Laurent Bussard

Laurent Bussard
SENIOR APPLIED RESEARCHER
.

I am working at Microsoft Research since 2004. In 2010, I joined the Languages and Tools team at European Microsoft Innovation Center (EMIC) in Aachen, Germany. Before, I was part of the Security and Privacy team at EMIC and was mainly involved in European collaborative research projects. In 2004, I finished my PhD in network security at Eurecom Institute (Sophia-Antipolis, France) and ENST (Paris) with Prof. Refik Molva as supervisor. The main topic of this work was security of pervasive computing environments in terms of access control, trust establishment, and privacy. I received my Master of Science in networks and distributed systems (DEA-RSD) from the Polytech Nice-Sophia (former ESSI) and INRIA Sophia in 2000. From 1995 to 1999, I worked as an engineer in software development at Siemens in Switzerland. I was mainly involved in projects related to the telecommunication management network. Before, I studied telecommunication at HEIG-VD (former EIVD) in Yverdon, Switzerland.

Contact

E-mail   
LinkedIn   http://www.linkedin.com/in/laurentbussard 

 

Contributions to Internal Research Projects

  • FORMULA - Modeling Foundations: FORMULA (Formal Modeling Using Logic Programming and Analysis) is a modern formal specification language targeting model-based development (MBD). It is based on algebraic data types (ADTs) and strongly-typed constraint logic programming (CLP), which support concise specifications of abstractions and model transformations. Around this core is a set of composition operators for composing specifications in the style of MBD.
  • Data Usage and Privacy Policies: This project involves developing a new language for specifying data usage and privacy policies in the context of distributed web services, using SecPAL as a starting point. The new language lets services specify how they will handle user data and to which third parties this data may be disclosed. On the user side, the language specifies restrictions and obligations on data usage and forwarding.

Interests

  • Research
    • Applications of logical inference to policies and management.
    • Specification and enforcement of privacy. Usage control in terms of authorizations, delegations and obligations.
    • Credentials combining unlinkability and non-transferability
    • Proof of proximity and location
  • Engineering
    • Scalable application of inference engines to real problems.
    • Security of distributed systems (Web Services, STS, WCF)
    • Secure software engineering, threat modeling.
    • Project management, agile development.
    • Other interests: Trusted Computing Platforms, Rights Managements.

Collaborative Research Projects

  • PrimeLife: Bringing sustainable privacy and identity management to future networks and services
  • SeCSE: Service Centric System Engineering
  • FIDIS: Future of Identity in the Information Society (Network of Excellence)
  • MOSQUITO: Mobile Workers’ Secure Business Applications in Ubiquitous Environments (STREP FP6)
  • WiTness: WIreless Trust for mobile busiNESS (STREP FP5)

Program Committees

Recent Publications

All Publications

2011

[40] Laurent Bussard, Gregory Neven, and Franz-Stefan Preiss. Matching Privacy Policies and Preferences: Access Control, Obligations, Authorisations, and Downstream Usage. Chapter in Privacy and Identity Management for Life. Pages 313-326. June 2011. Springer. ISBN 978-3-642-20316-9

[39] Ulrich Pinsdorf, Laurent Bussard, Sebastian Meissner, Jan Schallaböck, and Stuart Short. Privacy for Service Oriented Architectures. Chapter in Privacy and Identity Management for Life. Pages 383-412. June 2011. Springer. ISBN 978-3-642-20316-9

[38] Laurent Bussard and Ulrich Pinsdorf. Abstract Privacy Policy Framework: Addressing Privacy Problems in SOA. In proceedings of iNetSec 2011, Open Problems in Network Security. June 2011.

2010

[37] Moritz Y. Becker, Alexander Malkis, and Laurent Bussard. A Practical Generic Privacy Language. In Sixth International Conference on Information Systems Security (ICISS 2010). December 2010. [full text]

[36] Slim Trabelsi, Akram Njeh, Laurent Bussard, and Gregory Neven. PPL Engine: A Symmetric Architecture for Privacy Policy Handling. Position paper at W3C Workshop on Privacy and data usage control. October 2010.

[35] Laurent Bussard, Gregory Neven, and Jan Schallaböck. Data Handling: Dependencies between Authorizations and Obligations. Position paper at W3C Workshop on Privacy and data usage control. October 2010. [full text]

[34] Laurent Bussard, Gregory Neven, and Franz-Stefan Preiss. Downstream Usage Control. In proceedings of IEEE Policy 2010. July 2010. [related report]

[33] Moritz Y. Becker, Alexander Malkis, and Laurent Bussard. S4P: A Generic Language for Specifying Privacy Preferences and Policies, Microsoft Tech. Report MSR-TR-2010-32. April 2010. [full text]

2009

[32] Laurent Bussard and Moritz Y. Becker. Can Access Control be Extended to Deal with Data Handling in Privacy Scenarios? Position paper at W3C Workshop on Access Control Application Scenarios. November 2009. [full text]

[31] C.A. Ardagna, E. Pedrini, S. De Capitani di Vimercati, P. Samarati, L. Bussard, G. Neven, F-S. Preiss, S. Paraboschi, M. Verdicchio, D. Raggett, and S. Trabelsi. PrimeLife Policy Language, Project's position paper at W3C Workshop on Access Control Application Scenarios. November 2009.

[30] L. Bussard, A. Nano, and U. Pinsdorf. Delegation of Access Rights in Multi-Domain Service Compositions. In IDIS Journal (Identity in the Information Society). Volume 2, number 2. [full text]

[29] Moritz Y. Becker, Alexander Malkis, and Laurent Bussard. A Framework for Privacy Preferences and Data-Handling Policies, Microsoft Tech. Report MSR-TR-2009-128. September 2009. [full text]

[28] M. Ali, L. Bussard, and U. Pinsdorf. Obligation Language and Framework to Enable Privacy-aware SOA. In proceedings of workshop on Data Privacy Management (DPM'09) at ESORICS 2009.

[27] S. Brands, L. Bussard, J. Claessens, C. Geuer-Pollmann, and U. Pinsdorf. High-Tech ID and Emerging Technologies, Contributions to chapter in book, The Future of Identity in the Information Society, Springer, ISBN: 978-3-540-88480-4

2008

[26] L. Bussard, E. Di Nitto, A. Nano, O. Nano, and G. Ripa. An Approach to Identity Management for Service Centric Systems. ServiceWave 2008, Madrid, Spain. December 2008. [Related video]

2006

[25] S. Lachmund, L. Bussard, E. Olk, and F. Fransen. An Infrastructure for Gaining Trust in Context Information. Context Information. Workshop on The Value of Security through Collaboration (SECOVAL'06) at IEEE SECURECOMM conference, Baltimore, MD, USA. September 2006.

[24] S. Lachmund, T. Walter, L. Bussard, L. Gomez, and E. Olk. Context-Aware Access Control - Making Access Control Decisions Based on Context Information. International Workshop on Ubiquitous Access Control (IWUAC 2006). San Jose, California, USA. July 17, 2006.

[23] L. Bussard and F. Fransen. From Location-Awareness to Provable Location. Presented at the 15th IST Mobile & Wireless Communications Summit. June 2006.

2005

[22] L. Bussard, J. Claessens, S. Crosta, Y. Roudier, A. Zugenmaier. Can we take this off-line? - Credentials for Web services supported nomadic applications. In Proceedings of 4th Conference on Security and Network Architectures (SAR'05), Batz sur Mer, France, June 2005. [full text]

[21] L. Bussard and W. Bagga. Distance-bounding proof of knowledge to avoid real-time attacks. In proceedings of (IFIP/SEC2005), 20th IFIP International Information Security Conference. Chiba, Japan. June 2005. [full text]

2004 (PhD)

[20] T. Walter, L. Bussard, Y. Roudier, J. Haller, R. Kilian-Kehr, J. Posegga, and P. Robinson. Secure Mobile Business Applications - Framework, Architecture, and Implementation. In Information Security Technical Report, vol. 9, no. 4, special issue on Mobile Security, Elsevier, 2004, pages 6-21. [full text]

[19] L. Bussard. Trust Establishment Protocols for Communicating Devices. PhD Thesis, Eurecom-ENST, September 2004. [full text]
A summary in French is available at the end of this document.

[18] L. Bussard and Y. Roudier. Protecting Applications and Devices in Nomadic Business Environments. In Proceedings of 3rd Conference on Security and Network Architectures (SAR'04), La Londe, France, June 2004. [full text]

[17] L. Bussard, W. Bagga. Distance-bounding proof of knowledge protocols to avoid terrorist fraud attacks. Eurecom Research Report RR-04-109. [full text]

[16] L. Bussard and R. Molva. Establishing Trust with Privacy. In proceedings of the twelve international workshop on security protocols (SP'04), Cambridge, UK, April 2004. [full text]

[15] L. Bussard, R. Molva, Y. Roudier. Combining history-based trust establishment with distance-bounding protocols.
Eurecom Research Report RR-04-100. [full text]

[14] L. Bussard, R. Molva, Y. Roudier. Protecting applications and devices in nomadic business environments. Eurecom Research Report RR-04-101. [full text]

[13] L. Bussard, R. Molva, and Y. Roudier. History-Based Signature or How to Trust Anonymous Documents. In Proceedings of the Second Conference on Trust Management (iTrust'04), LNCS 2995, pages 78-92, Oxford, UK, March 2004. [full text]

[12] L. Bussard, Y. Roudier, and R. Molva. Untraceable Secret Credentials: Trust Establishment with Privacy. In Proceedings of the Workshop on Pervasive Computing and Communications Security (PerSec'04) at PerCom'04, pages 122-126, Orlando, USA, March 2004. [full text]

[11] L. Bussard and R. Molva. One-Time Capabilities for Authorizations without Trust. In Proceedings of the second IEEE conference on Pervasive Computing and Communications (PerCom'04), pages 351-355, Orlando, USA, March 2004. [full text]

[10] T. Walter, L. Bussard, P. Robinson, and Y. Roudier. Security and trust issues in ubiquitous environments - the business-to-employee dimension. In Workshop on Ubiquitous Services and Networking in at SAINT'04, Tokyo, Japan, January 2004. [full text]

2003

[9] L. Bussard, Y. Roudier, R. Kilian Kehr, and S. Crosta. Trust and Authorization in Pervasive B2E Scenarios. In Proceedings of the 6th Information Security Conference (ISC'03), LNCS 2851, pages 295-309, Bristol, UK, October 2003. [full text]

[8] L. Bussard, Y. Roudier. Background signature for sensor networks.
Eurecom Research Report RR-03-076. [full text]

[7] L. Bussard, R. Molva. One-time authorization for off-line interactions. Eurecom Research Report RR-03-077. [full text]

[6] L. Bussard and Y. Roudier. Embedding Distance-Bounding Protocols within Intuitive Interactions. In Proceedings of Conference on Security in Pervasive Computing (SPC'03), LNCS 2802, pages 143-156, Boppard, Germany, March 2003. [full text]

2002

[5] S. Loureiro, L. Bussard, and Y. Roudier. Extending Tamper-Proof Hardware Security to Untrusted Execution Environments. In Proceedings of the Fifth Smart Card Research and Advanced Application Conference (CARDIS'02) - USENIX - IFIP working group 8.8 (smart cards), pages 111-124, San Jose, California, November 2002. [full text]

[4] L. Bussard and Y. Roudier. Authentication in Ubiquitous Computing. In Workshop on Security in Ubiquitous Computing at UBICOMP'02, Goeteborg, Sweden, October 2002. [full text]

2000 (Master)

[3] L. Bussard, L. Carver, E. Ernst, M. Jung, M. Robillard, and Andreas Speck. Safe Aspect Composition. Workshop on Aspects and Dimensions of Concern at ECOOP'2000, Cannes, France, June 2000.

[2] L. Bussard. Towards a pragmatic composition model of Corba services based on AspectJ. Master thesis, ESSI-I3S, 2000.

[1] L. Bussard. Towards a Pragmatic Composition Model of CORBA Services Based on AspectJ. In Workshop on Aspects and Dimensions of Concern at ECOOP'2000, Cannes, France, June 2000.