About
38
Publications
17,750
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
214
Citations
Introduction
Additional affiliations
September 1999 - May 2016
Publications
Publications (38)
The increasing volume of data in various environments such as IoT and the need to maintain data privacy and security have led to the development of usage control models. Usage control policies are models that enable fine-grained access control over data by enforcing restrictions on how users can use the data. Semantic mechanisms, on the other hand,...
The main purpose of IoT is to deliver reliable, high quality services and innovative solutions by transforming the captured data into meaningful information, and thus improving user’s daily life. In this regard, it is in the interest of the community to encourage entities within IoT environments to share their data, and therefore serve public inter...
La nature distribuée des réseaux IoT et la diversité de ses acteurs conduisent à reconnaître la sécurité et l’encadrement du partage des données comme l’un des principaux défis du domaine IoT. Ainsi, en raison de l’absence de gouvernance des informations partagées, le fournisseur des données ne conserve que peu de contrôle sur ses données une fois...
Internet of Things (IoT) is one of the key technologies in the industry 4.0 era and promotes the interconnection of numerous data sources in several sectors such as ecology, agriculture, or healthcare. Meanwhile, each entity within these connected environments carries its unique requirements and individual goals. For connected environments to gain...
IoT main goal is to provide trusted high-quality services and innovative solutions to its users by transforming the captured data into meaningful information. In this context, it is in the best interest of the community to encourage entities within the IoT environment to share their data, and therefore help contribute to the overall public interest...
Un des principaux problèmes auquel sont confrontés les enseignants, notamment en début du cycle licence, est le manque de motivation des étudiants. Une façon d'éviter que les étudiants ne soient que de simples "consommateurs" est de rendre les cours plus dynamiques et participatifs. Pour cela, nous avons testé une approche de co-construction des sa...
The Smart Grid, the next generation power grid, comes with promises of widely distributed automated energy delivery, self-monitoring, self-healing, energy efficiency, utility and cost optimization. However, as attacks on the current power grid and similar systems indicate, the Smart Grid will be vulnerable to all kinds of attacks and will even rais...
Systems of systems (SoS) are large-scale systems composed of complex systems with difficult to elicit and model emergent properties. One of the most significant challenges in the engineering of such systems is how to elicit their nonfunctional requirements such as security. In this proposal paper we introduce a Model Driven Engineering (MDE) securi...
Résumé : Pour les besoins de nos travaux nous utilisons la notion de métadonnées pour mettre en oeuvre des mécanismes de contrôle d'usage et de gestion des risques du point de vue de la sécurité de l'information. Ces métadonnées nous permettent d'une part de définir des règles de sécurité contextuelles et d'autre part d'assurer la traçabilité des i...
For the purposes of our work we use the concept of metadata to implement enterprise digital right management mechanisms in an intelligent document environment. Such metadata allows us to firstly define contextual security rules and secondly to ensure the information traceability. However, its use may have legal implications, especially with regard...
Service Oriented Architectures (SOA) offer new opportunities for the interconnection of systems. However, for a company, opening its Information System to the "world" is not insignificant in terms of security. Whether to use available services or provide its own services, new technologies have introduced new vulnerabilities and therefore new risks....
Published: 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SARSSI'2013)
Published: 8ème Conférence sur la Sécurité des Architectures Réseaux et des Systèmes d'Information (SARSSI'2013)
More sophisticated inter-organizational interactions have generated changes in the way in which organizations make business. Advanced forms of collaborations, such as Business Process as a Service (BPaaS), allow different partners to leverage business intelligence within organizations. However, although it presents powerfull economical and technica...
Information security is currently one of the most important issues in information systems. This concerns the confidentiality of information but also its integrity and availability. The problem becomes even more difficult when several companies are working together on a project and that the various documents "go out of" their respective information...
In information systems data security is one of the most important goals. This concerns the confidentiality of information but also its integrity and availability. The problem becomes even more difficult if a user wants to "checkout" a document from the information system, for example to work offline or to distribute it to other people outside the o...
Confidentiality and consistency are two aspects of security for information systems, but mechanisms used to ensure them often support one at the expense of the other, in particular when data is not independent of the others. A new approach of access control for information systems consists in preserving several versions of the data and performing u...
Trees are very often used to structure data. For instance, file systems are structured into trees and XML documents can be represented by trees. There are literally as many access control schemes as there are tree data structures. Consequently, an access control model which has been defined for a particular kind of tree cannot be easily adapted to...
Colloque avec actes et comité de lecture. nationale.
The aim of this Paper is to present our model for a generic and flexible negotiation Service and its implementation in Computer
Supported Collaborative Work (CSCW) environments. Within a cooperative work environment, users naturally need negotiation
support mechanisms to study possible alternatives in group decision making. The objective of our wor...
We explore issues in providing support for information sharing, negotiations and decision-making to distributed autonomous organizations, grouped in alliances to improve their own ability to accomplish customers’ requests. In particular, we consider the case of an alliance of printshops offering similar and/or complementary print competencies and c...
Due to the popularization of Internet, virtual enterprises are
expected to become commonplace on the Web. The concept of virtual
enterprise depicts the idea that many applications are the result of
cross-organisational cooperation between several actors, playing
different roles, who build a relational system which is structured by a
common objectiv...
Cette thèse présente un nouveau modèle de transactions avancé permettant non seulement la coopération entre activités par le biais d'échanges d'informations en cours d'exécution, mais également leur distribution et l'hétérogénéité de leurs relations de coopération. Notre objectif est de décentraliser le contrôle de l'application dans les activités...
Due to the popularization of Internet, cooperative applications of project-enterprise type are expected to become commonplace on the WEB. By project-enterprise, we understand short-lived concurrent engineering enterprises which are created by aggregating several partners around a project and for the duration of this project. They require new techno...
Article dans revue scientifique avec comité de lecture.
Cooperative applications are expected to become commonplace in the future. We are concerned here with a special case of cooperation called indirect cooperation. The idea of the paper is that a Concurrency Control approach better fits to indirect cooperation than a Concurrent Programming one. In other words, there do exist syntactic correctness crit...
Due to the popularization of Internet, cooperative applications of project-enterprise type are expected to become commonplace on the WEB. By project-enterprise, we understand short-lived enterprises which are built by aggregating several partners around a project and for the duration of this project. They require new technologies to organize their...
Colloque avec actes et comité de lecture.