2012 National Days of Network Security and Systems最新文献

筛选
英文 中文
Modélisation des processus de la norme ISO 27005 ISO 27005的过程建模
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249230
H. Bahtit, B. Regragui
{"title":"Modélisation des processus de la norme ISO 27005","authors":"H. Bahtit, B. Regragui","doi":"10.1109/JNS2.2012.6249230","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249230","url":null,"abstract":"The aim of this paper consists of the presentation of a UML modeling of different processes of ISO 27005, in order to translate the guidelines \"theoretical\" standard of risk management and implement on the ground. This modeling is demonstrated through risk management relating to the case study presented below.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122827418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computaion integrity mechanism for MapReduce in cloud computing system MapReduce在云计算系统中的计算完整性机制
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249246
A. Bendahmane, M. Essaaidi, A. El Moussaoui, A. Younes
{"title":"Computaion integrity mechanism for MapReduce in cloud computing system","authors":"A. Bendahmane, M. Essaaidi, A. El Moussaoui, A. Younes","doi":"10.1109/JNS2.2012.6249246","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249246","url":null,"abstract":"MapReduce has been widely used as a powerful parallel data processing model and is adopted by most cloud providers to build cloud computing framework. However, in open cloud systems, security of computation becomes a great challenge. Moreover, MapReduce data-processing services are long-running, which increases the possibility that an adversary launches an attack on the workers and make them behave maliciously and then tamper with the computation integrity of user tasks where their executions are generally performed in different administration domains out of the user control. Thus, the results of the computation might be erroneous and dishonest. In this paper, we propose a new mechanism based on weighted t-first voting method for ensuring the integrity of MapReduce in open cloud computing environment. Our mechanism can defeat both collusive and non-collusive malicious entities and therefore guarantee high computation accuracy.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"325 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115871155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Méthode et algorithme d'identification des signaux vocaux à base des transformations orthogonales adaptables 基于自适应正交变换的语音信号识别方法和算法
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249238
Abenaou Abdenbi, Sadik Mohammed
{"title":"Méthode et algorithme d'identification des signaux vocaux à base des transformations orthogonales adaptables","authors":"Abenaou Abdenbi, Sadik Mohammed","doi":"10.1109/JNS2.2012.6249238","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249238","url":null,"abstract":"Résumé — Dans ce présent article on propose une approche assurant l'augmentation de la certitude de l'identification des signaux vocaux. Cette approche est basée sur une méthode et algorithme pour l'extraction et la formation des caractéristiques informatives obtenues lors de l'analyse des signaux vocaux. Pour cela, on propose l'application des transformées orthogonales adaptables dont l'opérateur linéaire est constitué par des fonctions de bases paramétrables. Ceci permet de bien adapter la transformation aux données initiales et d'obtenir un vecteur des caractéristiques informatives de dimension minimal qui permettra l'identification des signaux vocaux avec haute certitude.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123203010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vers une formalisation des politiques de sécurité 安全策略的形式化
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249234
Wadie Krombi, Mohammed Erradi
{"title":"Vers une formalisation des politiques de sécurité","authors":"Wadie Krombi, Mohammed Erradi","doi":"10.1109/JNS2.2012.6249234","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249234","url":null,"abstract":"En général, les politiques de sécurité sont des règles exprimant des contraintes pour sécuriser un système donné. Souvent ces règles sont exprimées sous forme de texte informel, ce qui mène alors à des ambigüités et à des contradictions lors de leur implémentation. L'objectif de ce travail est : étant donné un système S et une politique de sécurité P comment peut-on générer un système Sp qui est une version sécurisée de S ? Ceci ne peut être réalisé que si le système et la politique de sécurité sont exprimés dans un même langage. En vue d'une formalisation de politiques de sécurité et partant du fait quune politique de sécurité est un ensemble de règles, nous proposons une démarche de construction d'une Machine à Etats Finis (MEF) à partir d'une politique de sécurité. Un cas de politique de sécurité d'un firewall est utilisé pour illustrer notre démarche.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128636673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Etat de l'art des systèmes de réputation en e-commerce 电子商务声誉系统的最新技术
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249233
Hasnae Rahimi, Hanan El Bakkali
{"title":"Etat de l'art des systèmes de réputation en e-commerce","authors":"Hasnae Rahimi, Hanan El Bakkali","doi":"10.1109/JNS2.2012.6249233","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249233","url":null,"abstract":"La confiance est un pré-requis nécessaire à tout utilisateur d'une application e-commerce. Certes pour ‘installer’ la confiance chez un utilisateur, des systèmes de gestion de la confiance ont été développés pour pouvoir créer et faire propager la confiance au sein des communautés en ligne. Les systèmes de réputation sont des systèmes de gestion de confiance particuliers dont l'objectif est d'évaluer et d'attribuer des scores aux différentes ressources demandées et/ou utilisées par les utilisateurs d'une application. Ces évaluations reposent sur les différentes notes suggérées par les utilisateurs. Bien évidemment ces notes restent subjectives et dépendent du contexte dans lequel l'utilisateur a évalué la ressource et son intention derrière l'évaluation. L'intention peut être purement informative comme elle peut être porteuse de menace d'attaque dans le but est de falsifier le score. La force d'un système de réputation réside dans son pouvoir de détecter ces fraudes et les éliminer pour pouvoir générer un score le plus fiable possible. A ce propos, l'objectif de cet article est de présenter un état de l'art des principaux systèmes de réputation visant à les analyser et à montrer leurs forces et leurs limitations ainsi que les approches quils adoptent pour des fins d'évaluation.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129835002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A maturity metric based approach for eliciting SOA security requirements 用于引出SOA安全需求的基于成熟度度量的方法
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249231
M. Kassou, L. Kjiri
{"title":"A maturity metric based approach for eliciting SOA security requirements","authors":"M. Kassou, L. Kjiri","doi":"10.1109/JNS2.2012.6249231","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249231","url":null,"abstract":"The emergence of service-oriented architecture (SOA) as an approach for integrating applications that expose services presents many new challenges to organizations resulting in significant risks to their business. Particularly important among those risks are failures to effectively address quality attribute requirements such as security. Properly defining and configuring security requirements in SOA applications is quite difficult for developers and business experts because they are not necessary security experts. SOA security requirements identification is a challenging and promising research area. In this article, we propose an SOA Security requirement elicitation approach based on the maturity assessment of security processes and controls applicable in the context of SOA.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133708950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Politique de contrôle d'accès au Cloud Computing: Recommandation à base de confiance 云计算访问控制策略:基于信任的建议
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249249
Mustapha Bensaidi, Anas Aboulkalam, A. Marzouk
{"title":"Politique de contrôle d'accès au Cloud Computing: Recommandation à base de confiance","authors":"Mustapha Bensaidi, Anas Aboulkalam, A. Marzouk","doi":"10.1109/JNS2.2012.6249249","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249249","url":null,"abstract":"La sécurité dans les SID est un problème majeur qui préoccupe aussi bien les administrateurs que les chercheurs. C'est une recherche continue et permanente puisque le traitement de l'information évolue à tous les niveaux. Par conséquent les paramètres fondamentaux de la sécurité se compliquent davantage. L'apparition du Cloud computing et ses promesses aux marchés des services informatiques ont bousculé toute l'infrastructure NTIC; alors que malheureusement, les politiques de contrôles d'accès actuelles sont limitées dans cet environnement. Ces limites sont étroitement liées à la confiance exigée dans la tierce partie qui détiendra l'information de l'entreprise. Cette exigence implique une introduction obligatoire de la confiance comme attitude humaine, et de l'intégrer à la politique de sécurité du cloud. Dans cet article nous proposons un modèle de contrôle d'accès combinant l'opérateur déontique « recommandé » et la notion de confiance. En particulier, ce modèle introduit la technique de gestion de la confiance comme étant une attitude variable dans le temps dans le contexte du cloud.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125117191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Generic group Gna, b 通用组Gna, b
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249239
C. Abdelhakim
{"title":"Generic group Gna, b","authors":"C. Abdelhakim","doi":"10.1109/JNS2.2012.6249239","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249239","url":null,"abstract":"In cryptography, Search generic groups is very important to ensure the security of information. In this work we study the algorithms properties for the group E<sub>n</sub><sup>a,b</sup>. We establish that E<sub>n</sub><sup>a,b</sup> is a generic group. The implementations from the algorithms are by Maple.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122547013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure multimedia objects management in medical information system 安全的医疗信息系统多媒体对象管理
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249251
S. Aminzou, M. Machkour, Y. I. Khamlichi, K. Afdel, B. Er-Raha
{"title":"Secure multimedia objects management in medical information system","authors":"S. Aminzou, M. Machkour, Y. I. Khamlichi, K. Afdel, B. Er-Raha","doi":"10.1109/JNS2.2012.6249251","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249251","url":null,"abstract":"Secure and efficient management of multimedia objects in medical information system have become a necessity in today's global environment. To strengthen the security level already present in the database management system and to avoid illegal access to comprehensive content of database including patient's information, we propose in this article a mechanism using the content-based watermarking technique. Information of patient and a digest are encrypted, before being embedded into LSB's bitplane of image associated to the patient. This image is directly integrated into the database. The edge map and invariant moments are used to check the integrity of the image.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123671654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An elliptic curve cryptography based on matrix scrambling method 基于矩阵置乱方法的椭圆曲线密码
2012 National Days of Network Security and Systems Pub Date : 2012-04-20 DOI: 10.1109/JNS2.2012.6249236
Fatima Amounas, E. Kinani
{"title":"An elliptic curve cryptography based on matrix scrambling method","authors":"Fatima Amounas, E. Kinani","doi":"10.1109/JNS2.2012.6249236","DOIUrl":"https://doi.org/10.1109/JNS2.2012.6249236","url":null,"abstract":"A new method on matrix scrambling based on the elliptic curve will be proposed in this paper. The proposed algorithm is based on random function and shifting technique of circular queue. In particular, we first transform the message into points on the elliptic curve as is the embedding system M→PM and then apply the encryption/decryption technique based on matrix scrambling. Our scheme is secure against most of the current attacking mechanisms.","PeriodicalId":224410,"journal":{"name":"2012 National Days of Network Security and Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121804762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信