|
Home Page
of Laurent Bussard
PhD in
Security and Privacy
|
Technical background
Since end of 2004, I'm working
at the European Microsoft Innovation
Center (Aachen, Germany) and I am involved in
European research projects related to security and privacy. In 2004, I finished
my PhD in network security at Eurecom
Institute (Sophia-Antipolis,
France) and ENST (Paris) with Prof. Refik Molva as supervisor. The main
topic of this work was security of pervasive computing environments in terms of
access control, trust establishment, and privacy. I received my MS in networks
and distributed systems (DEA-RSD)
from the ESSI and INRIA (Sophia) in 2000. From 1995 to 1999, I
worked as an engineer in software development at Siemens in Switzerland
where I was involved in projects related to the telecommunication management
network. Before, I studied telecommunication at EIVD
(Yverdon, Switzerland).
Publications
2006
- S. Lachmund, L. Bussard, E. Olk, and F. Fransen. An Infrastructure for Gaining Trust in Context Information.
Workshop on The Value of Security through Collaboration (SECOVAL'06)
at IEEE SECURECOMM conference, Baltimore, MD, USA. September 2006.
- S. Lachmund, T. Walter, L. Bussard, L. Gomez, and E. Olk. Context-Aware Access Control - Making
Access Control Decisions Based on Context Information. International
Workshop on Ubiquitous Access Control (IWUAC
2006). San Jose, California, USA.
July 17, 2006.
- L. Bussard and F. Fransen. From
Location-Awareness to Provable Location. Presented at the 15th IST Mobile & Wireless
Communications Summit. June 2006.
2005
- L. Bussard, J. Claessens, S. Crosta, Y. Roudier, A. Zugenmaier. Can we take this off-line? - Credentials for Web
services supported nomadic applications. To appear in
Proceedings of 4th Conference on Security and Network Architectures (SAR'05), Batz sur Mer, France,
June 2005.
- L. Bussard and W. Bagga. Distance-bounding proof of knowledge to
avoid real-time attacks. to appear in proceedings of (IFIP/SEC2005), 20th IFIP International
Information Security Conference. Chiba,
Japan.
June 2005.
2004
- T. Walter, L. Bussard, Y. Roudier, J. Haller, R. Kilian-Kehr, J.
Posegga, and P. Robinson. Secure Mobile Business Applications - Framework,
Architecture, and Implementation. In Information Security
Technical Report, vol. 9, no. 4, special issue on Mobile Security, Elsevier, 2004, pages 6-21.
- L. Bussard. Trust
Establishment Protocols for Communicating Devices. PhD
Thesis, Eurecom-ENST, September 2004.
full text, a summary in French is
available at the end of this document.
- L. Bussard and Y. Roudier. Protecting
Applications and Devices in Nomadic Business Environments.
In Proceedings of 3rd Conference on Security and Network Architectures (SAR'04), La Londe, France,
June 2004.
- L. Bussard and R. Molva. Establishing
Trust with Privacy. To appear in proceedings of the twelve
international workshop on security protocols (SP'04), Cambridge, UK, April 2004.
- L. Bussard, R. Molva, and Y. Roudier. History-Based Signature or How to Trust
Anonymous Documents. In Proceedings of the Second
Conference on Trust Management (iTrust'04), LNCS 2995,
pages 78-92, Oxford, UK, March 2004.
full text (c) Springer Verlag
- L. Bussard, Y. Roudier, and R. Molva. Untraceable Secret Credentials: Trust
Establishment with Privacy. In Proceedings of the Workshop
on Pervasive Computing and Communications Security ( PerSec'04) at PerCom'04, pages 122-126, Orlando, USA,
March 2004.
full text (c) IEEE.
- L. Bussard and R. Molva. One-Time
Capabilities for Authorizations without Trust. In
Proceedings of the second IEEE conference on Pervasive Computing and
Communications ( PerCom'04), pages
351-355, Orlando, USA, March 2004.
full text (c) IEEE.
- T. Walter, L. Bussard, P. Robinson, and Y. Roudier. Security and trust issues in ubiquitous
environments - the business-to-employee dimension. In
Workshop on Ubiquitous Services and Networking in at SAINT'04, Tokyo,
Japan,
January 2004.
- T. Walter, L. Bussard, Y. Roudier, J. Haller, R. Kilian-Kehr, J.
Posegga, and P. Robinson. Secure Mobile Business Applications - Framework,
Architecture, and Implementation. In Information Security
Technical Report, vol. 9, no. 4, special issue on Mobile Security,
Elsevier, 2004, pages 6-21.
2003
- L. Bussard, Y. Roudier, R. Kilian Kehr, and S. Crosta. Trust and Authorization in Pervasive B2E
Scenarios. In Proceedings of the 6th Information Security
Conference ( ISC'03),
LNCS 2851, pages 295-309, Bristol,
UK,
October 2003.
full text (c) Springer Verlag
- L. Bussard and Y. Roudier. Embedding
Distance-Bounding Protocols within Intuitive Interactions. In
Proceedings of Conference on Security in Pervasive Computing ( SPC'03), LNCS 2802, pages 143-156, Boppard, Germany,
March 2003.
full text (c) Springer Verlag
2002
- S. Loureiro, L. Bussard, and Y. Roudier. Extending Tamper-Proof Hardware Security to
Untrusted Execution Environments. In Proceedings of the
Fifth Smart Card Research and Advanced Application Conference (CARDIS'02) - USENIX -
IFIP working group 8.8 (smart cards), pages 111-124, San Jose, California,
November 2002.
full text (c) Usenix
- L. Bussard and Y. Roudier. Authentication
in Ubiquitous Computing. In Workshop on Security in
Ubiquitous Computing at UBICOMP'02, Goeteborg, Sweden, October 2002.
full text
2000
- L. Bussard, L. Carver, E. Ernst, M. Jung, M. Robillard, and Andreas
Speck. Safe Aspect Composition. Workshop on Aspects and Dimensions
of Concern at ECOOP'2000, Cannes,
France,
June 2000.
- L. Bussard. Towards a pragmatic composition model of Corba
services based on AspectJ. Master thesis, ESSI-I3S, 2000.
full text
- L. Bussard. Towards a Pragmatic Composition Model of CORBA
Services Based on AspectJ. In Workshop on Aspects and Dimensions of Concern
at ECOOP'2000, Cannes,
France,
June 2000.
Research Projects
- WiTness:
WIreless Trust for mobile busiNESS (STREP FP5)
- MOSQUITO:
Mobile Workers’ Secure Business
Applications in Ubiquitous Environments (STREP FP6)
- SAFe: Scoped Advanced Federation (Internal
project)
- FIDIS:
Future of Identity in the Information Society (Network of Excellence)
- Marginal contribution to TrustCoM and NextGrid.
Interests
- Research
- Extension of Web Service Security (WS-Trust,
WS-Federation, Multi-domain authorization, Distributed non-repudiation)
- Credentials combining unlinkability and
non-transferability
- Proof of proximity and location
- Engineering
- Security of distributed systems (Web Services, STS,
WCF)
- Identity Meta-system (CardSpace)
- Secure software engineering, threat modeling
- Project management, agile development
- Other interests: Trusted Computing Platforms, Rights Management Services
Program Committees
- Conference On Security in Network Architecture and Information Systems (SAR SSI 2007)
- International Conference on Security and Privacy in Communication Networks (SecureComm
2007)
- International Conference on Cryptology and Network Security (CANS'06)
- European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2005)
Address
European
Microsoft Innovation Center
Ritterstrasse 23
52072 Aachen
(Germany)