Jean-Marc Seigneur

Jean-Marc Seigneur
University of Geneva | UNIGE · CUI, Medi@LAB, SdS/G3S

18.89
 · 
PhD in Computer Science
About
115
Research items
5,141
Reads
1,104
Citations
Introduction
http://ch.linkedin.com/in/jmseigneur/
Research Experience
Oct 2001 - Sep 2005
Network
Cited By
Followers
Projects
Project (1)
Archived project
http://copelabs.ulusofona.pt/~uloop
Research
Research items (115)
Chapter
Full-text available
Humans have been using prosthetics for a long time, especially to recover lost abilities such as eye sight with glasses, but it seems there is an increasing trend towards augmenting the human beyond its capabilities. The paper presents the results of a survey carried out in April 2018 regarding the willingness of people to use brain implants to imp...
Chapter
Full-text available
Multifactor authentication is one of the de facto standards for systems requiring strong security. In most cases, multifactor authentication is complex and not user-friendly because it requires additional steps as far as end users are concerned. With two-factor authentication, in addition to entering a username and a password (first factor), users...
Article
Full-text available
The purpose of this study is to develop a numerical methodology based on real data from wind tunnel experiments to investigate the effect of the ski jumper’s posture and speed on aerodynamic forces in a wide range of angles of attack. To improve our knowledge of the aerodynamic behavior of the ski jumper and his equipment during the early flight ph...
Article
Purpose - The Bring-Your-Own-Device (BYOD) paradigm favors the use of personal and public devices and communication means in corporate environments, thus representing a challenge for the traditional security and risk management systems. In this dynamic and heterogeneous setting, the purpose of this paper is to present a methodology called opportuni...
Chapter
It seems generally accepted that the major threat for company security occurs from within the organisation itself. Given the potential threats for the value attached to information resources, companies are increasing their efforts to counteract these risks, introduced by employees. Many company security technologies are strongly focused on analysin...
Article
Full-text available
In its list of top ten smartphone risks, the European Union Agency for Network and Information Security ranks network spoofing attacks as number 6. In this paper, we present how we have validated different computational trust and reputation management techniques by means of implemented prototypes in real devices to mitigate malicious legacy Wi-Fi h...
Conference Paper
At time of writing, several affordable Head-Mounted Displays (HMD) are going to be released to the mass market, most of them for Virtual Reality (VR with Oculus Rift, Samsung Gear...) but also for indoor Augmented Reality (AR) with Hololens. We have investigated how to adapt such HMD as Oculus Rift for an outdoor AR ski slope. Rather than setting p...
Conference Paper
Electrosmog is the electromagnetic radiation emitted from wireless technology such as Wi-Fi hotspots or cellular towers, and poses potential hazard to human. Electrosmog is invisible, and we rely on detectors which show level of electrosmog in a warning such as numbers. Our system is able to detect electrosmog level from number of Wi-Fi networks, c...
Conference Paper
Full-text available
Two-factor authentication can significantly reduce risks of compromised accounts by protecting from weak passwords, online identity theft and other online fraud. This paper presents a new easy solution to implement two-factor authentication without affecting user experience by introducing minimum user interaction based on standard Wi-Fi. It has bee...
Conference Paper
In its list of top ten smartphone risks, the European Union Agency for Network and Information Security ranks Network Spoofing Attacks as number 6. In this paper, we present how we have validated different computational trust management techniques by means of implemented prototypes in real devices to mitigate malicious legacy Wi- Fi hotspots includ...
Conference Paper
Full-text available
With the advent of the Bring-Your-Own-Device (BYOD) trend, mobile work is achieving a widespread diffusion that challenges the traditional view of security standard and risk management. A recently proposed model, called opportunity- enabled risk management (OPPRIM), aims at balancing the analysis of the major threats that arise in the BYOD setting...
Article
Full-text available
While trust management systems can be used in isolation in order to provide robustness to a given architecture, cooperation incentives can be used to complement and collaborate with trust management systems as users can benefit from them while using the system, thus encouraging user’s good behaviour. We have designed a fully decentralized trust man...
Conference Paper
Incentive strategies are used in collaborative user-centric networks, the functioning of which depends on the willingness of users to cooperate. Classical mechanisms stimulating cooperation are based on trust, which allows to set up a reputation infrastructure quantifying the subjective reliance on the expected behavior of users, and on virtual cur...
Conference Paper
Full-text available
There are still many issues to achieve collaborative Wi-Fi sharing: the legal liability of the sharer; high data access costs in some situations (mobility when going over a monthly subscription quota, roaming…); no appropriate incentives to share. Current trust management could exclude the malicious users, but still could not foster Wi-Fi sharing....
Conference Paper
Full-text available
Ces dernières années, les Massive Open Online Courses (MOOCs) prennent de plus en plus d'ampleur, y compris commercialement. En effet, des acteurs privés ont mis en place un certain nombre de services en ligne payants autour des MOOCs. Le Centre national d'enseignement à distance (CNED) français constate lui-même que « le marché de la formation à d...
Chapter
This White Paper provides an insight on Trust Management within the context of the User-centric Wireless Local Loop (ULOOP) project, depicting the main principles and the overall trust management framework, and also describing its main individual components. It has as motivation to disseminate ULOOP concepts and to raise awareness towards trust man...
Article
A few years ago, an experimental facility composed of networking gear and simulation tools was sufficient for testing the main features of a prototype before the final product could be launched to the Internet market. This paradigm has certainly changed, but the lack of platforms enabling the realistic assessment of the different facets of a produc...
Article
Full-text available
Online users use more and more social login on third-party sites or applications. To use an existing account to login is faster than to fill in personal information forms over and over again. However, many online users, even those who frequently use social login systems, are not aware of the policies and conditions they agree with. They are often u...
Conference Paper
Full-text available
Environments such as ski slopes are highly dynamic, as users are constantly moving at high speeds and in different directions, and also many users are foreign tourists, not locals, thus having to roam if they want to access the Web. Unfortunately, this introduces costs that discourage the roaming users to connect. In order to solve this issue, a co...
Chapter
Digital identity is the ground necessary to guarantee that the Internet infrastructure is strong enough to meet basic expectations such as security and privacy. Anywhere anytime mobile computing is becoming true. In this ambient intelligent world, the choice of the identity management mechanisms will have a large impact on social, cultural, busines...
Chapter
Original quotation in French: La confiance ne nous laisse pas tant de liberté, ses règles sont plus étroites, elle demande plus de prudence et de retenue, et nous ne sommes pas toujours libres d'en disposer: il ne s’agit pas de nous uniquement, et nos intérêts sont mêlés d’ordinaire avec les intérêts des autres. Elle a besoin d’une grande justesse...
Chapter
Digital identity is needed to guarantee that the Internet infrastructure is strong enough to meet basic expectations such as security and privacy. In this ambient, intelligent world, the choice of the identity management mechanisms will have a large impact on social, cultural, business, and political aspects: privacy is a human need and the all of...
Conference Paper
Full-text available
There are still many issues in order to achieve collaborative Wi-Fi sharing: the legal liability of the sharer in many countries with illegal download monitoring is a clear barrier to users' Wi-Fi network sharing, worldwide strong authentication is still not available, data access costs are still high in some situations (mobility when going over a...
Technical Report
Full-text available
This document represents the report D3.A of the EU FP7 IST project ULOOP (User-centric Wireless Local Loop, grant Number 257418). It corresponds to an extension of Deliverable D3 (ULOOP High Level Architecture Specification) and provides the details of the specification of all ULOOP technical blocks, based on a flowchart representation and connecti...
Conference Paper
Full-text available
This technological demonstration goes over a new trust management framework which can assist in achieving secure connections in wireless networks, without necessarily implying the use of strong security associations. The demonstration is based on open-source software, and has been developed to run on OpenWRT as well as on Android.
Conference Paper
Full-text available
This technological demonstration goes over a new trust management framework which can assist in achieving secure connections in wireless networks, without necessarily implying the use of strong security associations. The demonstration is based on open-source software, and has been developed to run on OpenWRT as well as on Android.
Conference Paper
In this paper, we discuss the remaining security risk of Wi-Fi AP spoofing with current AP joining approaches and how a new solution has been developed as part of the ULOOP project in order to be more user-friendly and secure. It was an important step for increased security because our evaluation shows that even computer aware users do not know or...
Conference Paper
Full-text available
Wireless networks today are partially being formed by nodes (e.g. Internet access points, smartphones, femtocells)that are owned and carried by humans. In such scenarios where several strangers are expected to interact for the sake of robust data transmission, trust and reputation are of vital importance. As such, User Centric Networks require well...
Conference Paper
Users increasingly access corporate data from their own devices and public wireless networks such airports Wi-Fi or coworking offices. On one hand, more work is possible, but on the other hand, it is riskier because the devices and locations may be untrustworthy. However, the Bring-Your- Own-Device trend is a fact and it is the reason we survey in...
Article
Security in Wireless Sensor Network (WSN) or Internet of Things has become a hot research topic due to their wide deployment and the increasing new runtime attacks they are facing. Thereby, applications are unaware of what security mechanisms are as well as dynamic changing attacks. Accordingly, the concept that must cope with this new security cha...
Technical Report
Full-text available
This document represents deliverable D3.8 of the EU FP7 IST project ULOOP (User-centric Wireless Local Loop, grant Number 257418). It is a follow-up of deliverables D2.3, D3, and D3.a. The latter two deliverables were confidential, and so D3.8 provides to the general public a global perspective of results derived from the work developed in Work Pac...
Article
Full-text available
Security in Wireless Sensor Network has become a hot research topic due to their wide deployment and the increasing new runtime attacks they are facing. We observe that traditional security protocols address conventional security problems and cannot deal with dynamic attacks such as sinkhole dynamic behavior. Moreover, they use resources, and limit...
Conference Paper
Full-text available
Cooperation incentives are essential in user-centric networks to motivate users to share services and resources (including bandwidth, computational power, and storage space) and to avoid selfish nodes to hinder the functioning of the entire system. Virtual currency and reputation mechanisms are commonly adopted in online communities to boost partic...
Conference Paper
Full-text available
Environments such as ski slopes are highly dynamic, as users are constantly moving at high speeds and in different directions, and also many users are not locals, thus having to roam in order to be able to connect through mobile data. These two previous reasons make connectivity through regular means to be difficult to attain. This demo paper prese...
Conference Paper
Full-text available
During the last few years the amount of users with mobile devices (laptops, smart phones, tablets, etc.) with wireless connectivity capabilities has grown at an impressive rate. In the meantime, the number of Wi-Fi networks has also increased a lot, and in addition to this, the emergence and fast growth of applications such as social networking, us...
Article
Full-text available
Both free and low-priced mobile wireless networks are expanding and its users are more numerous every day. This success is particularly due to the mobility offered to users. These networks have promoted and widespread the success and availability of mobile devices and their access technologies such as Wi-Fi, WiMAX and Bluetooth. Nevertheless, despi...
Conference Paper
Happiness research findings are increasingly being taken into account in standard economics. However, most findings are based on a posteriori surveys trying to infer how happy people have been. In this paper, we argue that the advances in wearable computing, especially brain-computer interfaces, can lead to realtime measurements of happiness. We th...
Chapter
Full-text available
An increasing number of dynamic software evolution approaches is commonly based on integrating or utilising new pieces of software. This requires resolution of issues such as ensuring awareness of newly available software pieces and selection of most appropriate software pieces to use. Other chapters in this book discuss dynamic software evolution...
Chapter
Chapter8 describes how computational trust and reputation can be utilised for selecting trustworthy software pieces in a dynamically self-organising software world. This chapter advances from static to dynamic software piece selection which is necessary since trustworthiness of software piece configurations may vary over time. In this chapter, an a...
Article
Security has become a key issue for any huge deployment of Wireless Sensor Network (WSN). Moreover, data reliability combined with energy loss minimization is really a challenging task, particularly to maintain survivability of the WSN under attacks such as sinkhole. Therefore, new security mechnisms must be in accordance with energy consumption co...
Book
This book constitutes the refereed proceedings of two workshops held in conjunction with the 8th FIRA International Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, in Crete, Greece, in June 2011. STA 2011 is the first conference after the merger of the successful SSDU, UbiSec, and TRUST symposium series previo...
Conference Paper
Since Wireless and mobile networks have become increasingly heterogeneous and particularly dynamic, multiple security requirements must be addressed in a flexible and dynamic manner to cope with runtime changing context. Therefore, a generic security adaptation reference monitor must be developed to deal with extremely dynamic security conditions a...
Article
Wi-Fi networks and its users are increasing more and more. Unfortunately, the risk of using one Wi-Fi or another varies and there is no means of selecting the most trustworthy hotspot. There are different solutions like websites that provide a way for the users to rate the hotspot after they have used it. However, there is no means to verify whethe...
Article
Full-text available
Nowadays, mobile users can switch between different available networks, for example, nearby WiFi networks or their standard mobile operator network. Soon it will be extended to other operators. However, unless telecommunication operators can directly benefit from allowing a user to switch to another operator, operators have an incentive to keep the...
Article
Full-text available
More and more people rely on Web information and with the advance of Web 2.0 technologies they can increasingly easily participate to the creation of this information. Country-level politicians could not ignore this trend and have started to use the Web to promote them or to demote their opponents. This paper presents how candidates to a French may...
Conference Paper
Full-text available
There is some concern regarding the effect of smart phones and other wearable devices using wireless communication and worn by the users very closely to their body. In this paper, we propose a new network switching selection model and its algorithms that minimize the non-ionizing radiation of these devices during use. We validate the model and its...
Chapter
Reputation management is a rather new field in the realm of computer security, mainly due to the fact that computers and software are more and more involved in open networks. In these open networks, any encountered users may become part of the user base and associated interactions, even if there is no a priori information about those new users. The...
Chapter
This chapter illustrates the necessity of mobility and the importance of identity in future ambient intelligent environments. Mobile identity management must support a wide range of information technologies and devices with critical requirements such as usability on the move, privacy, scalability, and energy-friendliness. Digital identity lays the...
Chapter
Full-text available
The goal of the present chapter is to provide location-based services for disaster management. The application involves services related to the safety of the people due to an unexpected event. The current prototype is implemented for a specific issue of disaster management which is road traffic control. The users can ask requests on cell phones or...
Chapter
Most other chapters of this book discuss computational models of trust in broader terms, giving definitions of trust, explaining how trust should evolve over time, surveying the different facets of trust .On the other hand, this chapter has a clear focus on the important element of identity in computational trust mechanisms. Trust and reputation ar...
Conference Paper
Computational trust and online reputation services are reaching the mass market with pioneering startup reputation companies such as Venyo (http://www.venyo.org). The trust models and metrics used in those reputation services can again benefit from the TRECK track contributions, especially regarding their combination with recommender systems and th...
Chapter
Weiser (1991) envisioned ubiquitous computing with computing and communicating entities woven into the fabrics of every day life. This chapter deals with the survivability of ambient resource-constrained wireless computing nodes, from fixed sensor network nodes to small devices carried out by roaming entities, for example, as part of a personal are...
Conference Paper
Computing anytime anywhere is more and more the rule. In this ambient intelligent world, the choice of identity mechanisms will have a large impact on its social, cultural, business and political aspects. Privacy is a human need and the whole of society would suffer from its demise. Moreover, people have a hectic life and cannot spend their time ad...
Conference Paper
Full-text available
The Internet is soon going to be extended with the information collected from sensor networks deployed in wild remote regions of the world. For example, sensors may be dispersed in the jungle and forward information about the sensed states of the natural ecosystem, such as, humidity, fire detection However, it is still quite easy for attackers to d...
Conference Paper
Open Source Software (OSS) projects have the unique opportunity to reach an unprecedented level of software quality by tapping into its community and collaborative power. However, the community process of collaborative software Quality Assessment (QA) may not reach its full potential or worse be easily jeopardised by malevolent entities because the...
Article
We have proposed an interactive assistance system (IAS) to help the operators of a semi-automated industrial unit to increase their work productivity. At any moment the system suggests them to choose among a limited subset of possible tasks of higher priority. However, a remaining issue in this IAS is when one or more operators do not cooperate pro...
Article
Full-text available
Spatial messaging is a term that defines the virtual publication of data in physical places. Generally, anyone in the neighborhood of such a publication point gets the message. Frameworks allowing the users to publish freely spatial messages already exist. However, the experiences realized with volunteers showed that there is only little interest i...
Article
After a long period where automation was the most important focus, the place of the human operators has been revalorized by the modern production system in order to reach higher production agility. In this context, we have proposed an assistance system that provides to the operators of a unit a limited subset of the most productive tasks, the new o...
Article
Full-text available
MIX has recently been proposed as a new sensor scheme with better energy management for data-gathering in Wireless Sensor Networks. However, it is not known how it performs when some of the sensors carry out sinkhole attacks. In this paper, we propose a variant of MIX with adjunct computational trust management to limit the impact of such sinkhole...
Chapter
This chapter introduces entification as a means of allowing the users of e-services to create and manage multiple pseudonyms in a decentralized way; thereby limiting the ability to link transactions and users, whilst mitigating attacks due to the ownership of multiple identities. The entification framework fills the gap between the identity and the...
Conference Paper
Full-text available
The problem of identifying trustworthy information on the World Wide Web is becoming increasingly acute as new tools such as wikis and blogs simplify and democratize publications. Wikipedia is the most extraordinary ex- ample of this phenomenon and, although a few mechanisms have been put in place to improve contributions quality, trust in Wikipedi...
Article
Full-text available
The vision of pervasive computing has introduced the notion of a vast, networked infrastructure of heterogeneous entities interact through collaborative applications, e.g., playing a multi-player online game on the way to work. This will require interactions between users who may be marginally known or completely unknown to each other, or in situat...
Conference Paper
Full-text available
Current speed cameras alerting systems heavily rely on humans to check the trustworthiness of information sent by their users. Hence, these systems are often either expensive or suffer from drawbacks, such as incomplete information, for example, concerning mobile speed cameras. We propose an application called FoxyTag to address most of the previou...
Conference Paper
With the emerging wave of Web 2.0 applications and their core decentralised user-centric pillar, there is an increased need for mechanisms to deal with uncertainty to still reap the benefits of collaboration and filter; facilitate and support decision-making; filter and secure the large scale number of the interconnected elements of these new popul...
Article
Full-text available
A number of P2P file sharing systems have tried to rate the level of contribution and participation of peers in order to avoid free-riding by selfish peers and increased performance and reliability of file sharing among all peers. However, the proposed software rating mechanisms (including the ones that use computational models of trust) are still...
Article
Full-text available
The risk is due to two parts of the EDOS distribution platform. The first part, that is, KadoP [3], enables the publication and discovery of content in a peer-to-peer way based on a Distributed Hash Table (DHT) for indexing content in the network. As for other peer-to-peer DHTs, a major risk is that an attacker uses multiple faked identities to tak...
Conference Paper
Trustworthy decentralised identity mechanisms are promising to foster the digital business ecosystem (DBE), an EU-funded FP6 1ST Integrated Project. Progress has been made and driver small and medium enterprises (SMEs) users, which rely on the DBE technical commons, lobby for more security. However, such decentralised security mechanisms still rema...
Conference Paper
Trust-based security frameworks are increasingly popular, yet few evaluations have been conducted. As a result, no guidelines or evaluation methodology have emerged that define the measure of security of such models. This paper discusses the issues involved in evaluating these models, using the SECURE trust-based framework as a case study.
Conference Paper
Full-text available
Trading privacy for trust thanks to the linkage of pseudonyms has been proposed to mitigate the inherent conflict between trust and privacy. This necessitates fusionym, that is, the calculation of a unique trust value supposed to reflect the overall trustworthiness brought by the set of linked pseudonyms. In fact, some pieces of evidence may overla...
Conference Paper
We present the implementation of Secure and a SPAM filter that uses it to classify messages as SPAM based on trust in senders.
Article
Sustainability is a matter for all stakeholders: technologists and environmentalists, but also users and shareholders. Thanks to computational trust engines, it is possible to: 1) foster collaboration between all these stakeholders and allow them to collaborate together in a sound and trustworthy manner, and 2) promote technologies that are more su...
Article
In ubiquitous/pervasive computing environments, it is envisaged that computing elements—entities—will start interacting in an ad hoc fashion. The peer-to-peer (p2p) paradigm is appealing for such types of interaction especially with JXTA, which supports the development of reusable p2p building blocks, which facilitate implementation on any smart de...
Conference Paper
Computational models of trust and mechanisms based on the human notion of trust have been gaining momentum over the last couple of years. One reason for this is that traditional security mechanisms are challenged by open, large scale and decentralised environments. The use of an explicit trust management component goes beyond security though. Trust...
Chapter
Full-text available
A central element in the human notion of trust is to identify whom or what is under consideration. In the digital world, this is harder to achieve due to more or less trustworthy technical infrastructure between interacting parties. However, we argue that uncertain identification may enhance privacy protection. We present the role of identity and h...