Publications

See my citations on Google Scholar
Full-text of most of my publications can be found on my Research Gate Page

International Journal Papers

  1. A. Gabillon, J.P. Barriot, Y. Verschelle, B. Ducarme. Toward a normalized XML Schema for the GGP data archives. CODATA Data Science Journal (DSJ). ISSN 1683-1470. Data Science Journal, Volume 12, 30 April 2013.
  2. Ernesto Damiani, Majirus Fansi, Alban Gabillon and Stefania Marrara. A General Approach to Securely Querying XML. Computer Standard & Interfaces vol 30 issue 6 (2008). p 379-389. ISSN: 0920-5489
  3. A. Gabillon, L. Gallon Availability of ARINC 629 Data Bus. Journal of Networks, vol. 1, no.6, november/december 2006. ISSN 1796-2056
  4. A. Gabillon. A logical formalization of a secure XML database. Computer Science and System Engineering Journal. Volume 21 number 5, September 2006. ISSN 0267-6192
  5. A. Gabillon and M. Fansi. A New Persistent Labelling Scheme for XML. In Journal of Digital Information Management. Vol 4 n° 2, June 2006. ISSN 0972 7272
  6. A. Bonnecaze, P. Liardet, A. Gabillon and K. Blibech Time-Stamping Schemes: A Distributed Point of View. In Annals of Telecommunications. Vol 61 n° 5/6. May/June 2006. ISSN 0003-4347.
  7. F. Cuppens, A. Gabillon. Cover Story Management. Data and Knowledge Engineering, Vol 37/2, 2001, pp 177-201. Elsevier. ISSN: 0169-023X
  8. F. Cuppens, A. Gabillon. Logical Foundations of Multilevel Databases. Data and Knowledge Engineering, vol. 29, 1999, pp. 259-291. Elsevier. ISSN: 0169-023X
  9. N. Boulahia-Cuppens, F. Cuppens, A. Gabillon, K. Yazdaman.Virtual View Model to Design a Secure Object-Oriented Database. Computers & Security, Volume 14, Issue 1, 1995, Page 31. Harold Joseph Highland. ISSN: 0167-4048

International Conferences

  1. Loesdau, Martin, Sébastien Chabrier, and Alban Gabillon. Automatic Nacre Thickness Measurement of Tahitian Pearls. In Image Analysis and Recognition. Proc of the 12th International Conference, ICIAR 2015, Niagara Falls, Canada, July 22-24, 2015. Vol. 9164 LNCS Springer International Publishing, 2015. pp 446-455.
  2. Firas Al Khalil, Alban Gabillon and Patrick Capolsini. Quantity Based Aggregation Control for Cadastral Databases.  22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL 2014) November 4-7, 2014, Dallas, Texas, USA
  3. Martin Loesdau, Sébastien Chabrier, Alban Gabillon. Automatic Classification of Tahitian Pearls. Proceedings of the 6th Image Processing & Communication (IPC) conference. September 2014. Bydgoszcz. Poland.
  4. Firas Al Khalil, Alban Gabillon and Patrick Capolsini. Implementing Quantity Based Aggregation Control for Cadastral Databases. Proceedings of the 11th IEEE International Conference on Services Computing, Anchorage, USA. June 2014.
  5. Martin Loesdau, Sébastien Chabrier, Alban Gabillon. Hue and Saturation in the RGB Color Space. Proceedings of the 6th International Conference, ICISP 2014, Cherbourg, France, June 30 – July 2, 2014. Lecture Notes in Computer Science 8509. pp 203-212. ISBN 978-3-319-07997-4
  6. Firas Al Khalil, Alban Gabillon and Patrick Capolsini. Collusion Resistant Inference Control for Cadastral Databases. The Sixth International Symposium on Foundations & Practice of Security FPS'2013. 21st-22nd October 2013, La Rochelle, France. Lecture Notes in Computer Science 8352. pp 189-208. ISBN 978-3-319-05302-8
  7. V. Lalanne, M. Munier, A. Gabillon. Information Security Risk Management in a World of Services. 2013 ASE/IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT 2013) Washington D.C., USA, September 8th-14th, 2013
  8. Bechara Al Bouna, Richard Chbeir, Alban Gabillon, Patrick Capolsini. A Flexible Image-Based Access Control Model for Social Networks .Security and Privacy Preserving in Social Networks 01/2013; Lecture Notes in Social Networks. 
  9. Alban Gabillon, P. Capolsini. Enforcing Protection Mechanisms for Geographic Data. Proc. of the 11th International Symposium on Web and Wireless Geographical Information Systems (W2GIS). Naples, Italy. April 2012. LNCS 7236, Springer-Verlag.
  10. Bechara Al Bouna, Richard Chbeir, Alban Gabillon, Patrick Capolsini. A Fine-Grained Image Access Control Model. Proceeding of the IEEE Signal Image Technology and Internet Based Systems (SITIS) 2012. 
  11. Alban Gabillon. A Privacy Model for Social Networks. p 80-90. WOSIS 2011 - Proceedings of the 8th International Workshop on Security in Information Systems, Beijing, China, 8-9 June, 2011. SciTePress 2011, ISBN 978-989-8425-61-4 
  12. Bechara al Bouna, Richard Chbeir, Alban Gabillon: The Image Protector - A Flexible Security Rule Specification Toolkit . p 345-350. Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. SciTePress 2011, ISBN 978-989-8425-71-3. 
  13. Alban Gabillon. Protection of Geographic Data. Keynote Speaker. ACM/IEEE International Workshop on Security and Privacy Preserving in e-Societies (SeceS'11). Lebanon. June 2011. 
  14. A. Gabillon, P. Capolsini. Rule-based Policy Enforcement Point for Map Service. SPRINGL 2010. SIGSPATIAL ACM GIS 2010 International Workshop on Security and Privacy in GIS and LBS. November 2010. San Jose,CA, USA. ACM New York, NY, USA ©2010. ISBN: 978-1-4503-0435-1 
  15. A. Gabillon and L. Letouzey. A View-Based Access Control Model for SPARQL. In Proc of the 2010 Network and System Security conference (NSS2010), Melbourne, Australia November 15th, 2010. IEEE Computer Society. ISBN: 978-1-4244-8484-3 
  16. A. Gabillon, P. Capolsini. Security Policy for Geo-Data. MEDES '10 Proceedings of the International Conference on Management of Emergent Digital EcoSystems. October 2010. Bangkok, Thailand. ACM New York, NY, USA ©2010. ISBN: 978-1-4503-0047-6 
  17. P. Capolsini, and A. Gabillon, Security policies for the Visualization of Geo Data, ACM SIGSPATIAL GIS 2009 International Workshop on Security and Privacy in GIS and LBS (SPRINGL'09). pp.02-11, November, 3rd 2009,Seattle, WA, USA, 2009. ACM New York, NY, USA ©2009. ISBN: 978-1-60558-853-7 
  18. Gabillon, A. and P. Capolsini. Dynamic Security rules for Geo Data. in International workshop on Autonomous and Spontaneous Security (SETOP'09). 2009. St Malo, France: LNCS 5939 - Springer-Verlag.p. 136-152.
  19. A. Bonnecaze, A. Gabillon. On Key Distribution in MANETs. Proceedings of the Fifth Signal-Image Technology & Internet-Based Systems (SITIS), 2009. 
  20. D.P Le, A. Bonnecaze, A. Gabillon. Multisignatures as secure as the Diffie-Hellman problem. Proc. of the Third International Conference on Pairing-based Cryptography (Pairing 2009). Stanford University, USA, August 12-14, 2009. LNCS 5671. Shacham, H., Waters, B. (Eds.), Vol. 5671, 2009, ISBN 978-3-642-03297-4. 
  21. A. Gabillon, P. Capolsini. DRM Policies for Web Map Service. SPRINGL 2008. SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS. November 4th 2008, Irvine, CA, USA. ACM. ISBN 978-1-60558-324-2. 
  22. A. Gabillon, P. Capolsini. An ODRL Web Map Service Profile. Proceedings of the 2008 joint Virtual Goods and ODRL Workshop. October 16 - 18, 2008. Poznan, Poland. ISBN 978-83-7417-361-2. 
  23. D.P Le, A. Bonnecaze, A. Gabillon. A Secure Round-based Timestamping Scheme with Absolute Timestamps. Fourth International Conference on Information Systems Security (ICISS 2008). December, volume 5332 of LNCS, pages 116-123, 2008. JNTU, Hyderabad, India. LNCS 5352, ISBN 978-3-540-89861-0 
  24. D.P Le, A. Bonnecaze, A. Gabillon. Sign-timing Scheme based on Aggregate Signatures. Proceedings of the IEEE international conference on Intelligence and Security Informatics/ (ISI 2008), pages 145-149, IEEE, June 17-20, 2008. Taiwan. LNCS 5075 ISBN 978-3-540-69136-5 
  25. JP Barriot, A. Gabillon, Y. Verschelle, P. Capolsini and B. Ducarme. The foreseen SCHEMA of the new ICET database at the Geodesy Observatory of Tahiti, ETS2008. New challenges in Earths Dynamics, September 1st - 5th 2008, Jena, Germany. 
  26. E. Damiani, M. Fansi, A. Gabillon, S. Marrara. Securely Updating XML. Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings, Part III. LNCS 4694 Springer 2007: 1098-1106. ISBN 978-3-540-74828-1 
  27. E. Damiani, M. Fansi, A. Gabillon, S. Marrara. A General Approach to Securely Querying XML. Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, WOSIS 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007: 115-122. ISBN 978-972-8865-96-2 
  28. Ernesto Damiani, Alban Gabillon, Anne Anderson, David Staggs, Bhavani M. Thuraisingham, Marianne Winslett. Directions and trends of XML and web service security. Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006 ACM 2006 
  29. K. Blibech, A. Gabillon. A New Digital Notary System. Proc. of the conference on Signal and Image Technology and Internet Based Systems. December 2006, Hammamet Tunisia 
  30. K. Blibech, A. Gabillon. New Timestamping Scheme Based on Skip Lists. . Proc of the Applied Cryptography and Information Security (ACIS) workshop held in conjunction with the Computational Science and its Applications (ICCSA 2006) conference. Glasgow May 2006. LNCS 2982. Springer ISBN 3-540-34075-0. 
  31. A. Gabillon, L.Gallon. Availability Constraints for Avionic DataBuses. Proc of the First International Conference on Availability, Reliability and Security. Vienna, April 2006. IEEE Computer Society. ISBN 0-7695-2567-9. 
  32. A. Gabillon, M Fansi. A Persistent Labelling Scheme for XML and Tree Databases. Proc. of the IEEE conference on Signal and Image Technology and Internet Based Systems. November 2005, Yaoundé Cameroon. ISBN 2-9525435-0. 
  33. A. Bonnecaze et P. Liardet et A. Gabillon et K. Blibech A Distributed Time Stamping Scheme Proc. of the IEEE conference on Signal and Image Technology and Internet Based Systems. November 2005, Yaoundé Cameroon. ISBN 2-9525435-0. 
  34. K. Blibech & A. Gabillon. Chronos: An Authenticated Dictionary based on Skip Lists for Timestamping. Proc. of 12th ACM Conference on Computer Security (Workshop Secure Web Services). George Mason University, Fairfax, VA, USA. November 2005. ACM. ISBN 1-58113-969-1. 
  35. A. Gabillon. A Formal Access Control Model for XML Databases. Proc. of the second VLDB Workshop on Secure Data Management. Trondheim, Norway. September 2005. LNCS 3676. ISBN 3-540-28798-1. 
  36. A. Gabillon. An Authorisation Model for XML DataBases. Proc. of the 11th ACM Conference on Computer Security (Workshop Secure Web Services). George Mason University, Fairfax, VA, USA. ACML October 2004 
  37. A. Gabillon, L. Gallon. Availability Model for Avionic Databuses. Proceedings of the workshop on issues in security and petri nets (WISP). Eindhoven, The Netherlands, 23 June 2003 
  38. A. Gabillon, M. Munier, JJ. Bascou, L. Gallon, E. Bruno. An Access Control Model for Tree Data Structure. Information Security Conference. Sao Paulo, Brasil. October 2002. LNCS 2433. Springer. ISBN 3-540-44270-7 
  39. A. Gabillon, E. Bruno. Regulating Access to XML documents. Fifteenth Annual IFIP WG 11.3 Working Conference on Database Security. Niagara on the Lake, Ontario, Canada July 15-18, 2001. Kluwer 2002, ISBN 1-4020-7041-1 
  40. A. Gabillon, J. Byun. A Two-level Time-Stamping System. In Trusted Information. The New Decade Challenge. Kluwer Academic Publishers. Proc. of the sixteenth International Conference on Information Security. IFIP/SEC2001. Paris, June 2001. ISBN 0-306-46998-7 
  41. A. Gabillon, E. Bruno. A Filtering Model for XML documents. WWW10 Conference Workshop on Information Filtering. Hong Kong, May 2001. 
  42. F. Cuppens, A. Gabillon. Rules for Building Multilevel Object-Oriented Databases. 5th European Symposium on Research In Computer Security (ESORICS98). Louvain-la-Neuve, Belgium. LNCS 1485. Springer Verlag, 1998. ISBN: 3540650040. 
  43. F. Cuppens, A. Gabillon. Design of Multilevel Object-Oriented Databases. Proc. of the XII International Symposium on Computer and Information Sciences (ISCIS). Turkey. October 1997. 
  44. F. Cuppens, A. Gabillon. A logical Approach To Model A Multilevel Object-Oriented Database. 10th IFIP 11.3 conference on Database Security. Como, Italy. Database Security, X: Status and Prospects. Pierangela Samarati, Ravi S. Sandhu (eds.), Chapman & Hall, 1997. ISBN 0-412-80820-X. 
  45. F. Cuppens, A. Gabillon. A Query Language For a Multilevel Object-Oriented Database. . Proc. of the XI International Symposium on Computer and Information Sciences (ISCIS). Antalya, Turkey. November 1996. 
  46. F. Cuppens, A. Gabillon. Modeling a Multilevel Database with Temporal Downgrading Functionalities. 9th IFIP 11.3 conference on Database Security. Renslearville, USA. Database Security, IX: Status and Prospects. David L. Spooner, Steven A. Demurjian, John E. Dobson (eds.), Chapman & Hall, 1996. ISBN 0-412-72920-2. 
  47. N. and F. Cuppens, A. Gabillon, K. Yazdanian. “Virtual View Model to Design A Secure Object-Oriented DataBase”. Proc. of the 17th National Computer Security Conference (NCSC). Baltimore, USA 1994. 
  48. N and F. Cuppens, A. Gabillon, K. Yazdanian. “Decomposition of Multilevel Objects in an Object-Oriented DataBase”. Third European Symposium on Research In Computer Security (ESORICS94). Brighton, UK. Gollmann, D., (Ed.). LNCS 875. Springer Verlag, 1994. ISBN: 3-540-58618-0. 
  49. N. and F. Cuppens, A. Gabillon, K. Yazdanian. “Techniques to Handle MultiLevel Objects in Secure Object-Oriented DataBases”. Proc. of the OOPSLA-93 Workshop on "Security for Object-Oriented Systems". Washington, USA 1993. SIGPLAN Notices 28(10). 
  50. N. and F. Cuppens, A. Gabillon, K. Yazdanian. “MultiView Model for Multilevel Object-Oriented DataBases”. 9th Annual Computer Security Applications Conference. Orlando, USA 1993. IEEE Computer Society. ISBN: 0-818-64330-7. 
Encyclopaedia
  1. A. Gabillon. Web Access Control Strategies. Second edition of Encyclopedia of Cryptography and Security at Springer. Tilborg Henk C.A. van, Jajodia Sushil (Eds.). ISBN: 978-1-4419-5906-5. 2011
  2. A. Gabillon. Multilevel Databases. Encyclopedia of Database Technologies and Applications. IDEA Group Reference. Edited By: Laura C. Rivero, Jorge Horacio Doorn, Viviana E. Ferraggine, July 2005. ISBN 1-59140-560-2.

Book Editor

  1. Costas Lambrinoudakis and Alban Gabillon (Eds). Risks and Security of Internet and Systems. 10th International Conference CRISIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers. LNCS  9572. ©Springer International Publishing Switzerland 2016. To appear.
  2. A. Gabillon, Quan Z. Sheng, Wathiq Mansoor. Web-based Information Technologies and Distributed Systems. Atlantis Press 2010. ISBN: 978-90-78677-28-4 Ari Juels, Ernesto Damiani, Alban Gabillon: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006 ACM 2006. ISBN:1-59593-546-0 
  3. Danielle Boulanger, Frederic Cuppens, Herve Debars, Alban Gabillon. Proceedings of the First Joint Conference on Security in Network Architectures (SAR) and Security of Information Systems (SSI), Seignosse, France 2006. 
  4. Danielle Boulanger, Alban Gabillon. Proceedings of the Second workshop on Security in Information Systems (SSI 2005), Grenoble, France, 2005 
  5. Danielle Boulanger, Alban Gabillon. Proceedings of the First workshop on Security in Information Systems (SSI 2005), Grenoble, France, 2004

National Journal Papers

  1. Alban Gabillon. Contrôler les accès aux données numériques. Revue de l'Electricité et de l'Electronique (REE). Vol 4. 2013
  2. K. Blibech, A. Gabillon, A. Bonnecaze. Etude des Systèmes d'Horodatage. Technique et Science Informatiques (TSI) VOL 26/3-4 - 2007.
  3. F. Cuppens, A. Gabillon. A Query Language For a Multilevel Object-Oriented Database. Turkish Journal of Electrical Engineering & Computer. Elektrik vol 5, number 2, 1997. TÜBITAK.

National Conferences

  1. V. Lalanne, M. Munier, A. Gabillon. Gestion des Risques dans les Systèmes d'Information Orientés Services. 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SARSSI' 2013), Mont-de-Marsan, Sept 16-18, 2013.
  2. L. Letouzet, A. Gabillon. Un modèle de contrôle d’accès pour les données RDF. 5th Conference on Security in Network Architectures and Information Systems (SAR-SSI '10). Mai 2010. Nice.
  3. A. Gabillon, and P. Capolsini. Modelling Security Policies for Geo Data. 4th Conference on Security in Network Architectures and Information Systems (SAR-SSI '09). pp. 243-262, June, 22-26th 2009,Luchon, France, 2009
  4. A. Gabillon, P. Capolsini. Toward an ODRL Web Map Service Profile. SAR-SSI 2008. 3rd Conference on Security in Network Architectures and Information Systems. October 13-17 th 2008, Loctudy, France.ISBN: 978-2-7483-4389-2
  5. D.P Le, A. Bonnecaze, A. Gabillon. Multisignature Schemes with tight reduction in the plain public key model. Proc of the conference on security in network architecture and information systems/ (SARSSI 2008). Octobre 2008, Loctudy, France. ISBN: 978-2-7483-4389-2
  6. P. D. Le, A. Gabillon. A New Multisignature Scheme based on Strong Diffie-Hellman Assumption. Proc of the conference on security in network architecture and information systems (SAR-SSI). June 2007, Annecy, France
  7. M. Fansi, V. Lalanne, A. Gabillon. Vers l'interopérabilité des Systèmes de DRM (Digital Rights Management). Proc of the conference on security in network architecture and information systems (SAR-SSI). June 2007, Annecy, France
  8. K. Blibech, A. Gabillon. A New Timestamping System. Proc of the conference on security in network architecture and information systems. June 2006, Seignosse, France.
  9. L. Gallon, A. Gabillon. Analyse du protocole de bus embarqué avionique. ARINC 629 BP. Proc of the 6ème conférence sur la modélisation et la simulation (MOSIM). Rabat, April 2006.
  10. A. Gabillon A Secure XML Database. SAR 2005. 4th Conference on Security and Network Architectures. June 06-10, 2005. Batz sur Mer France.
  11. A. Bonnecaze et P. Liardet et A. Gabillon et K. Blibech A Distributed Time Stamping Scheme SAR 2005. 4th Conference on Security and Network Architectures. June 06-10, 2005. Batz sur Mer, France.
  12. K. Blibech, A. Gabillon. Dictionnaires authentifiés et skip listes Actes du 2eme atelier sur la Sécurité des Systèmes d'Information (SSI'05). Inforsid Grenoble. 24 mai 2005.France.
  13. A. Gabillon. Modèles de Contrôles d’Accès, Application à XML. Inforsid 2003, 3-6 juin 2003, Nancy. Conférence invitée.
  14. A. Gabillon, E. Bruno. Contrôles d’accès pour documents XML. BDA'2001. Dix-septième Journées Bases de Données Avancées. 29 octobre - 2 novembre 2001. Agadir, Maroc.
  15. F. Cuppens, A. Gabillon. Formalisation de la confidentialité dans une base de données à objets. Actes des 12eme journées Bases de Données Avancées (BDA). Cassis, France. 1996.

Software

  1. CHRONOS, notaire électronique. Référence iddn.fr.001.51.0044.000.s.p.2005.000.10000 (Agence pour la Protection des Programmes).