Barbara Kordy

Publications

Peer-reviewed international journals

Barbara Kordy, Patrick Schweitzer, Marc Pouly. Probabilistic Reasoning with Graphical Security Models. Information Sciences, INS11951, pages 111–131, Elsevier, 2016, DOI: 10.1016/j.ins.2016.01.010. Available online.pre-print ]
Barbara Kordy, Ludovic Piètre-Cambacédès, Patrick Schweitzer. DAG-Based Attack and Defense Modeling: Don't Miss the Forest for the Attack Trees. Computer Science Review, volume 13–14, pages 1–38, Elsevier, 2014, DOI: 10.1016/j.cosrev.2014.07.001. Available online.pre-print ]
Barbara Kordy, Sjouke Mauw, Saša Radomirović, Patrick Schweitzer. Attack-defense trees. Journal of Logic and Computation, volume 24(1), pages 55–87. Oxford Journals, 2014. [ pre-print ]
Alessandra Bagnato, Barbara Kordy, Per Håkon Meland, Patrick Schweitzer. Attribute Decoration of Attack-Defense Trees. International Journal of Secure Software Engineering, volume 3(2), pages 1-35. IGI Global, 2012. [ .pdf ] [ excellence award ]

Peer-reviewed international conferences and workshops

Barbara Kordy, Piotr Kordy, Yoann van den Boom. SPTool - Equivalence Checker for SAND Attack Trees. The Proceedings of the 11th International Conference on Risks and Security of Internet and Systems (CRiSIS'16), volume 10158 of Lecture Notes in Computer Science, Springer, pages 105-113, Springer, 2017. [ .pdf ] [ SPTool website ]
Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Saša Radomirović, Rolando Trujillo-Rasua. Attack Trees with Sequential Conjunction. The Proceedings of the 30th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection (IFIP SEC'15), volume 455 of IFIP Advances in Information and Communication Technology, pages 339-353, Springer, 2015. [ extended version ]
Barbara Kordy, Patrick Schweitzer, Marc Pouly. A Probabilistic Framework for Security Scenarios with Dependent Actions. The Proceedings of The 11th International Conference on Integrated Formal Methods (iFM'14), volume 8739 of Lecture Notes in Computer Science, pages 256–271, Springer, 2014. [ .pdf ]
Barbara Kordy, Piotr Kordy, Sjouke Mauw, Patrick Schweitzer. ADTool: Security Analysis with Attack-Defense Trees The Proceedings of the 10th International Conference on Quantitative Evaluation of Systems (QEST'13), volume 8054 of Lecture Notes in Computer Science, pages 173-176, Springer, 2013. [ extended version ]
Barbara Kordy, Sjouke Mauw, Patrick Schweitzer. Quantitative Questions on Attack-Defense Trees. The proceedings of the 15th Annual International Conference on Information Security and Cryptology (ICISC'12), volume 7839 of Lecture Notes in Computer Science, pages 49-64, Springer, 2013. [ extended version ]
Barbara Kordy, Saša Radomirović. Constructing Optimistic Multi-party Contract Signing Protocols. Proceedings of Computer Security Foundations Symposium (CSF'12), IEEE, pages 215-229, 2012. [ .pdf ]
Barbara Kordy, Marc Pouly, Patrick Schweitzer. Computational Aspects of Attack-Defense Trees. In Security and Intelligent Information Systems (SIIS 2011), volume 7053 of Lecture Notes in Computer Science, pages 103-116, Springer, 2011. [ .pdf ]
Barbara Kordy, Sjouke Mauw, Saša Radomirović, Patrick Schweitzer. Foundations of Attack-Defense Trees. In Formal Aspects of Security and Trust (FAST'10) , volume 6561 of Lecture Notes in Computer Science, pages 80-95. Springer, 2011. [ .pdf ]
Barbara Kordy, Sjouke Mauw, Matthijs Melissen, and Patrick Schweitzer. Attack-defense trees and two-player binary zero-sum extensive form games are equivalent. In Proceedings of the Conference on Decision and Game Theory for Security (GameSec'10), volume 6442 of Lecture Notes in Computer Science, pages 245-256. Springer, 2010. [ .pdf ]
Barbara Kordy. A Rewrite Approach for Pattern Containment. In Recent Trends in Algebraic Development Techniques (WADT'08), volume 5486 of Lecture Notes in Computer Science, pages 236-250. Springer, 2009. [ .pdf ]
Barbara Fila-Kordy. A Rewrite Approach for Pattern Containment - Application to Query Evaluation on Compressed Documents. In Structure-Based Compression of Complex Massive Data, number 08261 in Dagstuhl Seminar Proceedings. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, 2008.
Barbara Fila and Siva Anantharaman. A Clausal View for Access Control and XPath Query Evaluation. In pre-proceedings of The 17th International Symposium on Logic-Based Program Synthesis and Transformation (LOPSTR'07), Kongens Lyngby, Denmark, 2007. [ .pdf ]
Barbara Fila and Siva Anantharaman. Automata for Positive Core XPath Queries on Compressed Documents. In Herman, M., Voronkov, A., eds.: Logic for Programming, Artificial Intelligence, and Reasoning (LPAR'06), volume 4246 of LNAI, pages 467-481. Springer, 2006. [ extended version  ]
Barbara Fila and Siva Anantharaman. Querying Compressed Documents with Tree/Dag Automata. In proceedings of The Third Taiwanese-French Conference on Information Technology (TFIT'06), LORIA, Nancy, France, 2006.

Edited proceedings

Barbara Kordy, Mathias Ekstedt, and Dong Seong Kim, editors. Proceedings of the Third International Workshop on Graphical Models for Security, GraMSec 2016, Lisbon, Portugal, June 27, 2016, volume 9987 of LNCS, Springer, 2016. [ from publisher ]
Sjouke Mauw, Barbara Kordy, and Sushil Jajodia, editors. Proceedings of the Second International Workshop on Graphical Models for Security, GraMSec 2015, Verona, Italy, July 13, 2015, volume 9390 of LNCS, Springer, 2015. [ from publisher ]
Barbara Kordy, Sjouke Mauw, and Wolter Pieters, editors. Proceedings of the First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, April 12, 2014, volume 148 of EPTCS, 2014. [ from publisher ]

Peer-reviewed national publications

Thomas Genet, Barbara Kordy, and Amaury Vansyngel. Vers un outil de vérification formelle légère pour OCaml. In Dadeau, F., and Le Gall, P., eds.: 14èmes journées Approches Formelles dans l'Assistance au Développement Logiciel (AFADL'15), pages 28-33. June 9-10, 2015, Bordeaux, France. [  AFADL'15 Proceedings  ]

Ph.D. thesis

Barbara Kordy. Automates pour l'analyse de documents XML compressés, applications à la sécurité d'accès. University of Orléans, November 2008. [ .pdf ]