By Topic

2012 National Days of Network Security and Systems

20-21 April 2012

Filter Results

Displaying Results 1 - 25 of 34
  • [Front cover]

    Publication Year: 2012, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (541 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):iii - iv
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2012, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (27 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committies

    Publication Year: 2012, Page(s):vii - viii
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • Jns2 (2012) - formalisation des politiques de securite, gestion de la confiance, management de la securite

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • Modélisation des processus de la norme ISO 27005

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (98 KB) | HTML iconHTML

    The aim of this paper consists of the presentation of a UML modeling of different processes of ISO 27005, in order to translate the guidelines "theoretical" standard of risk management and implement on the ground. This modeling is demonstrated through risk management relating to the case study presented below. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A maturity metric based approach for eliciting SOA security requirements

    Publication Year: 2012, Page(s):7 - 11
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (125 KB) | HTML iconHTML

    The emergence of service-oriented architecture (SOA) as an approach for integrating applications that expose services presents many new challenges to organizations resulting in significant risks to their business. Particularly important among those risks are failures to effectively address quality attribute requirements such as security. Properly defining and configuring security requirements in S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formalisation d'une session collaborative sécurisée

    Publication Year: 2012, Page(s):12 - 17
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    Les applications collaboratives sont des applications distribuées à travers lesquelles plusieurs utilisateurs peuvent interagir et partager les mêmes objets pour atteindre un objectif commun. Ainsi la sécurité des interactions entre les membres d'un groupe collaboratif constitue un défi majeur auquel il faut faire face. Ceci afin d'assurer des interactions... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Etat de l'art des systèmes de réputation en e-commerce

    Publication Year: 2012, Page(s):18 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (71 KB) | HTML iconHTML

    La confiance est un pré-requis nécessaire à tout utilisateur d'une application e-commerce. Certes pour ‘installer’ la confiance chez un utilisateur, des systèmes de gestion de la confiance ont été développés pour pouvoir créer et faire propager la confiance au sein des communautés en ligne. Les systèmes de r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vers une formalisation des politiques de sécurité

    Publication Year: 2012, Page(s):24 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    En général, les politiques de sécurité sont des règles exprimant des contraintes pour sécuriser un système donné. Souvent ces règles sont exprimées sous forme de texte informel, ce qui mène alors à des ambigüités et à des contradictions lors de leur implémentation. L'objectif de ce trava... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptographie, watermarking, tatouage [breaker page]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (12 KB)
    Freely Available from IEEE
  • An elliptic curve cryptography based on matrix scrambling method

    Publication Year: 2012, Page(s):31 - 35
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB) | HTML iconHTML

    A new method on matrix scrambling based on the elliptic curve will be proposed in this paper. The proposed algorithm is based on random function and shifting technique of circular queue. In particular, we first transform the message into points on the elliptic curve as is the embedding system M→PM and then apply the encryption/decryption technique based on matrix scrambling. Our scheme is s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A propos du calcul multiparti sécurisé

    Publication Year: 2012, Page(s):36 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB)

    La protection de la vie privée de toute personne représente un droit à préserver. Alors quavec l'extension des technologies de l'information, la collecte des données personnelles devient un objectif de plus en plus facile à atteindre. Dans cette perspective, nous présentons dans ce travail le concept de calcul multiparti sécurisé. Dans... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Méthode et algorithme d'identification des signaux vocaux à base des transformations orthogonales adaptables

    Publication Year: 2012, Page(s):41 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (193 KB)

    Résumé — Dans ce présent article on propose une approche assurant l'augmentation de la certitude de l'identification des signaux vocaux. Cette approche est basée sur une méthode et algorithme pour l'extraction et la formation des caractéristiques informatives obtenues lors de l'analyse des signaux vocaux. Pour cela, on propose l'application des tran... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generic group Gna, b

    Publication Year: 2012, Page(s):46 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB) | HTML iconHTML

    In cryptography, Search generic groups is very important to ensure the security of information. In this work we study the algorithms properties for the group Ena,b. We establish that Ena,b is a generic group. The implementations from the algorithms are by Maple. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analyse de la prédictibilité de l'algorithme R.A NMJ

    Publication Year: 2012, Page(s):52 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (226 KB) | HTML iconHTML

    Cet article présente les résultats de l'analyse des caractéristiques dynamiques de l'algorithme R.A NMJ qui est un régénérateur de suites binaires cryptographiquement sûres. L'objectif été de mettre à l'évidence le comportement chaotique de ce régénérateur à travers le calcul du plus grand expo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JNS2 (2012) Securite des reseaux [breaker page]

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (11 KB)
    Freely Available from IEEE
  • Evaluation de la cybercriminalité au Maroc: Cas d'un établissement universitaire

    Publication Year: 2012, Page(s):56 - 61
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    Depuis quelques années, le Maroc connaît une croissance considérable d'attaques relevant de la cybercriminalité. Ces attaques ont comme cibles les réseaux et systèmes appartenant à des individus, entreprises, organisations et administrations. Cette croissance évolue en parallèle avec l'informatisation accrue que connaît le pays ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploring opportunistic scheduling in ad-hoc network with physical layer security

    Publication Year: 2012, Page(s):62 - 67
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (345 KB) | HTML iconHTML

    In this paper, scheduling scheme under physical layer security is studied. This emerging technology is introduced to provide perfect secrecy to wireless ad-hoc network. However, a big loss of network performance is also imported to the system. As links with different physical layers coexist in the wireless network, service qualities like overall throughput are affected if traditional scheduling sc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless sensor network: Security challenges

    Publication Year: 2012, Page(s):68 - 72
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (61 KB) | HTML iconHTML

    With the advent of low-power wireless sensor networks, a wealth of new applications at the interface of the real and digital worlds is emerging. A distributed computing platform that can measure properties of the real world, formulate intelligent inferences, and instrument responses, requires strong foundations in distributed computing, artificial intelligence, databases, control theory, and secur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cloud computing

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (12 KB)
    Freely Available from IEEE
  • Computaion integrity mechanism for MapReduce in cloud computing system

    Publication Year: 2012, Page(s):74 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (119 KB) | HTML iconHTML

    MapReduce has been widely used as a powerful parallel data processing model and is adopted by most cloud providers to build cloud computing framework. However, in open cloud systems, security of computation becomes a great challenge. Moreover, MapReduce data-processing services are long-running, which increases the possibility that an adversary launches an attack on the workers and make them behav... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Les défis de sécurité dans le Cloud Computing: Problèmes et solutions de la sécurité en Cloud Computing

    Publication Year: 2012, Page(s):80 - 85
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB) | HTML iconHTML

    Le Cloud Computing prend de plus en plus sa place dans le monde du Business des systèmes d'information. Il propose plusieurs avantages et plusieurs opportunités dans le futur pour les entreprises. Dans cet article, nous présentons les caractéristiques, avantages et faiblesses du Cloud Computing (CC) en particulier ceux liés à la sécurité. Nou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.