Publications
Books and Proceedings editing
- K. Boudaoud, L. Me (editors). SAR-SSI 2009, Publibook Editions, 2009
- K. Boudaoud, N. Nobelis, T. Nebe (editors). Proceedings of the 13th
Annual Workshop of HP Openview University Association, Hosted by University
of Nice at Côte d'Azur May 21 - 24, 2006 (HPOVUA'2006). HP-OVUA,
Infonomics-Consulting, Stuttgart,Germany, Germany, May 21-24, 2006
WG Reports
- K. Boudaoud, Ch. Cianchi, V. Lefebvre, B. Rouchouze. eID and Security
Glossary (in French), Identity WG, Pole SCS, Sophia Antipolis, 2012
(provided to the French Minister of Digital Economy and used by the ACN
(Alliance pour la Confiance Numérique) for the Electronic Identity
Roadmap.
Invited talks
- K. Boudaoud. International Cooperation for Trust. BIC Annual Forum 2012,
Lisboa, Portugal, 27th November, 2012
- K. Boudaoud. User Centricity. BIC Workshop on the cross domain
coordination of International Cooperation and technical themes in
Trustworthy ICT and INCO, Brussels, Belgium, June, 21-22, 2012
- K. Boudaoud. Human-oriented and Usable Security. 1st BIC Annual Forum,
Brussels, Belgium, 29th November, 2011
- K. Boudaoud. A Human-oriented Vision to Security Management. Workshop
"Network and Information Security: Research Ideas", European Commission
Emerging Technologies and infrastructures - Trust and Security, Brussels,
Belgium, September, 22, 2011.
- K. Boudaoud. Towards a Human-oriented Approach to Security Management.
Institute of Electronics, Communications and Information Technology (ECIT),
Belfast, North Ireland, June, 3, 2011.
- K. Boudaoud. A Human-oriented Vision for Designing Secure Software.
Waterford Institute of Technology (WIT), Waterford, Ireland, May, 31,
2011.
- K. Boudaoud. A Component-based Approach for Designing Secure
Communication Protocols and Software Applications. HPLabs- Singapore,
Singapore, April, 19, 2011.
- K. Boudaoud. A User-centric Approach for Security Management. Architects
of Secure Networks (ASIGE10), NATO Science for Peace and Security
Program,Genova, Italy, May, 17-21, 2010.
- K. Boudaoud. Security Management of Wireless Networks. Winter School
DNAC'2004, December 2004.
Journal, Conference and Workshop papers
2014
- A. Gyrard, C. Bonnet, K. Boudaoud. Enrich Machine-to-Machine Data with
Semantic Web Technologies for Cross-Domain Applications. In Proceedings of
the IEEE World Forum on Internet of Things (WF-IoT), Seoul, Korea, March
6-8, 2014.
2013
- D. Popa, K. Boudaoud, M. Cremene, M. Borda. Integration of Secure Mobile-
Cloud Framework into a mobile cloud application scenario. In Scientific
Bulletin of the Politechnica University of Timisoara, Transactions on
Electronics and Communications, Tom 58(72), Fascicola 1, 2013.
- D. Popa, K. Boudaoud, M. Borda. Secure Mobile-Cloud Framework –
Implementation on the Mobile Device. In Acta Tehnica Napocensis,
Electronics and Communications, Volume 54, Number 4, 2013.
- A. Gyrard, C. Bonnet, K. Boudaoud. STAC: Un outil pour vous aider à
sécuriser vos applications. In Proceedings of the 8th joint Conference on
Security in Network Architectures and Information Systems (SAR-SSI), Mont
De Marsan, France, September 16-18, 2013
- D. Popa, K. Boudaoud, M. Cremene, M. Borda. Mobile Cloud Applications and
Traceability. RoEduNet 12th International Conference: Networking in
Education and Research, Mircea cel Batran Naval Academy, Constanta,
Roumania, September 26- 28, 2013.
- F. Batard, K. Boudaoud, M. Riveill. Securing Mobile Mashups with SCCM. In
Proceedings of the 12th IEEE/IFIP International Symposium on Trusted
Computing and Communications(TrustCom'2013), Melbourne, Australia, July 16-
18, 2013.
- D. Popa, K. Boudaoud, M. Cremene, M. Borda. A System to Analyze the
User's Security Options for Mobile Cloud Applications. 6th International
Conference on Security for Information Technology and Communication.
Bucharest, Romania, June 25-26, 2013
- A. Gyrard, C. Bonnet, K. Boudaoud. The STAC (Security Toolbox: Attacks
& Countermeasures) Ontology. In Proceedings of the 22nd International
World Wide Web Conference (WWW'2013), Rio De Janeiro, Brazil, May 13 - 17 ,
2013.
- D. Popa, K. Boudaoud, M. Cremene, M. Borda. A Security Framework for
Mobile Cloud Applications. RoEduNet 11th International Conference:
Networking in Education and Research, Sinaia, Roumania, January 17- 19,
2013.
2012
- D. Popa, K. Boudaoud, M. Cremene, M. Borda. Overview on Mobile Cloud
Computing Security Issues. In Scientific Bulletin of the Politechnica
University of Timisoara, Transactions on Electronics and Communications,
Tom 57(71), Fascicola 1-2, 2012.
- C. Delettre, K. Boudaoud, Michel Riveill. Cloud Computing, Sécurité et
Dissimulation de Données. In Proceedings of the 7th Conference On Security
in Network Architecture and Information Systems (SARSSI'12), Cabourg,
France, May 22-25, 2012.
- N. Nobelis, K. Boudaoud, C. Delettre, M. Riveill. Designing Security
Properties-centric Communication Protocols using a Component-based
Approach. International Journal of Distributd Systems and Technologies
(IJDST)- Special Issue on Security, Privacy and Trust, JDST 3(1), v.3 n.1,
p.1-16, January, 2012.
2011
- C. Delettre, K. Boudaoud, M. Riveill. Cloud Computing, Security and Data
Concealment. The Sixteenth IEEE Symposium on Computers and Communications
(ISCC'11), Kerkyra (Corfu), Greece, June 28 - July 1, 2011
- C. Pita, K. Boudaoud, M. Riveill. A Security-Property-Based Approach for
Lowering Power Consumption of Secure Mobile. In Proceedings of 7th
International Wireless Communications and Mobile Computing
Conference(IWCMC'2011), Istambul, Turkey, July 5-8, 2011
- M. Kamel, K. Boudaoud, S. Resondry, M. Riveill. A Low-Energy Consuming
and User-centric Security Management Architecture Adapted to Mobile
Environments. In Proceedings of the 12th IFIP/IEEE International Symposium
on Integrated Network Management (IM'2011), Dublin, Ireland, May, 23 - 27,
2011
- F. Batard, K. Boudaoud, M. Riveill. A Middleware for Securing Mobile
Mashups. In Proceedings of the 20th International World Wide Web Conference
(WWW'2011), Hyderabad, India, March 28 - April 1, 2011.
- N. Nobelis, K. Boudaoud, C. Delettre, M. Riveill. A Component-Based
Approach to Security Protocol Design. In Proceedings of the 7th
International Symposium on Frontiers of Information Systems and Network
Applications (FINA'2011) - IEEE AINA 2011, Biopolis, Singapore, March,
22-25, 2011.
2010
- M. Kamel, K. Boudaoud, S. Lequeux, M. Riveill. Designing security
protocols adapted to the constraints of mobile environments. In Proceedings
of the Sixth IEEE/IFIP International Symposium on Trusted Computing and
Communications (TrustCom'2010), Hong Kong, China, December, 11-13, 2010
- M. Kamel, K. Boudaoud, M. Riveill. A low-energy consuming and
component-based security management architecture for mobile devices. In
Proceedings of the 2010 International Conference on Security and Management
(SAM 2010), Las Vegas, USA, July, 12-15, 2010
- K. Boudaoud, N. Nobelis, M. Kamel, M. Riveill. ADEPT: A User-centric
Architecture for Security Management of Electronic Docment Transfer. In
Proceedings of ASIGE10 - Architects of Secure Networks, Genova, Italy, May,
17-21, 2010. Invited Paper.
- F. Batard, K. Boudaoud, M. Kamel. Web 2.0 Security: State of the Art. In
Proceedings of the 5th Conference On Security in Network Architecture and
Information Systems (SARSSI), Rocquebrune Cap-Martin, French Riviera,
France, May 18-21 2010. Tutorial
2008
- N. Nobelis, K. Boudaoud, M. Riveill. Security Components for Secure
Electronic Documents Transfers. In Proceedings of the 15th Annual Workshop
HP Software University Association, Hosted by Al Akhawayn University in
Ifrane, June 22 - 25, 2008 (HPSUA'2008), HPSUA, Infonomics-Consulting,
Stuttgart,Germany, Marrakech - Morocco, June 22-25, 2008
- K. Boudaoud, F. Leborgne. Towards an Efficient Implementation of
Traceback Mechanisms in Autonomous Systems. In Proceedings of the IEEE/IFIP
Network Operations & Management Symposium - Pervasive Management for
Ubiquitous Networks and Services (NOMS'2008), IEEE- IEEE Comunications
Society- IFIP, IEEE, Salvador de Bahia - Brazil, April 7-11, 2008
2007
- J. Aussibal, P. Borgnat, Y. Labit, G. Dewaele, N. Larrieu, L. Gallon, P.
Owezarski, P. Abry, K. Boudaoud. Base de trace d'anomalies légitimes et
illégitimes. In Proceedings of the 2nd joint Conference on Security in
Network Architectures and Information Systems (SAR-SSI'2007), pages
153-168, Annecy, June 12-15, 2007
2006
- P. Borgnat, N. Larrieu, P. Owezarski, P. Abry, J. Aussibal, L. Gallon, G.
Dewaele, K. Boudaoud, L. Bernaille, A. Scherre, Y. Zhao, Y. Labit.
Détection d’attaques de déni de service par un modèle non gaussien
multi-résolution. In Proceedings of the Colloque Francophone d'Ingénierie
des Protocoles (CFIP), Tozeur, Tunisie, 30 oct. - 3 nov, 2006
- S. Chainay, K. Boudaoud. A Model for Automatic Generation of
Behaviour-based Worm Signature. In Proceedings of the IEEE/ IST Workshop on
Monitoring, Attack Detection and Mitigation (MonAM), IEEE Communications
Society - IST Directorate D - Network and Communication Technologies,
Tuebingen, Germany, September 28-29, 2006
- F. Leborgne, K. Boudaoud. Vers une implementation efficace de mécanismes
de traceback dans les ASs. In Proceedings of the 5th Conference on Security
and Network Architectures (SAR), Seignosse, France, June 6-9, 2006
- N. Nobelis, K. Boudaoud, M. Riveill. A
flexible, policy driven, architecture for electronic documents
exchange. In Proceedings of the 13th HP OpenView University Association
(HPOVUA'06), Nice, France, May 22-24, 2006
- N. Nobelis, K. Boudaoud. Apprentissage
de nouvelles attaques avec un modèle de Case-Based Reasoning. In
Proceedings of the 7ème Colloque francophone de Gestion de Réseaux et de
Services (GRES), LaBRI, Bordeaux, France, May 9-12 2006
- K. Boudaoud, N. Nobelis. Web
Authentication based on a Community of Trust and on a User-centred
Approach. W3C Workshop on Transparency and Usability of Web
Authentication – Toward a More Secure Web, W3C, New York, USA, March
15-16, 2006
2005
- C. Kotchap, R. Rentsch, F. Chometton, K. Boudaoud. AMASIR: An intrusion
detection system based on open technologies. In Proceedings of the 12th HP
Openview University Association Poster Session (HPOVUA), Porto, Portugal,
July 10-13, 2005
- N. Nobelis, K. Boudaoud, M. Riveill, P. Dubois. Decentralized
Access Right Management for Workflow Applications. In Proceedings of
the 12th HP Openview University Association Plenary Workshop (HPOVUA),
Porto, Portugal, July 10-13 , 2005
- N. Nobelis, K. Boudaoud, M. Riveill, G. Chazarin, B. Vallette d'Osia. A
virtual high-interaction Honeypot. InProceedings of the 12th HP
Openview University Association Poster Session (HPOVUA), Porto, Portugal,
July 10-13, 2005
- S. Farraposo, K. Boudaoud, L. Gallon, P. Owezarski. Some Issues raised by
DOS Attacks and the TCP/IP Suite. In Proceedings of the 4th Conference on
Security and Network Architectures (SAR), Batz-sur-mer, France, June 6-10,
2005
2004
- V. Bonnet, K. Boudaoud, M. Gagnebin, J. Harms, T. Schultz. Online dispute
resolution systems as Web Services. Journal of Alternative Dispute (ICFAI),
vol. 3, 2004
- N. Nobelis, K. Boudaoud, M. Riveill. A case based
reasoning model for intrusion detection. In Proceedings of the Seventh
International Symposium on Recent Advances in Intrusion Detection (RAID),
Eurécom Institute, Sophia Antipolis, France, September 15-17, 2004
- M. Rits, K. Boudaoud, M. Riveill. Sécurité des applications construites
à base de composants adaptables. In Proceedings of the Journée
composants, Lille, France, March 17-18, 2004
- K. Boudaoud, M. Riveill. Security Management of Services for
Components-based Applications. In Proceedings of the 11th HP Openview
University Association Plenary Workshop (HPOVUA), Paris, France, June
20-23, 2004
2003
- M. Blay-Fornarino, K. Boudaoud, A.M. Pinna-Déry, C. McCathieNeville. A
flexible approach to semi-automatic accessibility evaluation. In
Proceedings of the Proceedings of the IADIS International Conference
WWW/Internet, pages 1083-1088, IASIS, P. Isaias, N. Karmakar, Algarve,
Portugal, November 2003
- M. Rits, K. Boudaoud, M. Riveill. Security Engineering for Adaptable
Software Components. In Proceedings of the First ACM Workshop on Business
Driven Security Engineering (BIZSEC), Faifax, USA, October 31, 2003
- K. Boudaoud, P. Dubois. NRPP: A new solution to prove the receipt of an
electronic document. In 10th HP Openview University Association Plenary
Workshop (HPOVUA), Geneva, Switzerland, July 2003
2002
- K. Boudaoud, C. McCathieNeville. Policy-driven model for security
management" in Proceedings of the the Network Control and Engineering for
QoS, Security and Mobility with focus on Policy-based Networking IFIP and
IEEE Conference (Net-Con), IEEE - IFIP, Paris, France, October 21-25,
2002
- K. Boudaoud, C. McCathieNeville. An Intelligent Agent-based Model for
Security Management. In Proceedings of the Seventh IEEE Symposium on
Computers and Communications (ISCC), IEEE, Taormina, Italy, July 1-4 ,
2002
- J. Harms, P. Bonnet, K. Boudaoud, M. Gagnebin, T. Schultz. Online Dispute
Resolution Systems as Web Services Internet-based Video Conference. In
Proceedings of the 9th HP Openview University Association Plenary Workshop
(HPOVUA), HP, June 11-13, 2002
- P. Bonnet, K. Boudaoud, J. Harms. Electronic Communication Issues Related
to Online Dispute Resolution Systems. In Proceedings of the Eleventh
International World Wide Web Conference (WWW), W3C, IFIP, Apple, IBM
Research, Honolulu, Hawai, May 7-11, 2002
- K. Boudaoud, C. McCathieNeville. An Information Model for Network
Security Management. In Proceedings of the ISCA 17th International
Conference on Computers and their Applications (CATA), ISCA, San Francisco,
California, USA, April 4-6, 2002
2001
- K. Boudaoud, C. McCathieNeville. Gestion de la sécurité des réseaux :
une nouvelle approche par système multi-agents. In Proceedings of the
4ème Colloque Francophone de Gestion de Réseaux et Services (GRES),
Marrakech, Maroc, December 16-23, 2001
- K. Boudaoud, Z. Guessoum, C. McCathieNeville. An Intelligent Agent-based
Security Management Architecture for Enterprise Networks. In Proceedings of
the 2nd Australian Information Warfare & Security Conference 2001,
Peth, Australia, November 29-30, 2001
- K. Boudaoud, Z. Guessoum, C. McCathieNeville, P. Dubois. Policy-based
Security Management using a Multi-agents System. In Proceedings of the 8th
HP Openview University Association Plenary Workshop (HPOVUA), HP, Berlin,
Germany, June 24-27, 2001
2000
- K. Boudaoud. Un système multi-agents pour la détection d’intrusions.
In Proceedings of the Journées Doctorales Informatique et Réseaux (JDIR),
Paris, France, November 6-8, 2000
- K. Boudaoud, Z. Guessoum. A Multi-agents System for Network Security
Management. In Proceedings of the Sixth IFIP Conference on Intelligence in
Networks (SmartNet), IFIP, Vienna, Austria, September 18-22, 2000
- K. Boudaoud, N. Foukia. An Intelligent Agent Approach for Security
Management. In Proceedings of the 7th HP Openview University Association
Plenary Workshop (HPOVUA), Santorini, Greece, June 12-14, 2000
- K. Boudaoud, H. Labiod, R. Boutaba, Z. Guessoum. Network Security
Management with Intelligent Agents. In Proceedings of the 2000 IEEE/IFIP
Network Operations and Management Symposium (NOMS), IEEE - IFIP, Honolulu,
Hawai, April 10-14, 2000
1999
- H. Labiod, K. Boudaoud, J. Labetoulle. Towards a new approach for
intrusion detection with intelligent agents. Networking and Information
Systems Journal, 2 (5-6), pages 701-739, Hermes Science Publishing
Ltd,1999
- K. Boudaoud, N. Agoulmine, J. N. De Souza. Distributed Network Security
Management Using Intelligent Agents. In Proceedings of the IEEE Latin
American Network Operations and Management Symposium (LANOMS), IEEE, Rio de
Janeiro, Brazil, December 3-5, 1999
- K. Boudaoud, H. Labiod. MA-NID: a Multi-Agent System for Network
Intrusion Detection. In Proceedings of the 8th International Conference on
Intelligent Systems (ICIS), ISCA, Denver, Colorado, June 24-26, 1999
1998
- N. Agoulmine, K. Boudaoud, B. Bhushan. A Mobile Agent –based Security
Architecture for Intranets. In Proceedings of the 2nd World
Multi-conference on Systemics, Cybernetics and Informatics and, the 4th
International Conference on Information Systems Analysis and Synthes (SCI /
ISAS), Orlando, Florida, July 12-16, 1998
Thesis
- K. Boudaoud. Intrusion Detection: A new approach using mult-agent
systems. PhD Thesis, Ecole Polytechnique Federale de Lausanne (EPFL),
December 2000.
Internal reports
- S. Chainay, K. Boudaoud. Study of existing agent-based intrusion
detection systems. May 2006.
- S. Chainay, K. Boudaoud. Study of existing attack learning systems. July
2006.
Supervised PhD's thesis
- N. Nobelis. An Architecture For Secure Transfer of Electronic Document(in
french). PhD's Thesis, University of Nice Sophia Antipolis,
France,December, 2008
Supervised master's thesis
- S. Resondry Zafimiharisoa. Mobile Cloud Computing Security. Master's
Thesis, Ubinet International Master, University of Nice Sophia Antipolis,
France, September 2011
- S. Resondry Zafimiharisoa. Implementation of «LECCSAM»: An Architecture
for Security Management in a Mobile Environnement, Master's Thesis,
National School of Applied Science ENSA, Rabat, Morocco, September 2010
- F. Batard. Secure Communicative Mosh-up (Mobile Mash-up). Master's
Thesis,University of Nice Sophia Antipolis, France, September 2010
- R. Terec. Designing Security and Privacy Components for Adaptive
Applications. Master's Thesis, Technical University of Cluj Napoca, June
2010
- P. Oniga. A Study On Security and User Interfaces. Master's Thesis,
Technical University of Cluj Napoca, June 2010
- C. Pita, Implementation of security components in WCOMP platform.
Master's Thesis, Technical University of Cluj Napoca, June 2009
- F. Leborgne. Traceback and Filtering: Study and Analysis of Filtering and
Traceback Solutions in the Context of Denial of Service Attacks (in
french).Master's Thesis, University of Marne La Vallee, July 2005
- N. Nobelis. A Case-based Reasoning Model for Intrusion Detection (in
french). Master's Thesis, University of Nice Sophia Antipolis, France,
September 2004
- M. Rits. Component adaptability and security. Master's Thesis, July
2003