligence, in: Studies in Ethics, Law and Technology, Berkley Electronic Press, 2008.

previous
next