Search results for "Crypt"

showing 10 items of 1111 documents

A novel policy-driven reversible anonymisation scheme for XML-based services

2015

Author's version of an article in the journal: Information Systems. Also available from the publisher at: http://dx.doi.org/10.1016/j.is.2014.05.007 This paper proposes a reversible anonymisation scheme for XML messages that supports fine-grained enforcement of XACML-based privacy policies. Reversible anonymisation means that information in XML messages is anonymised, however the information required to reverse the anonymisation is cryptographically protected in the messages. The policy can control access down to octet ranges of individual elements or attributes in XML messages. The reversible anonymisation protocol effectively implements a multi-level privacy and security based approach, s…

XML Encryptioncomputer.internet_protocolComputer sciencePrivacy policyInternet privacyBig dataXACMLprivacyComputer securitycomputer.software_genreXACMLbig dataVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552XML-encryptioncomputer.programming_languagebusiness.industrydeanonymiserService-oriented architectureXML databaseHardware and Architecturebusinessreversible anonymisationcomputerSoftwareXMLInformation SystemsInformation Systems
researchProduct

Why Use XML?

2011

Since its inception a decade ago, XML has become a standard ­technology for software engineers, all Web browsers are able to parse and show XML ­documents, and huge XML data resources are available from the Internet. Many of the documents are in XHTML, but other XML applications are quite common as well. XML has also become a format that is increasingly common in the files of local disks. This success would not have been possible without collaborative efforts throughout the Web community. Such world-wide collaborative development has included standards, software applications, and case implementations that can serve as models when developing new solutions. In this chapter we consider what ki…

XML frameworkWorld Wide WebXML EncryptionComputer scienceXML Schema EditorStreaming XMLEfficient XML InterchangeComputingMethodologies_DOCUMENTANDTEXTPROCESSINGXML SignatureXML BaseXML validationcomputer.file_formatcomputer
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct

Semantic-based Merging of RSS Items

2009

Merging XML documents can be of key importance in several applications. For instance, merging the RSS news from same or different sources and providers can be beneficial for end-users in various scenarios. In this paper, we address this issue and explore the relatedness measure between RSS elements. We show here how to define and compute exclusive relations between any two elements and provide several predefined merging operators that can be extended and adapted to human needs. We also provide a set of experiments conducted to validate our approach. © Springer Science+Business Media, LLC 2009.

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer Networks and CommunicationsComputer sciencecomputer.internet_protocolRSS[ INFO.INFO-WB ] Computer Science [cs]/Web[SCCO.COMP]Cognitive science/Computer science02 engineering and technologycomputer.software_genreClusteringMergingSet (abstract data type)[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]Cluster analysisComputingMilieux_MISCELLANEOUS[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM]Measure (data warehouse)[INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Document relatedne[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]computer.file_formatRSSMerging operator[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB]Hardware and Architecture[ SCCO.COMP ] Cognitive science/Computer science[INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR]Key (cryptography)020201 artificial intelligence & image processingData mining[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]computerSoftwareXML
researchProduct

Detecting Inference Channels in Private Multimedia Data via Social Networks

2009

International audience; Indirect access to protected information has been one of the key challenges facing the international community for the last decade. Providing techniques to control direct access to sensitive information remain insufficient against inference channels established when legitimate data reveal classified facts hidden from unauthorized users. Several techniques have been proposed in the literature to meet indirect access prevention. However, those addressing the inference problem when involving multimedia objects (images, audio, video, etc.) remain few and hold several drawbacks. In essence, the complex structure of multimedia objects makes the fact of detecting indirect a…

[ INFO.INFO-IR ] Computer Science [cs]/Information Retrieval [cs.IR][INFO.INFO-WB] Computer Science [cs]/WebComputer sciencemedia_common.quotation_subject[ INFO.INFO-WB ] Computer Science [cs]/WebInference[SCCO.COMP]Cognitive science/Computer scienceAccess control02 engineering and technologycomputer.software_genre01 natural sciences010104 statistics & probability[SCCO.COMP] Cognitive science/Computer science020204 information systems0202 electrical engineering electronic engineering information engineering[INFO.INFO-DB] Computer Science [cs]/Databases [cs.DB]0101 mathematicsSet (psychology)Function (engineering)media_common[ INFO.INFO-MM ] Computer Science [cs]/Multimedia [cs.MM]Structure (mathematical logic)[INFO.INFO-MM] Computer Science [cs]/Multimedia [cs.MM][INFO.INFO-DB]Computer Science [cs]/Databases [cs.DB]Social networkMultimediabusiness.industry[INFO.INFO-WB]Computer Science [cs]/Web[INFO.INFO-MM]Computer Science [cs]/Multimedia [cs.MM]Information sensitivity[ INFO.INFO-DB ] Computer Science [cs]/Databases [cs.DB][INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR][ SCCO.COMP ] Cognitive science/Computer scienceKey (cryptography)[INFO.INFO-IR] Computer Science [cs]/Information Retrieval [cs.IR]businesscomputer
researchProduct

Image Encryption/Decryption system based on an oscillatory cellular nonlinear network

2008

International audience

[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image Processing[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing[INFO.INFO-TS] Computer Science [cs]/Signal and Image Processing[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processingimage encryption[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingComputingMilieux_MISCELLANEOUSnon linear dynamics[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing
researchProduct

On codimension two embeddings up to link-homotopy

2017

We consider knotted annuli in 4-space, called 2-string-links, which are knotted surfaces in codimension two that are naturally related, via closure operations, to both 2-links and 2-torus links. We classify 2-string-links up to link-homotopy by means of a 4-dimensional version of Milnor invariants. The key to our proof is that any 2-string link is link-homotopic to a ribbon one; this allows to use the homotopy classification obtained in the ribbon case by P. Bellingeri and the authors. Along the way, we give a Roseman-type result for immersed surfaces in 4-space. We also discuss the case of ribbon k-string links, for $k\geq 3$.

[ MATH.MATH-GT ] Mathematics [math]/Geometric Topology [math.GT]Pure mathematicsHomotopy010102 general mathematicsClosure (topology)Geometric Topology (math.GT)CodimensionMSC: 57Q45 (primary); 57M27; 57Q35 (secondary)01 natural sciencesMathematics::Geometric TopologyMathematics - Geometric Topology[MATH.MATH-GT]Mathematics [math]/Geometric Topology [math.GT]0103 physical sciencesRibbonKey (cryptography)FOS: Mathematics010307 mathematical physicsGeometry and Topology0101 mathematicsLink (knot theory)Mathematics
researchProduct

Confrontation of cryptic diversity and mate discrimination within Gammarus pulex and Gammarus fossarum species complexes.

2014

16 pages; International audience; Freshwater amphipods Gammarus fossarum and Gammarus pulex are widespread in Europe, with some evidence of cryptic diversity in the former. We used DNA barcoding to assess genetic diversity within and among amphipod populations and examined mate discrimination and pre-copulatory pair formation between genetically divergent individuals. Eight distinct G. fossarum and four distinct G. pulex molecular operational taxonomic units (MOTUs) were detected. Among the 33 amphipod populations sampled, 11 contained a single MOTU, 11 had two and 11 were composed of three sympatric MOTUs. Genetic divergences between sympatric MOTUs (G. fossarum and G. pulex MOTUs combined…

[ SDV.BID ] Life Sciences [q-bio]/BiodiversityGenetic diversitycryptic diversityEcologymedia_common.quotation_subjectreproductive isolationZoologyGammarus fossarumReproductive isolation[SDV.BID]Life Sciences [q-bio]/BiodiversityAquatic ScienceBiologybiology.organism_classificationDNA barcodingSpeciationGammarus pulexGammarus pulexGenetic distanceSympatric speciation[ SDV.EE.IEO ] Life Sciences [q-bio]/Ecology environment/SymbiosisMatingmate discriminationmedia_common[SDV.EE.IEO]Life Sciences [q-bio]/Ecology environment/Symbiosis
researchProduct

Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks

2023

Deploying Connected and Automated Vehicles (CAVs) on top of 5G and Beyond networks (5GB) makes them vulnerable to increasing vectors of security and privacy attacks. In this context, a wide range of advanced machine/deep learning-based solutions have been designed to accurately detect security attacks. Specifically, supervised learning techniques have been widely applied to train attack detection models. However, the main limitation of such solutions is their inability to detect attacks different from those seen during the training phase, or new attacks, also called zero-day attacks. Moreover, training the detection model requires significant data collection and labeling, which increases th…

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI]5GBIoV[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Zero-day attacksSécurité5G V2X IoV Sécurité Attaques Détection Apprentissage Fédéré[INFO] Computer Science [cs]Intrusion DetectionDétectionAttaquesSecurityV2XApprentissage FédéréFederated Learning5GConnected and Automated Vehicles[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Système de sécurité biométrique multimodal par imagerie, dédié au contrôle d’accès

2019

Research of this thesis consists in setting up efficient and light solutions to answer the problems of securing sensitive products. Motivated by a collaboration with various stakeholders within the Nuc-Track project, the development of a biometric security system, possibly multimodal, will lead to a study on various biometric features such as the face, fingerprints and the vascular network. This thesis will focus on an algorithm and architecture matching, with the aim of minimizing the storage size of the learning models while guaranteeing optimal performances. This will allow it to be stored on a personal support, thus respecting privacy standards.

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI]BiometryIntruder detectionAlgorithm/architecture matchingBiométrieDétection d'intrusion en zone surveilléeAdéquation algorithme/architecture[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Machine Learning[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Traitements d'imagesDeep LearningImage processing[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV][INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct