A. BERADY, M. Jaume, V. Viet Triem Tong, G. Guette : “From TTP to IoC: Advanced Persistent Graphs for Threat Hunting”, IEEE Transactions on Network and Service Management, vol. 18 (2), Special Issue on Latest Developments for Security Management of Networks and Services, pp. 1321-1333, (IEEE) (2021)
2020
M. Jaume, M. Journault, M.‑J. Lesot, P. Manoury, I. Mounier : “Logique pour l’informatique”, (Ellipses), (ISBN: 9782340042612) (2020)
L. Georget, M. Jaume, G. Piolle, F. Tronel, V. Viet Triem Tong : “Suivi de flux d’information correct sous Linux”, Actes des 16es journées AFADL (Approches formelles dans l'assistance au développement de logiciels), Montpellier, France, pp. 19-26 (2017)
M. Jaume, Th. Laurent : “Teaching formal methods and discrete mathematics”, Proceedings of the 1st Workshop on Formal Integrated Development Environment (F-IDE 2014), vol. 149, Electronic Proceedings in Theoretical Computer Science, Grenoble, France, pp. 30-43 (2014)
2013
M. Jaume, R. Andriatsimandefitra, V. Viet Triem Tong, L. Mé : “Secure states versus Secure executions: From access control to flow control”, ICISS 2013 - 9th International Conference on Information Systems Security, vol. 8303, Lecture Notes in Computer Science, Calcutta, India, pp. 148-162, (Springer) (2013)
T. Bourdier, H. Cirstea, M. Jaume, H. Kirchner : “Formal Specification and Validation of Security Policies”, FPS - 4th Canada-France MITACS Workshop on Foundations and Practice of Security - 2011, vol. 6888, Lecture Notes in Computer Science, Paris, France, pp. 148-163, (Springer, Heidelberg) (2012)
M. Jaume : “Security rules versus Security properties”, Sixth International Conference on Information Systems Security (ICISS 2010), vol. 6503, Lecture Notes in Computer Science, Gandhinagar, India, pp. 231-245 (2010)
M. Jaume, V. Viet Triem Tong, L. Mé : “Contrôle d’accès versus Contrôle de flots”, 10emes Journées Francophones sur les Approches Formelles dans l'Assistance au développement des logiciels, AFADL 2010, Poitiers, France, pp. 27-41 (2010)
Ph. Ayrault, M. Carlier, D. Delahaye, C. Dubois, D. Doligez, L. Habib, Th. Hardin, M. Jaume, Ch. Morisset, F. Pessaux, R. Rioboo, P. Weis : “Trusted Software within Focal”, Trusting Trusted Computing ?, Rennes, France, pp. 162-179 (2008)
M. Jaume, Ch. Morisset : “Un cadre sémantique pour le contrôle d’accès”, Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, vol. 27 (8), pp. 951-976, (Lavoisier) (2008)
M. Jaume, Ch. Morisset : “Towards a formal specification of access control”, Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'06), Seattle, Washington, United States (2006)
Th. Hardin, M. Jaume, Ch. Morisset : “Access control and Rewrite Systems”, 1st International Workshop on Security and Rewriting Techniques, SecReT'06, Venice, Italy, pp. 2-17 (2006)
M. Jaume, Ch. Morisset : “A formal approach to implement access control”, Journal of Information Assurance and Security, vol. 1 (2), pp. 137-148, (Dynamic Publishers Inc., USA) (2006)
D. Delahaye, M. Jaume, V. Prevosto : “Coq : un outil pour l’enseignement”, Revue des Sciences et Technologies de l'Information - Série TSI : Technique et Science Informatiques, vol. 24 (9), pp. 1139-1160, (Lavoisier) (2005)
V. Prevosto, M. Jaume : “Making proofs in a hierarchy of mathematical structures”, Calculemus 2003 - 11th Symposium on the Integration of Symbolic Computation and Mechanized Reasoning, Rome, Italy, pp. 89-100, (Aracne) (2003)