Search results for "Crypt"
showing 10 items of 1111 documents
A novel policy-driven reversible anonymisation scheme for XML-based services
2015
Author's version of an article in the journal: Information Systems. Also available from the publisher at: http://dx.doi.org/10.1016/j.is.2014.05.007 This paper proposes a reversible anonymisation scheme for XML messages that supports fine-grained enforcement of XACML-based privacy policies. Reversible anonymisation means that information in XML messages is anonymised, however the information required to reverse the anonymisation is cryptographically protected in the messages. The policy can control access down to octet ranges of individual elements or attributes in XML messages. The reversible anonymisation protocol effectively implements a multi-level privacy and security based approach, s…
Why Use XML?
2011
Since its inception a decade ago, XML has become a standard technology for software engineers, all Web browsers are able to parse and show XML documents, and huge XML data resources are available from the Internet. Many of the documents are in XHTML, but other XML applications are quite common as well. XML has also become a format that is increasingly common in the files of local disks. This success would not have been possible without collaborative efforts throughout the Web community. Such world-wide collaborative development has included standards, software applications, and case implementations that can serve as models when developing new solutions. In this chapter we consider what ki…
Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127
2014
International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…
Semantic-based Merging of RSS Items
2009
Merging XML documents can be of key importance in several applications. For instance, merging the RSS news from same or different sources and providers can be beneficial for end-users in various scenarios. In this paper, we address this issue and explore the relatedness measure between RSS elements. We show here how to define and compute exclusive relations between any two elements and provide several predefined merging operators that can be extended and adapted to human needs. We also provide a set of experiments conducted to validate our approach. © Springer Science+Business Media, LLC 2009.
Detecting Inference Channels in Private Multimedia Data via Social Networks
2009
International audience; Indirect access to protected information has been one of the key challenges facing the international community for the last decade. Providing techniques to control direct access to sensitive information remain insufficient against inference channels established when legitimate data reveal classified facts hidden from unauthorized users. Several techniques have been proposed in the literature to meet indirect access prevention. However, those addressing the inference problem when involving multimedia objects (images, audio, video, etc.) remain few and hold several drawbacks. In essence, the complex structure of multimedia objects makes the fact of detecting indirect a…
Image Encryption/Decryption system based on an oscillatory cellular nonlinear network
2008
International audience
On codimension two embeddings up to link-homotopy
2017
We consider knotted annuli in 4-space, called 2-string-links, which are knotted surfaces in codimension two that are naturally related, via closure operations, to both 2-links and 2-torus links. We classify 2-string-links up to link-homotopy by means of a 4-dimensional version of Milnor invariants. The key to our proof is that any 2-string link is link-homotopic to a ribbon one; this allows to use the homotopy classification obtained in the ribbon case by P. Bellingeri and the authors. Along the way, we give a Roseman-type result for immersed surfaces in 4-space. We also discuss the case of ribbon k-string links, for $k\geq 3$.
Confrontation of cryptic diversity and mate discrimination within Gammarus pulex and Gammarus fossarum species complexes.
2014
16 pages; International audience; Freshwater amphipods Gammarus fossarum and Gammarus pulex are widespread in Europe, with some evidence of cryptic diversity in the former. We used DNA barcoding to assess genetic diversity within and among amphipod populations and examined mate discrimination and pre-copulatory pair formation between genetically divergent individuals. Eight distinct G. fossarum and four distinct G. pulex molecular operational taxonomic units (MOTUs) were detected. Among the 33 amphipod populations sampled, 11 contained a single MOTU, 11 had two and 11 were composed of three sympatric MOTUs. Genetic divergences between sympatric MOTUs (G. fossarum and G. pulex MOTUs combined…
Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks
2023
Deploying Connected and Automated Vehicles (CAVs) on top of 5G and Beyond networks (5GB) makes them vulnerable to increasing vectors of security and privacy attacks. In this context, a wide range of advanced machine/deep learning-based solutions have been designed to accurately detect security attacks. Specifically, supervised learning techniques have been widely applied to train attack detection models. However, the main limitation of such solutions is their inability to detect attacks different from those seen during the training phase, or new attacks, also called zero-day attacks. Moreover, training the detection model requires significant data collection and labeling, which increases th…
Système de sécurité biométrique multimodal par imagerie, dédié au contrôle d’accès
2019
Research of this thesis consists in setting up efficient and light solutions to answer the problems of securing sensitive products. Motivated by a collaboration with various stakeholders within the Nuc-Track project, the development of a biometric security system, possibly multimodal, will lead to a study on various biometric features such as the face, fingerprints and the vascular network. This thesis will focus on an algorithm and architecture matching, with the aim of minimizing the storage size of the learning models while guaranteeing optimal performances. This will allow it to be stored on a personal support, thus respecting privacy standards.