Search results for "Security"
showing 10 items of 1693 documents
Building a Medical Research Cloud in the EASI-CLOUDS Project
2014
The demand for IT resources is constantly growing in the scientific area. The ability to store and process increasing amounts of data has transformed many research disciplines, like the life-sciences, which now rely on complex data processing and data analytics. Cloud environments are able to integrate and encapsulate possibly distributed resources and allow convenient and on-demand access to the corresponding services, tools, and complete work environments. The European research project EASI-CLOUDS (http://www. easi-clouds.eu) develops a platform for a convenient service delivery with special regard to service integration, monitoring, management, and Service Level Agreement (SLA) negotiati…
A novel policy-driven reversible anonymisation scheme for XML-based services
2015
Author's version of an article in the journal: Information Systems. Also available from the publisher at: http://dx.doi.org/10.1016/j.is.2014.05.007 This paper proposes a reversible anonymisation scheme for XML messages that supports fine-grained enforcement of XACML-based privacy policies. Reversible anonymisation means that information in XML messages is anonymised, however the information required to reverse the anonymisation is cryptographically protected in the messages. The policy can control access down to octet ranges of individual elements or attributes in XML messages. The reversible anonymisation protocol effectively implements a multi-level privacy and security based approach, s…
Biosorption of nickel (II) and zinc (II) from aqueous solutions by the biomass of yeast Yarrowia lipolytica
2017
Abstract This study examined the biosorption process of Ni(II) and Zn(II) from an aqueous solution by dead biomass of Yarrowia lipolytica. Optimum biosorption conditions were determined as a function of pH, biomass dosage, contact time, and temperature. The biosorbent was characterized by FTIR, which indicated the participation of hydroxyl, carboxyl, amide and amine groups in the process of binding the metal ions. The results showed that the biosorption processes of both metal ions closely followed pseudo-second order kinetics. The equilibrium data of Ni(II) and Zn(II) ions at 20, 30 and 40°C fitted the Langmuir and Freundlich isotherm models. Langmuir isotherm provided a better fit to the …
The nature of security and risk in complex socio-technical systems : a partial application of Critical Systems Heuristics (CSH) to Finnish Security S…
2011
Tämä tutkimus selventää suhteita turvallisuuden, riskien sekä kompleksisten sosio-teknisten järjestelmien välillä. Käsittely tapahtuu pääosin yhteiskunnallisella tasolla, mutta eri järjestelmiä ja niiden yleisiä sekä teoreettisia perusrakenteita tarkastellaan kokonaisuuden ymmärtämiseksi paremmin. Samalla pyritään parantamaan käsitystä niistä monista yhteisvaikutuksista joita eri järjestelmillä on toisiinsa ja miten ne vaikuttavat turvallisuuteen. Turvallisuus on tunnistettu olevan suhteellista ja käyttäytyvät eri tavalla todellisissa avoimissa järjestelmissä ja avoimessa järjestelmien ympäristössä, verrattuna yksinkertaisiin järjestelmiin. Teknologia on alati läsnä nykyaikaisissa kehittyne…
Zabezpieczenie na nieruchomości w postępowaniu karnym jako wyraz równorzędności reguł interpretacji w praktyce orzeczniczej sądu karnego
2021
Artykuł poddaje analizie instytucję zabezpieczenia na nieruchomości w postępowaniu karnym w kontekście połączenia w niej działania organów postępowania karnego w dwóch różnych procedurach i w dwóch różnych pozycjach procesowych. Zabezpieczenie następuje w zakresie tytułu wykonawczego w postaci stosownego postanowienia i wynika z postępowania karnego w fazie in personam. Tytuł wykonawczy uzyskany w procedurze karnej stanowi podstawę wpisu hipoteki przymusowej według regulacji procedury cywilnej do księgi wieczystej. Artykuł ma na celu przedstawienie powyższej problematyki w kontekście rozkładu ciężaru argumentacyjnego poszczególnych uczestników dyskursu wskazanej sytuacji procesowej, a także…
Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127
2014
International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…
Enforcing role based access control model with multimedia signatures.
2009
International audience; Recently ubiquitous technology has invaded almost every aspect of the modern life. Several application domains, have integrated ubiquitous technology to make the management of resources a dynamic task. However, the need for adequate and enforced authentication and access control models to provide safe access to sensitive information remains a critical matter to address in such environments. Many security models were proposed in the literature thus few were able to provide adaptive access decisions based on the environmental changes. In this paper, we propose an approach based on our previous work [B.A. Bouna, R. Chbeir, S. Marrara, A multimedia access control languag…
Federated Learning for Zero-Day Attack Detection in 5G and Beyond V2X Networks
2023
Deploying Connected and Automated Vehicles (CAVs) on top of 5G and Beyond networks (5GB) makes them vulnerable to increasing vectors of security and privacy attacks. In this context, a wide range of advanced machine/deep learning-based solutions have been designed to accurately detect security attacks. Specifically, supervised learning techniques have been widely applied to train attack detection models. However, the main limitation of such solutions is their inability to detect attacks different from those seen during the training phase, or new attacks, also called zero-day attacks. Moreover, training the detection model requires significant data collection and labeling, which increases th…
Système de sécurité biométrique multimodal par imagerie, dédié au contrôle d’accès
2019
Research of this thesis consists in setting up efficient and light solutions to answer the problems of securing sensitive products. Motivated by a collaboration with various stakeholders within the Nuc-Track project, the development of a biometric security system, possibly multimodal, will lead to a study on various biometric features such as the face, fingerprints and the vascular network. This thesis will focus on an algorithm and architecture matching, with the aim of minimizing the storage size of the learning models while guaranteeing optimal performances. This will allow it to be stored on a personal support, thus respecting privacy standards.
Automatic Timeline Construction and Analysis For Computer Forensics Purposes
2014
International audience; To determine the circumstances of an incident, investigators need to reconstruct events that occurred in the past. The large amount of data spread across the crime scene makes this task very tedious and complex. In particular, the analysis of the reconstructed timeline, due to the huge quantity of events that occurred on a digital system, is almost impossible and leads to cognitive overload. Therefore, it becomes more and more necessary to develop automatic tools to help or even replace investigators in some parts of the investigation. This paper introduces a multi-layered architecture designed to assist the investigative team in the extraction of information left in…