• Publications
  • Influence
A dynamic reconfiguration service for CORBA
Providing software qualities such as availability, adaptability and maintainability to long-running distributed applications forms a major challenge for the configuration management of a softwareExpand
  • 125
  • 6
Achieving middleware customization in a configuration-based development environment: experience with the Aster prototype
Middleware configurations provide a means to make accessible a wide range of applications on a (possibly large) distributed heterogeneous platform. However, as new application areas appear,Expand
  • 56
  • 3
ELVIS: Extensible Log VISualization
In this article, we propose ELVIS, a security-oriented log visualization tool that allows security experts to visually explore numerous types of log files through relevant representations. When a logExpand
  • 26
  • 3
Trust-based security for the OLSR routing protocol
Abstract The trust is always present implicitly in the protocols based on cooperation, in particular, between the entities involved in routing operations in Ad hoc networks. Indeed, as the wirelessExpand
  • 52
  • 2
Dealing with Multi-policy Security in Large Open Distributed Systems
From the security point of view, one challenge for today’s distributed architectures is to support interoperation between applications relying on different possibly inconsistent security policies.
  • 45
  • 2
Trust-Based Countermeasures for Securing OLSR Protocol
In this paper, we present two measures to counter attacks against OLSR: prevention that solves some protocol's vulnerabilities, and countermeasures that treat misbehavior and inconsistency concernedExpand
  • 23
  • 2
Aster: a framework for sound customization of distributed runtime systems
  • V. Issarny, C. Bidan
  • Computer Science
  • Proceedings of 16th International Conference on…
  • 27 May 1996
This paper introduces the Aster distributed configuration-based-programming system that is aimed at easing the development of emerging distributed applications having quality of service requirements.Expand
  • 46
  • 1
Autonomic trust reasoning enables misbehavior detection in OLSR
Ad Hoc networks do not rely on any centralized administration or fixed network infrastructure and their nodes establish a routing structure in a self-organized way, by means of an ad hoc routingExpand
  • 42
  • 1
Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol
Trust is one of the basic assumptions that we use in every day life. In ad hoc networks, routing protocols implement trust implicitly between the nodes of the network. Unfortunately, the implicitExpand
  • 28
  • 1
Secure long term communities in ad hoc networks
Until recently, ad hoc networks were mainly used for military and security-sensitive applications. Nowadays, they could also be used in SOHO (Small Office / Home Office) or home networks. In suchExpand
  • 26
  • 1