2012 National Days of Network Security and Systems最新文献

筛选
英文 中文
Wireless sensor network: Security challenges 无线传感器网络:安全挑战
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249244
A. Blilat, A. Bouayad, N. El Houda Chaoui, M. E. Ghazi
{"title":"Wireless sensor network: Security challenges","authors":"A. Blilat, A. Bouayad, N. El Houda Chaoui, M. E. Ghazi","doi":"10.1109/JNS2.2012.6249244","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249244","url":null,"abstract":"With the advent of low-power wireless sensor networks, a wealth of new applications at the interface of the real and digital worlds is emerging. A distributed computing platform that can measure properties of the real world, formulate intelligent inferences, and instrument responses, requires strong foundations in distributed computing, artificial intelligence, databases, control theory, and security. Before these intelligent systems can be deployed in critical infrastructures such as emergency rooms and powerplants, the security properties of sensors must be fully understood. Existing wisdom has been to apply the traditional security models and techniques to sensor networks. However, sensor networks are not traditional computing devices, and as a result, existing security models and methods are ill suited. In this position paper, we take the first steps towards producing a comprehensive security model that is tailored for sensor networks. Incorporating work from Internet security, ubiquitous computing, and distributed systems, we outline security properties that must be considered when designing a secure sensor network. We propose challenges for sensor networks - security obstacles that, when overcome, will move us closer to decreasing the divide between computers and the physical world.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121859174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Load balancing cloud computing: State of art 负载均衡云计算:最新技术
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249253
A. Khiyaita, H. Bakkali, M. Zbakh, Dafir El Kettani
{"title":"Load balancing cloud computing: State of art","authors":"A. Khiyaita, H. Bakkali, M. Zbakh, Dafir El Kettani","doi":"10.1109/JNS2.2012.6249253","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249253","url":null,"abstract":"The rapid development of Internet has given birth to a new business model: Cloud Computing. This new paradigm has experienced a fantastic rise in recent years. Because of its infancy, it remains a model to be developed. In particular, it must offer the same features of services than traditional systems. The cloud computing is large distributed systems that employ distributed resources to deliver a service to end users by implementing several technologies. Hence providing acceptable response time for end users, presents a major challenge for cloud computing. All components must cooperate to meet this challenge, in particular through load balancing algorithms. This will enhance the availability and will gain the end user confidence. In this paper we try to give an overview of load balancing in the cloud computing by exposing the most important research challenges.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130790799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 173
Les défis de sécurité dans le Cloud Computing: Problèmes et solutions de la sécurité en Cloud Computing 云计算的安全挑战:云计算安全的问题和解决方案
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249247
A. Elmrabti, A. A. E. Kalam, A. A. Ouahman
{"title":"Les défis de sécurité dans le Cloud Computing: Problèmes et solutions de la sécurité en Cloud Computing","authors":"A. Elmrabti, A. A. E. Kalam, A. A. Ouahman","doi":"10.1109/JNS2.2012.6249247","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249247","url":null,"abstract":"Le Cloud Computing prend de plus en plus sa place dans le monde du Business des systèmes d'information. Il propose plusieurs avantages et plusieurs opportunités dans le futur pour les entreprises. Dans cet article, nous présentons les caractéristiques, avantages et faiblesses du Cloud Computing (CC) en particulier ceux liés à la sécurité. Nous discutons également certaines questions relatives à la conformité réglementaire dans le Cloud. Par la suite, nous proposons quelques stratégies de sécurité pour augmenter le niveau de sécurité dans le CC.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122003168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evaluation de la cybercriminalité au Maroc: Cas d'un établissement universitaire 摩洛哥网络犯罪评估:以大学为例
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249242
Mohamed Chiny, Miloud Lahmaim, A. A. E. Kalam, A. A. Ouahman
{"title":"Evaluation de la cybercriminalité au Maroc: Cas d'un établissement universitaire","authors":"Mohamed Chiny, Miloud Lahmaim, A. A. E. Kalam, A. A. Ouahman","doi":"10.1109/JNS2.2012.6249242","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249242","url":null,"abstract":"Depuis quelques années, le Maroc connaît une croissance considérable d'attaques relevant de la cybercriminalité. Ces attaques ont comme cibles les réseaux et systèmes appartenant à des individus, entreprises, organisations et administrations. Cette croissance évolue en parallèle avec l'informatisation accrue que connaît le pays depuis plus d'une décennie. Cependant, il n'existe, à notre connaissance, aucune étude scientifique complète quantifiant et évaluant avec précision les paramètres relatifs aux attaques. Dans cet objectif, nous avons mis en place des pots de miel à l'ENSA de Marrakech. Dans cet article, nous présentons nos résultats d'observation et d'analyse des attaques, à savoir : les provenances des menaces, les intentions des pirates, le niveau de coopération entre les attaquants, etc.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130179608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring opportunistic scheduling in ad-hoc network with physical layer security 探索具有物理层安全性的ad-hoc网络中的机会调度
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249243
Donglai Sun, H. Benaboud, Mikou Noufissa, Jianhua Li
{"title":"Exploring opportunistic scheduling in ad-hoc network with physical layer security","authors":"Donglai Sun, H. Benaboud, Mikou Noufissa, Jianhua Li","doi":"10.1109/JNS2.2012.6249243","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249243","url":null,"abstract":"In this paper, scheduling scheme under physical layer security is studied. This emerging technology is introduced to provide perfect secrecy to wireless ad-hoc network. However, a big loss of network performance is also imported to the system. As links with different physical layers coexist in the wireless network, service qualities like overall throughput are affected if traditional scheduling schemes are applied. Thus, new MAC layer scheduling scheme has to be developed. Here, opportunistic scheduling with scaled transmission rate is used to solve the problem. A weighted scaling function is applied on different transmission rate of diversified links, and optimal stopping theory is employed to ensure that only the good part of each link is used for transmitting. A pure threshold policy can be derived for the scheduling scheme. The scenario with distributed ad-hoc network is also considered, a Nash equilibrium can be conducted using game theory for the selection of individual weights.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129699130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Homomorphic encryption method applied to Cloud Computing 同态加密方法在云计算中的应用
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249248
Maha Tebaa, S. Hajji, A. E. Ghazi
{"title":"Homomorphic encryption method applied to Cloud Computing","authors":"Maha Tebaa, S. Hajji, A. E. Ghazi","doi":"10.1109/JNS2.2012.6249248","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249248","url":null,"abstract":"When the data transferred to the Cloud we use standard encryption methods to secure this data, but when we want to do the calculations on data located on a remote server, it is necessary that the Cloud provider has access to the raw data, and then it will decrypt them. In this paper we propose the application of a method to perform the operation on encrypted data without decrypted and provide the same result as well that the calculations were carried out on raw data.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129398062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Une approche beaconing avec échange de clés dans les réseaux ad hoc de véhicules 车辆自组织网络中密钥交换的信标方法
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249252
Mohammed Erritali, Oussama Mohamed Reda, Bouabid El Ouahidi
{"title":"Une approche beaconing avec échange de clés dans les réseaux ad hoc de véhicules","authors":"Mohammed Erritali, Oussama Mohamed Reda, Bouabid El Ouahidi","doi":"10.1109/JNS2.2012.6249252","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249252","url":null,"abstract":"Vehicular Ad-Hoc Networks (VANETs) are special forms of Mobile Ad-Hoc Networks (MANETs) that allows vehicles to communicate together in the absence of fixed infrastructure. In this type of network beaconing is the means used to discover the nodes in its neighborhood. Successful delivery of the message beacons containing speed, direction and position of a car is extremely important. Otherwise, routing information should not be modified/manipulated during transmission without detection, in order to ensure the routing information, messages must be signed and provided with a certificate to attest valid network participants. In this work we present a beaconing protocol with key exchange to prepare the generation of a signature to protect the routing information protocol ‘Greedy Perimeter Stateless Routing’.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114920748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formalisation d'une session collaborative sécurisée 安全协作会话的形式化
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249232
Mohamed Madani, Mohammed Erradi
{"title":"Formalisation d'une session collaborative sécurisée","authors":"Mohamed Madani, Mohammed Erradi","doi":"10.1109/JNS2.2012.6249232","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249232","url":null,"abstract":"Les applications collaboratives sont des applications distribuées à travers lesquelles plusieurs utilisateurs peuvent interagir et partager les mêmes objets pour atteindre un objectif commun. Ainsi la sécurité des interactions entre les membres d'un groupe collaboratif constitue un défi majeur auquel il faut faire face. Ceci afin d'assurer des interactions sécurisées et offrir un bon degré de confiance dans l'utilisation d'une application collaborative. Ce travail présente un mécanisme de sécurité lors d'une session collaborative, appelé « sécurité à base de session ». L'approche proposée est basée sur le modèle de contrôle d'accès OrBAC, en l'augmentant d'un niveau intermédiaire appelé « Niveau Session » entre le niveau organisationnel et le niveau concret du modèle OrBAC. Ensuite, une démarche formelle à base de règles et d'arbres de permissions est proposée pour être intégrée à ce modèle, afin de contrôler l'accès au niveau des sessions collaboratives. Enfin, nous présentons une spécification formelle de notre approche pour une application collaborative distribuée pour le télédiagnostic dans le domaine de la neuroscience. Cette spécification est implémentée et vérifiée à l'aide du langage Prolog (Programmation Logique).","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127191563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyse de la prédictibilité de l'algorithme R.A NMJ R.A NMJ算法的可预测性分析
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249240
Abderrahim Sabour
{"title":"Analyse de la prédictibilité de l'algorithme R.A NMJ","authors":"Abderrahim Sabour","doi":"10.1109/JNS2.2012.6249240","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249240","url":null,"abstract":"Cet article présente les résultats de l'analyse des caractéristiques dynamiques de l'algorithme R.A NMJ qui est un régénérateur de suites binaires cryptographiquement sûres. L'objectif été de mettre à l'évidence le comportement chaotique de ce régénérateur à travers le calcul du plus grand exposant de Lyapunov suite à divers type de perturbation tout en expliquant l'intérêt de cette étude sur l'ANALYSE DE LA vulnérabilité de L'algorithme, puisque le faite d'injecter une perturbation à le même effet quune erreur d'estimation d'où l'intérêt de cette étude.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116500399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A propos du calcul multiparti sécurisé 关于安全多方计算
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249237
Yahya Benkaouz, Mohammed Erradi
{"title":"A propos du calcul multiparti sécurisé","authors":"Yahya Benkaouz, Mohammed Erradi","doi":"10.1109/JNS2.2012.6249237","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249237","url":null,"abstract":"La protection de la vie privée de toute personne représente un droit à préserver. Alors quavec l'extension des technologies de l'information, la collecte des données personnelles devient un objectif de plus en plus facile à atteindre. Dans cette perspective, nous présentons dans ce travail le concept de calcul multiparti sécurisé. Dans lequel, différents participants effectuent des calculs sur leurs propres données. Cet article présente les travaux et les stratégies les plus importantes pour assurer la confidentialité dans les calculs multipartis sécurisés « CMS ». Ainsi que les domaines d'applications de ce type de solution. Une comparaison des travaux les plus importants sur les CMS a été présentée.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131076407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信