Tony Bourdier

Tony Bourdier

Greater Nantes Metropolitan Area
2K followers 500+ connections

About

We are HIRING (jobs@iraiser.eu or contact me via linkedIn): Software engineers, IT…

Activity

Join now to see all activity

Experience

  • iRaiser

    iRaiser

  • -

    Nantes Area, France

  • -

    Nantes, France

  • -

    Villers-lès-Nancy, France

  • -

    Nancy, France

  • -

    Vandoeuvre-lès-Nancy, France

Education

  •  Graphic

    Ph. Doctor

    -

  • Engineer

    -

  • Master

    -

Publications

  • Les Mathématiques et l’Histoire de l’Art

    Pourquoi les Mathématiques ? Éditions Ellipses

    Aux Mathématiques sont associés les termes de « calcul, concept, langage, analyse, démonstration, formule, loi, méthode, théorème », quand le discours commun sur l’art use des notions de « beauté, sens, valeur, composition, création, don, intuition, sensibilité », deux disciplines qui seraient, présentées ainsi, condamnées à ne jamais se rejoindre. L’un serait le fruit de l’imagination, de l’inspiration, l’autre celui de la réflexion, du raisonnement, les arts et les mathématiques dans…

    Aux Mathématiques sont associés les termes de « calcul, concept, langage, analyse, démonstration, formule, loi, méthode, théorème », quand le discours commun sur l’art use des notions de « beauté, sens, valeur, composition, création, don, intuition, sensibilité », deux disciplines qui seraient, présentées ainsi, condamnées à ne jamais se rejoindre. L’un serait le fruit de l’imagination, de l’inspiration, l’autre celui de la réflexion, du raisonnement, les arts et les mathématiques dans l’imaginaire collectif composent un duo souvent jugé improbable. Etudier les liaisons entretenues par ces deux disciplines c’est revenir en premier lieu sur l’évolution de notre rapport au monde dans sa retranscription : la théorie de la perspective n’est-elle pas l’invention mathématique permettant ce premier pas vers une nouvelle perception picturale du monde ?

    See publication
  • Une nouvelle méthode de Web Usage Mining basée sur une analyse sémiotique du comportement de navigation

    15ème conférence internationale sur l'Extraction et la Gestion des Connaissances - RNTI

    L’objectif de nos travaux est de proposer une méthode d’analyse automatique du comportement des utilisateurs à des fins de prédiction de leur propension à réaliser une action suggérée. Nous proposons dans cet article une nouvelle méthode de Web Usage Mining basée sur une étude sémiotique des styles perceptifs, considérant l’expérience de l’utilisateur comme élément déterminant de sa réaction à une sollicitation. L’étude de ces styles nous a amené à définir de nouveaux indicateurs (des…

    L’objectif de nos travaux est de proposer une méthode d’analyse automatique du comportement des utilisateurs à des fins de prédiction de leur propension à réaliser une action suggérée. Nous proposons dans cet article une nouvelle méthode de Web Usage Mining basée sur une étude sémiotique des styles perceptifs, considérant l’expérience de l’utilisateur comme élément déterminant de sa réaction à une sollicitation. L’étude de ces styles nous a amené à définir de nouveaux indicateurs (des descripteurs sémiotiques) introduisant un niveau supplémentaire à l’approche sémantique d’annotation des sites. Nous proposons ensuite un modèle neuronal adapté au traitement de ces nouveaux indicateurs. Nous expliquerons en quoi le modèle proposé est le plus pertinent pour traiter ces informations.

    Other authors
    See publication
  • Formal Specification and Validation of Security Policies

    Foundations and Practice of Security - LNCS

    We propose a formal framework for the specification and validation of security policies. To model a secured system, the evolution of security information in the system is described by transitions triggered by authorization requests and the policy is given by a set of rules describing the way the corresponding decisions are taken. Policy rules are constrained rewrite rules whose constraints are first-order formulas on finite domains, which provides enhanced expressive power compared to classical…

    We propose a formal framework for the specification and validation of security policies. To model a secured system, the evolution of security information in the system is described by transitions triggered by authorization requests and the policy is given by a set of rules describing the way the corresponding decisions are taken. Policy rules are constrained rewrite rules whose constraints are first-order formulas on finite domains, which provides enhanced expressive power compared to classical security policy specification approaches like the ones using Datalog, for example. Our specifications have an operational semantics based on transition and rewriting systems and are thus executable. This framework also provides a common formalism to define, compare and compose security systems and policies. We define transformations over secured systems in order to perform validation of classical security properties.

    Other authors
    See publication
  • Méthodes algébriques pour la formalisation et l'analyse de politiques de sécurité

    Thèse de doctorat - Université de Lorraine - INRIA - LORIA

    À l'interface des travaux théoriques et applicatifs, notre objectif est de contribuer aux méthodes permettant d'assurer la correction et la sûreté des systèmes (fonctionnalité, sécurité, fiabilité, ...) en développant ou en améliorant des langages de spécification, des techniques et des outils permettant leur analyse formelle.

    See publication
  • Specification, analysis and transformation of security policies via rewriting techniques

    Journal of Information Assurance and Security - Dynamic Publisher Inc

    Formal methods for the specification and analysis of security policies have drawn many attention recently. It is now well known that security policies can be represented using rewriting systems. These systems constitute an interesting formalism to prove properties while provides an operational way to evaluate authorization requests. In this paper, we propose to split the expression of security policies in two distinct elements: a security model and a configuration. The security model (expressed…

    Formal methods for the specification and analysis of security policies have drawn many attention recently. It is now well known that security policies can be represented using rewriting systems. These systems constitute an interesting formalism to prove properties while provides an operational way to evaluate authorization requests. In this paper, we propose to split the expression of security policies in two distinct elements: a security model and a configuration. The security model (expressed as an equational problem) describes how authorization requests must be evaluated depending on security information. The configuration (expressed as a rewriting system) assigns values to security information. This separation eases the formal analysis of security policies, and makes it possible to automatically convert a given policy to a new security model.

    See publication
  • Symbolic analysis of network security policies using rewrite systems

    13th ACM Symposium on Principles and Practice of Declarative Programming - ACM Press

    First designed to enable private networks to be opened up to the outside world in a secure way, the growing complexity of organizations make firewalls indispensable to control information flow within a company. The central role they hold in the security of the organization information make their management a critical task and that is why for years many works have focused on checking and analyzing firewalls. The composition of firewalls, taking into account routing rules, has nevertheless often…

    First designed to enable private networks to be opened up to the outside world in a secure way, the growing complexity of organizations make firewalls indispensable to control information flow within a company. The central role they hold in the security of the organization information make their management a critical task and that is why for years many works have focused on checking and analyzing firewalls. The composition of firewalls, taking into account routing rules, has nevertheless often been neglected. In this paper, we propose to specify all components of a firewall, ie filtering and translation rules, as a rewrite system. We show that such specifications allow us to handle usual problems such as comparison, structural analysis and query analysis. We also propose a formal way to describe the composition of firewalls (including routing) in order to build a whole network security policy. The properties of the obtained rewrite system are strongly related to the properties of the specified networks and thus, classical theoretical and practical tools can be used to obtain relevant security properties of the security policies.

    Other authors
    See publication
  • Tree automata based semantics of firewalls

    6th IEEE Conference on Network Architectures and Information Systems Security - IEEE Computer Society

    Security constitutes a crucial concern in modern information systems. Several aspects are involved, such as user authentication (establishing and verifying users' identity), cryptology (changing secrets into unintelligible messages and back to the original secrets after transmission) and security policies (preventing illicit or forbidden accesses from users to information). Firewalls are a core element of network security policies, that is why their analysis has drawn many attention over the…

    Security constitutes a crucial concern in modern information systems. Several aspects are involved, such as user authentication (establishing and verifying users' identity), cryptology (changing secrets into unintelligible messages and back to the original secrets after transmission) and security policies (preventing illicit or forbidden accesses from users to information). Firewalls are a core element of network security policies, that is why their analysis has drawn many attention over the past decade. In this paper, we propose a new approach for analyzing firewalls, based on tree automata techniques: we show that the semantics of any process composing a firewall (including the network address translation functionality) can be expressed as a regular set or relation and thus can be denoted by a tree automaton. We also investigate abilities opened by tree automata based representations of the semantics of firewalls.

    See publication
  • Extensional and intensional strategies

    Elec. Proc. in Theoretical Computer Science - Open Publishing Association

    This paper is a contribution to the theoretical foundations of strategies. We first present a general definition of abstract strategies which is extensional in the sense that a strategy is defined explicitly as a set of derivations of an abstract reduction system. We then move to a more intensional definition supporting the abstract view but more operational in the sense that it describes a means for determining such a set. We characterize the class of extensional strategies that can be defined…

    This paper is a contribution to the theoretical foundations of strategies. We first present a general definition of abstract strategies which is extensional in the sense that a strategy is defined explicitly as a set of derivations of an abstract reduction system. We then move to a more intensional definition supporting the abstract view but more operational in the sense that it describes a means for determining such a set. We characterize the class of extensional strategies that can be defined intensionally. We also give some hints towards a logical characterization of intensional strategies and propose a few challenging perspectives.

    Other authors
    See publication
  • Rule-based Specification and Analysis of Security Policies

    5th Intl Work. on Security and Rewriting Techniques

  • Analyse en composantes principales pour la détection de défauts

    Actes du groupe Statistiques de l'Institut Élie Cartan

Languages

  • English

    Professional working proficiency

  • French

    Native or bilingual proficiency

View Tony’s full profile

  • See who you know in common
  • Get introduced
  • Contact Tony directly
Join to view full profile

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Tony Bourdier

Add new skills with these courses