Manuel Munier

Manuel Munier
Université de Pau et des Pays de l'Adour | UPPA · IUT des Pays de l'Adour

About

34
Publications
13,034
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
186
Citations
Additional affiliations
September 1999 - May 2016
Université de Pau et des Pays de l'Adour
Position
  • Professor (Assistant)

Publications

Publications (34)
Conference Paper
Full-text available
Internet of Things (IoT) is one of the key technologies in the industry 4.0 era and promotes the interconnection of numerous data sources in several sectors such as ecology, agriculture, or healthcare. Meanwhile, each entity within these connected environments carries its unique requirements and individual goals. For connected environments to gain...
Conference Paper
IoT main goal is to provide trusted high-quality services and innovative solutions to its users by transforming the captured data into meaningful information. In this context, it is in the best interest of the community to encourage entities within the IoT environment to share their data, and therefore help contribute to the overall public interest...
Conference Paper
Full-text available
Un des principaux problèmes auquel sont confrontés les enseignants, notamment en début du cycle licence, est le manque de motivation des étudiants. Une façon d'éviter que les étudiants ne soient que de simples "consommateurs" est de rendre les cours plus dynamiques et participatifs. Pour cela, nous avons testé une approche de co-construction des sa...
Conference Paper
The Smart Grid, the next generation power grid, comes with promises of widely distributed automated energy delivery, self-monitoring, self-healing, energy efficiency, utility and cost optimization. However, as attacks on the current power grid and similar systems indicate, the Smart Grid will be vulnerable to all kinds of attacks and will even rais...
Conference Paper
Full-text available
Systems of systems (SoS) are large-scale systems composed of complex systems with difficult to elicit and model emergent properties. One of the most significant challenges in the engineering of such systems is how to elicit their nonfunctional requirements such as security. In this proposal paper we introduce a Model Driven Engineering (MDE) securi...
Article
Full-text available
Résumé : Pour les besoins de nos travaux nous utilisons la notion de métadonnées pour mettre en oeuvre des mécanismes de contrôle d'usage et de gestion des risques du point de vue de la sécurité de l'information. Ces métadonnées nous permettent d'une part de définir des règles de sécurité contextuelles et d'autre part d'assurer la traçabilité des i...
Article
Full-text available
For the purposes of our work we use the concept of metadata to implement enterprise digital right management mechanisms in an intelligent document environment. Such metadata allows us to firstly define contextual security rules and secondly to ensure the information traceability. However, its use may have legal implications, especially with regard...
Conference Paper
Full-text available
Service Oriented Architectures (SOA) offer new opportunities for the interconnection of systems. However, for a company, opening its Information System to the "world" is not insignificant in terms of security. Whether to use available services or provide its own services, new technologies have introduced new vulnerabilities and therefore new risks....
Book
Published: 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SARSSI'2013)
Book
Full-text available
Published: 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SARSSI'2013)
Article
Full-text available
More sophisticated inter-organizational interactions have generated changes in the way in which organizations make business. Advanced forms of collaborations, such as Business Process as a Service (BPaaS), allow different partners to leverage business intelligence within organizations. However, although it presents powerfull economical and technica...
Conference Paper
Information security is currently one of the most important issues in information systems. This concerns the confidentiality of information but also its integrity and availability. The problem becomes even more difficult when several companies are working together on a project and that the various documents "go out of" their respective information...
Article
Full-text available
In information systems data security is one of the most important goals. This concerns the confidentiality of information but also its integrity and availability. The problem becomes even more difficult if a user wants to "checkout" a document from the information system, for example to work offline or to distribute it to other people outside the o...
Conference Paper
Full-text available
Confidentiality and consistency are two aspects of security for information systems, but mechanisms used to ensure them often support one at the expense of the other, in particular when data is not independent of the others. A new approach of access control for information systems consists in preserving several versions of the data and performing u...
Conference Paper
Full-text available
Trees are very often used to structure data. For instance, file systems are structured into trees and XML documents can be represented by trees. There are literally as many access control schemes as there are tree data structures. Consequently, an access control model which has been defined for a particular kind of tree cannot be easily adapted to...
Conference Paper
Full-text available
Colloque avec actes et comité de lecture. nationale.
Conference Paper
Full-text available
The aim of this Paper is to present our model for a generic and flexible negotiation Service and its implementation in Computer Supported Collaborative Work (CSCW) environments. Within a cooperative work environment, users naturally need negotiation support mechanisms to study possible alternatives in group decision making. The objective of our wor...
Conference Paper
Full-text available
We explore issues in providing support for information sharing, negotiations and decision-making to distributed autonomous organizations, grouped in alliances to improve their own ability to accomplish customers’ requests. In particular, we consider the case of an alliance of printshops offering similar and/or complementary print competencies and c...
Conference Paper
Full-text available
Due to the popularization of Internet, virtual enterprises are expected to become commonplace on the Web. The concept of virtual enterprise depicts the idea that many applications are the result of cross-organisational cooperation between several actors, playing different roles, who build a relational system which is structured by a common objectiv...
Thesis
Full-text available
Cette thèse présente un nouveau modèle de transactions avancé permettant non seulement la coopération entre activités par le biais d'échanges d'informations en cours d'exécution, mais également leur distribution et l'hétérogénéité de leurs relations de coopération. Notre objectif est de décentraliser le contrôle de l'application dans les activités...
Article
Full-text available
Due to the popularization of Internet, cooperative applications of project-enterprise type are expected to become commonplace on the WEB. By project-enterprise, we understand short-lived concurrent engineering enterprises which are created by aggregating several partners around a project and for the duration of this project. They require new techno...
Article
Full-text available
Article dans revue scientifique avec comité de lecture.
Article
Cooperative applications are expected to become commonplace in the future. We are concerned here with a special case of cooperation called indirect cooperation. The idea of the paper is that a Concurrency Control approach better fits to indirect cooperation than a Concurrent Programming one. In other words, there do exist syntactic correctness crit...
Article
Full-text available
Due to the popularization of Internet, cooperative applications of project-enterprise type are expected to become commonplace on the WEB. By project-enterprise, we understand short-lived enterprises which are built by aggregating several partners around a project and for the duration of this project. They require new technologies to organize their...
Article
Full-text available
Colloque avec actes et comité de lecture.

Network

Cited By