JAUME Mathieu
Associate Professor
Team : MoVe
Tel: +33 1 44 27 73 46, Mathieu.Jaume (at) nulllip6.fr
https://lip6.fr/Mathieu.Jaume
Team : MoVe
- Sorbonne Université - LIP6
Boîte courrier 169
Couloir 25-26, Étage 2, Bureau 225
4 place Jussieu
75252 PARIS CEDEX 05
FRANCE
Tel: +33 1 44 27 73 46, Mathieu.Jaume (at) nulllip6.fr
https://lip6.fr/Mathieu.Jaume
2000-2022 Publications
-
2022
- A. BERADY, M. Jaume, V. Viet Triem Tong, G. Guette : “PWNJUTSU: A dataset and a semantics-driven approach to retrace attack campaigns”, IEEE Transactions on Network and Service Management, Special Issue on Recent Advances in Network Security Management, pp. 1-13, (IEEE) (2022)
-
2021
- Th. Hardin, M. Jaume, F. Pessaux, V. Viguie Donzeau‑Gouge : “Concepts and Semantics of Programming Languages 2: Modular and Object‐oriented Constructs with OCaml, Python, C++, Ada and Java”, (ISTE Wiley), (ISBN: Print ISBN:9781786306029 |Online ISBN:9781119851196) (2021)
- Th. Hardin, M. Jaume, F. Pessaux, V. Viguie Donzeau‑Gouge : “Concepts and Semantics of Programming Languages 1: A Semantical Approach with OCaml and Python”, (ISTE Wiley), (ISBN: Print ISBN:9781786305305 |Online ISBN:9781119824121) (2021)
- Th. Hardin, M. Jaume, F. Pessaux, V. Viguie Donzeau‑Gouge : “Concepts et sémantique des langages de programmation 1 : constructions fonctionnelles et impératives avec OCaml, Python, C et C++”, (ISTE Editions), (ISBN: 9781784057015) (2021)
- Th. Hardin, M. Jaume, F. Pessaux, V. Viguie Donzeau‑Gouge : “Concepts et sémantique des langages de programmation 2 : constructions modulaires et objet avec OCaml, Python, C++, Ada et Java”, (ISTE Editions), (ISBN: 9781784057022) (2021)
- A. BERADY, M. Jaume, V. Viet Triem Tong, G. Guette : “From TTP to IoC: Advanced Persistent Graphs for Threat Hunting”, IEEE Transactions on Network and Service Management, vol. 18 (2), Special Issue on Latest Developments for Security Management of Networks and Services, pp. 1321-1333, (IEEE) (2021)
-
2020
- M. Jaume, M. Journault, M.‑J. Lesot, P. Manoury, I. Mounier : “Logique pour l’informatique”, (Ellipses), (ISBN: 9782340042612) (2020)
-
2017
- L. Georget, M. Jaume, G. Piolle, F. Tronel, V. Viet Triem Tong : “Information Flow Tracking for Linux Handling Concurrent System Calls and Shared Memory”, Proceedings of the 15th International Conference on Software Engineering and Formal Methods (SEFM 2017), LNCS, Trento, Italy, pp. 1-16, (Springer International Publishing) (2017)
- L. Georget, M. Jaume, G. Piolle, F. Tronel, V. Viet Triem Tong : “Suivi de flux d’information correct sous Linux”, Actes des 16es journées AFADL (Approches formelles dans l'assistance au développement de logiciels), Montpellier, France, pp. 19-26 (2017)
- L. Georget, M. Jaume, G. Piolle, F. Tronel, V. Viet Triem Tong : “Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux”, 5th International FME Workshop on Formal Methods in Software Engineering, Buenos Aires, Argentina, pp. 10-16, (IEEE Press) (2017)
-
2016
- M. Jaume : “Eléments de mathématiques discrètes - Cours, exercices résolus, implémentations avec les langages Python et OCaml”, (Ellipses), (ISBN: 978-2340014800) (2016)
-
2015
- L. Georget, G. Piolle, F. Tronel, V. Viet Triem Tong, M. Jaume : “Towards a Formal Semantics for System Calls in terms of Information Flow”, Tenth International Conference on Systems (ICONS 2015), Barcelone, Spain, pp. 1-4, (IARIA) (2015)
-
2014
- M. Jaume, Th. Laurent : “Teaching formal methods and discrete mathematics”, Proceedings of the 1st Workshop on Formal Integrated Development Environment (F-IDE 2014), vol. 149, Electronic Proceedings in Theoretical Computer Science, Grenoble, France, pp. 30-43 (2014)
-
2013
- M. Jaume, R. Andriatsimandefitra, V. Viet Triem Tong, L. Mé : “Secure states versus Secure executions: From access control to flow control”, ICISS 2013 - 9th International Conference on Information Systems Security, vol. 8303, Lecture Notes in Computer Science, Calcutta, India, pp. 148-162, (Springer) (2013)
-
2012
- D. Doligez, M. Jaume, R. Rioboo : “Development of secured systems by mixing programs, specifications and proofs in an object-oriented programming environment. A case study within the FoCaLiZe environment”, PLAS - Seventh Workshop on Programming Languages and Analysis for Security, Beijing, China, (ACM) (2012)
- M. Jaume : “Semantic comparison of security policies: from access control policies to flow properties”, Workshop on Semantic Computing and Security, WSCS'2012, IEEE CS Security and Privacy Workshops, San Francisco, United States, pp. 60-67, (IEEE) (2012)
- M. Jaume, R. Rioboo : “Développement de systèmes sécurisés avec l’atelier FoCaLiZe”, JFLA - Journées Francophones des Langages Applicatifs - 2012, Carnac, France, pp. 104-118 (2012)
- T. Bourdier, H. Cirstea, M. Jaume, H. Kirchner : “Formal Specification and Validation of Security Policies”, FPS - 4th Canada-France MITACS Workshop on Foundations and Practice of Security - 2011, vol. 6888, Lecture Notes in Computer Science, Paris, France, pp. 148-163, (Springer, Heidelberg) (2012)
- M. Jaume, V. Viet Triem Tong, G. Hiet : “Spécification et mécanisme de détection de flots d’information illégaux”, Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, vol. 31 (6), pp. 713-742, (Lavoisier) (2012)
-
2011
- M. Jaume, V. Viet Triem Tong, L. Mé : “Flow based interpretation of access control: Detection of illegal information flows”, 7th International Conference on Information Systems Security (ICISS), vol. 7093, Lecture Notes in Computer Science, Kolkata, India, pp. 72-86, (Springer) (2011)
-
2010
- M. Jaume : “Security rules versus Security properties”, Sixth International Conference on Information Systems Security (ICISS 2010), vol. 6503, Lecture Notes in Computer Science, Gandhinagar, India, pp. 231-245 (2010)
- T. Bourdier, H. Cirstea, M. Jaume, H. Kirchner : “Rule-based Specification and Analysis of Security Policies”, 5th International Workshop on Security and Rewriting Techniques - SecReT 2010, Valencia, Spain (2010)
- M. Jaume, V. Viet Triem Tong, L. Mé : “Contrôle d’accès versus Contrôle de flots”, 10emes Journées Francophones sur les Approches Formelles dans l'Assistance au développement des logiciels, AFADL 2010, Poitiers, France, pp. 27-41 (2010)
- T. Bourdier, H. Cirstea, M. Jaume, H. Kirchner : “On Formal Specification and Analysis of Security Policies”, 2010 Grande Region Security and Reliability Day, Saarbrücken, Germany (2010)
-
2009
- M. Carlier, C. Dubois, L. Habib, M. Jaume : “Politique de contrôle d’accès multi-niveaux : test de conformité vis à vis des flots avec l’outil FoCaL”, AFADL'09 - Approches formelles dans l'assistance au développement des Logiciels, Toulouse, France, pp. 145-160 (2009)
- L. Habib, M. Jaume, Ch. Morisset : “Formal definition and comparison of access control models”, Journal of information assurance and security (JIAS), vol. 4 (4), pp. 372-381 (2009)
-
2008
- M. Jaume : “Descriptions formelles : Comprendre, Corriger, Implanter, Résutiliser. Application au contrôle d’accès”, habilitation, defence 11/06/2008 (2008)
- Ph. Ayrault, M. Carlier, D. Delahaye, C. Dubois, D. Doligez, L. Habib, Th. Hardin, M. Jaume, Ch. Morisset, F. Pessaux, R. Rioboo, P. Weis : “Trusted Software within Focal”, Trusting Trusted Computing ?, Rennes, France, pp. 162-179 (2008)
- L. Habib, M. Jaume, Ch. Morisset : “A formal comparison of the Bell & LaPadula and RBAC models”, Fourth International Conference on Information Assurance and Security, IAS'2008, Naples, Italy, pp. 3-8, (IEEE) (2008)
- M. Jaume, Ch. Morisset : “Un cadre sémantique pour le contrôle d’accès”, Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, vol. 27 (8), pp. 951-976, (Lavoisier) (2008)
-
2007
- M. Jaume, Ch. Morisset : “Contrôler le contrôle d’accès : Approches formelles”, Approches Formelles dans l'Assistance au Développement de Logiciels (AFADL'07),, Namur, Belgium, pp. 227-244 (2007)
-
2006
- M. Jaume, Ch. Morisset : “Towards a formal specification of access control”, Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'06), Seattle, Washington, United States (2006)
- Th. Hardin, M. Jaume, Ch. Morisset : “Access control and Rewrite Systems”, 1st International Workshop on Security and Rewriting Techniques, SecReT'06, Venice, Italy, pp. 2-17 (2006)
- M. Jaume, Ch. Morisset : “A formal approach to implement access control”, Journal of Information Assurance and Security, vol. 1 (2), pp. 137-148, (Dynamic Publishers Inc., USA) (2006)
-
2005
- M. Jaume, Ch. Morisset : “Formalisation and Implementation of Access control models”, ITCC 2005 - International Conference on Information Technology: Coding and Computing, Las Vegas, United States, pp. 703-708, (IEEE) (2005)
- D. Delahaye, M. Jaume, V. Prevosto : “Coq : un outil pour l’enseignement”, Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, vol. 24 (9), pp. 1139-1160, (Lavoisier) (2005)
-
2003
- E. Gureghian, Th. Hardin, M. Jaume : “A full formalisation of the Bell and La Padula security model”, (2003)
- V. Prevosto, M. Jaume : “Making proofs in a hierarchy of mathematical structures”, Calculemus 2003 - 11th Symposium on the Integration of Symbolic Computation and Mechanized Reasoning, Rome, Italy, pp. 89-100, (Aracne) (2003)
- C. Dubois, J. Grandguillot, M. Jaume : “Réutilisation de preuves formelles : une étude pour le système Foc”, Journées Francophones des Langages Applicatifs, JFLA'03, Chamrousse, France, pp. 63-76 (2003)
-
2002
- M. Jaume : “On greatest fixpoint semantics of logic programming”, Journal of Logic and Computation, vol. 12 (2), pp. 321-342, (Oxford University Press (OUP)) (2002)
-
2000
- M. Jaume : “Logic programming and Co-inductive definitions”, International Workshop, Computer Science Logic, CSL'2000, vol. 1862, Lecture Notes in Computer Science, Fischbachau, Germany, pp. 343-355, (Springer) (2000)