Distance-bounding proof of knowledge to avoid real-time attacks L Bussard, W Bagga Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20 th …, 2005 | 158 | 2005 |
Complex event processor for historic/live/replayed data L Bussard, IJG dos Santos, O Nano, T Tarnavski, J Goldstein, ... US Patent 9,632,846, 2017 | 106 | 2017 |
Trust establishment protocols for communicating devices L Bussard PhD thesis, Eurecom-ENST, 2004 | 83 | 2004 |
Primelife policy language CA Ardagna, L Bussard, S De Capitani di Vimercati, G Neven, E Pedrini, ... W3C workshop on access control application scenarios: 17-18 november 2009 …, 2009 | 79 | 2009 |
S4P: A generic language for specifying privacy preferences and policies MY Becker, A Malkis, L Bussard Microsoft Research 167, 2010 | 54 | 2010 |
Downstream usage control L Bussard, G Neven, FS Preiss 2010 IEEE International Symposium on Policies for Distributed Systems and …, 2010 | 49 | 2010 |
A practical generic privacy language MY Becker, A Malkis, L Bussard International Conference on Information Systems Security, 125-139, 2010 | 46 | 2010 |
Ad-hoc trust establishment using visual verification L Bussard, U Müller, A Gefflaut US Patent 8,621,210, 2013 | 44 | 2013 |
Ppl engine: A symmetric architecture for privacy policy handling S Trabelsi, A Njeh, L Bussard, G Neven W3C Workshop on Privacy and data usage control 4 (5), 2010 | 40 | 2010 |
A framework for privacy preferences and data-handling policies MY Becker, A Malkis, L Bussard Microsoft Research Cambridge Technical Report, MSR-TR-2009-128, 2009 | 38 | 2009 |
Data handling preferences and policies within security policy assertion language L Bussard, MY Becker US Patent App. 12/336,349, 2010 | 36 | 2010 |
Delegation metasystem for composite services L Bussard, A Wojtas US Patent 8,601,482, 2013 | 35 | 2013 |
Delegation of access rights in multi-domain service compositions L Bussard, A Nano, U Pinsdorf Identity in the Information Society 2 (2), 137-154, 2009 | 35 | 2009 |
Authentication in ubiquitous computing L Bussard, Y Roudier Proceedings of Ubicomp, 2002 | 35 | 2002 |
Untraceable secret credentials: Trust establishment with privacy L Bussard, Y Roudier, R Molva IEEE Annual Conference on Pervasive Computing and Communications Workshops …, 2004 | 32 | 2004 |
Embedding distance-bounding protocols within intuitive interactions L Bussard, Y Roudier Security in Pervasive Computing: First International Conference, Boppard …, 2004 | 30 | 2004 |
Towards a pragmatic composition model of CORBA services based on AspectJ L Bussard Workshop on Aspects and Dimensions of Concern at ECOOP, 2000 | 29 | 2000 |
Storing Composite Services on Untrusted Hosts L Bussard, U Pinsdorf, A Nano, J Claessens, C Geuer-Pollmann US Patent App. 12/238,917, 2010 | 28 | 2010 |
Extending Tamper-Proof Hardware Security to Untrusted Execution Environments. S Loureiro, L Bussard, Y Roudier CARDIS 2, 12-12, 2002 | 26 | 2002 |
Ad-hoc creation of group based on contextual information L Bussard, A Gefflaut US Patent 7,673,330, 2010 | 25 | 2010 |