Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vérification automatique pour l'exécution sécurisée de composants Java., and . L'OBJET, 14 (4): 103-127 (2008)Middleware benchmarking: approaches, results, experiences., , , , , , , , , and 1 other author(s). Concurr. Comput. Pract. Exp., 17 (15): 1799-1805 (2005)Semantic Service Substitution in Pervasive Environments., , and . CoRR, (2015)Java Components Vulnerabilities - An Experimental Classification Targeted at the OSGi Platform, and . CoRR, (2007)Supporting the Secure Deployment of OSGi Bundles., and . WOWMOM, page 1-6. IEEE Computer Society, (2007)Chasing Data in the Intermediation Era: Economy and Security at Stake., , and . IEEE Secur. Priv., 14 (3): 22-31 (2016)Un système de gestion d'architextes., and . INFORSID, page 305-325. (1998)Dploiement adaptatif dapplications orientes services sur environnements contraints., , , and . Technique et Science Informatiques, 30 (1): 59-91 (2011)Daisy: Practical Anomaly Detection in large BGP/MPLS and BGP/SRv6 VPN Networks., , , , , and . ANRW, page 8-14. ACM, (2023)I-JVM: a Java Virtual Machine for component isolation in OSGi., , , , , and . DSN, page 544-553. IEEE Computer Society, (2009)