{"title":"Road to a secure Web service exchange","authors":"El Houssain Ben Messaoud, Ouafaa Douri","doi":"10.1109/JNS3.2013.6595454","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595454","url":null,"abstract":"This paper discusses XML security key technologies related with security of Web. Based on these discussions, Web service will be integrated with mature security architectures such as PKI (Public Key Infrastructure), XADES (XML Advanced Electronic Signature) and VPN (Virtual Private Network). A new architecture (called SWSSA for Simple Web Service Security Architecture) to secure SOAP messages exchange is proposed and its components are described.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116526483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mean field game among cloud computing end users","authors":"A. Khiyaita, M. Zbakh","doi":"10.1109/JNS3.2013.6595472","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595472","url":null,"abstract":"The rapid development of Internet has given birth to a new business model: Cloud Computing. This new paradigm has experienced a fantastic rise in recent years and is in constant growth. The cloud computing is large distributed systems that employ distributed resources to deliver a service to end users using several technologies. the cloud computing has become increasingly complex by the fact that it uses several techniques. In this paper we propose a game theoretic framework for cloud computing end users which interact through the response time provided by the system and decide willingly to regulate their load to act in steady state. Because the users of a such system generally large, the game will be studied in the scope of mean field game.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126709462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Concatenated convolutional codes: Analysis of control properties under linear systems theory point of view","authors":"M. I. García-Planas, El Mamoun Soudi, L. Um","doi":"10.1109/JNS3.2013.6595475","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595475","url":null,"abstract":"In this paper we consider two models of concatenated convolutional codes from the perspective of linear systems theory. We present an input-state-output representation of these models and we study the conditions for control properties as controllability, observability as well as output observability.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130018787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biometric authentication systems based on hand pattern vein, digital certificates and smart cards","authors":"A. A. El Kalam, Sana Ibjaoun, A. A. Ouahman","doi":"10.1109/JNS3.2013.6595457","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595457","url":null,"abstract":"This paper describes and implements an authentication solution using biometrics, digital certificates and smartcards to solve the security problems in the authentication process. The first part is a general introduction to the topic, the second is s brief overview about using biometrics, more exactly hand vein pattern, the third part presents a method of extracting the pattern vein of the back of the hand also how to match two templates. The fourth part presents the two necessary phases in any authentication system: the enrollment and the authentication. A proposed authentication protocol is described too. The fifth part generalize the possible attacks and vulnerabilities in a biometric authentication system and it also shows how our system is able to avoid them. The sixth part talks about the implementation of the application. Finally, in the conclusion, we tried to summarize our work and prove the benefits of using this system.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130941815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meriem Daouah, A. Abou El Kalam, Abdellah Ait Ouahman
{"title":"Social networks services: Survey","authors":"Meriem Daouah, A. Abou El Kalam, Abdellah Ait Ouahman","doi":"10.1109/JNS3.2013.6595468","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595468","url":null,"abstract":"Nowadays, Social networks have taken a huge part of our life. While the number of people logging to such services is growing, concerns about security and protection of privacy have become more and more Important. In this paper, we explore risks facing the use of Social Networks and analyse the methods used by attackers to gain access to the shared data as well as the purpose behind these attacks. We also explore the limitations of current systems. Then we discuss some solutions that were proposed to enhance access control on social networks and protect users' personal data. This allows us to identify the main point that is neglected when conceiving new mechanisms: the human behavior.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121221767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Key management for secure multicast communication: A survey","authors":"Youssef Baddi, M. D. Ech-Cherif El Kettani","doi":"10.1109/JNS3.2013.6595453","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595453","url":null,"abstract":"Multicast IP communication is increasingly used as an efficient large-scale communication mechanism for one-to-many and many-to-many communication applications on the Internet. Success of such communication mode has required the development and integration of security mechanisms. The main problem in securing a multicast session is the key management group. Membership in a multicast group is dynamic, allowing hosts to enter and leave the multicast session without the permission or knowledge of other hosts making it susceptible to attack unless they are secured. This paper addresses issues relevant to implementing security for IP multicast networks including issues of group membership and key distribution, and principally, several keying architectures are evaluated and compared to determine their strengths and weaknesses.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132369292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Aminzou, B. Er-Raha, Y. I. Khamlichi, K. Afdel, M. Machkour
{"title":"Towards a secure access to patient data in cloud computing environments","authors":"S. Aminzou, B. Er-Raha, Y. I. Khamlichi, K. Afdel, M. Machkour","doi":"10.1109/JNS3.2013.6595466","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595466","url":null,"abstract":"In the modern health service, data are stored in a Data Center and it can be accessed only by authorized users. However, this Data are prone to be exposed to a number of attacks, especially by the Cloud provider's Personnel with privileged access. To avoid illegal access to comprehensive content of data center including patient's information, we propose in this article a mechanism using the content-based watermarking technique. Information of patient and a digest are encrypted, before being embedded into LSB's bitplane of image associated to the patient. This image is integrated directly into the database. Hadoop system with the integrate functions. HDFS and MapReduce will play the key roles for our solution.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125560855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Special ideal ring A3 and cryptography","authors":"My Hachem Hassib, A. Chillali, M. A. Elomary","doi":"10.1109/JNS3.2013.6595474","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595474","url":null,"abstract":"In [1] and [2] we defined the elliptic curve over the ring F<sub>3</sub>d[ε],ε<sup>2</sup> = 0. In this work we will give some properties of the elliptic curve over the special ideal ring of characteristic 3, A<sub>3</sub> = F<sub>3</sub>d[ε],ε<sup>3</sup> = 0, and an application in cryptography. Our future work will focus on the study of the general case of these rings, which seem to be beneficial and interesting in cryptography, specially the one based on the identity (IBE) [6]. [7], [8].","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134158414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Maachaoui, A. A. El Kalam, C. Fraboul, A. A. Ouahman
{"title":"Virtual walled-garden model for IMS services provisioning","authors":"M. Maachaoui, A. A. El Kalam, C. Fraboul, A. A. Ouahman","doi":"10.1109/JNS3.2013.6595460","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595460","url":null,"abstract":"The IP multimedia Subsystem (IMS) is seen as a key clement for achieving network convergence defining a new horizontal integrated service offering, based on a common signaling protocol (SIP) for all multimedia services such as Voice over IP, Video call, or instant messaging. However the present deployment of IMS is specified according to a specific model, the so called Walled-garden. In this model the applications are only provided to the users within the same operator so that the users will not have to look for applications outside the IMS garden. It is a very restrictive access mode for the users because they remain dependent on services offered by the provider and can consequently not choose freely applications they went to subscribe for. The goal of this paper is to propose a new Service provisioning model: Virtual Walled-Garden. This new model allows the user accessing all the applications, even the external ones transparently, simulating a walled-garden environment. We also introduce the notion of security level to classify the SPs in a Multi-level model.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134560537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new reputation algorithm for evaluating trustworthiness in e-commerce context","authors":"Hasnae Rahimi, Hanan El Bakkali","doi":"10.1109/JNS3.2013.6595455","DOIUrl":"https://doi.org/10.1109/JNS3.2013.6595455","url":null,"abstract":"Thanks to their ability to detect fraud, poor quality and ill-intentioned feedbacks and scores in online environments, robust Trust Reputation Systems (TRS) provide actionable information to support relying parties taking the right decision in any electronic transaction. In fact, as security providers in e-services, TRS have to faithfully calculate the most trustworthy score for a targeted product or service. Thus, TRS must rely on a robust architecture and suitable algorithms that are able to select, store, generate and classify scores and feedbacks. In this work, we propose a new architecture for TRS in e-commerce application which includes feedbacks' analysis in its treatment of scores. In fact, this architecture is based on an intelligent layer that proposes to each user (i.e. “feedback provider”) who has already given his recommendation, a collection of prefabricated feedbacks summarizing other users' textual feedbacks. A proposed algorithm is used by this architecture in order to calculate the trust degree of the user, the feedback's trustworthiness and generates the global reputation score of the product.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132720951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}