- Access Control and Trust
- Cryptography and Data Security
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Digital Rights Management and Security
- Privacy-Preserving Technologies in Data
- Distributed and Parallel Computing Systems
- Peer-to-Peer Network Technologies
- Privacy, Security, and Data Protection
- Cloud Data Security Solutions
- Internet Traffic Analysis and Secure E-voting
- Security and Verification in Computing
- Open Education and E-Learning
- Anomaly Detection Techniques and Applications
- Intraocular Surgery and Lenses
- Parallel Computing and Optimization Techniques
- French Historical and Cultural Studies
- Ocular Surface and Contact Lens
- Digital Economy and Work Transformation
- Semantic Web and Ontologies
- Operations Management Techniques
- Ocular Infections and Treatments
- Cloud Computing and Resource Management
- Ocular Diseases and Behçet’s Syndrome
- Quality and Supply Management
University of Namur
2013-2023
Département d'Informatique
2011-2013
University of Pittsburgh
2008
Oracle (United States)
2006
University of Mons
2002
Hôpital Robert-Debré
1998
Machine Learning (ML) and Deep (DL) have been used for building Intrusion Detection Systems (IDS). The increase in both the number sheer variety of new cyber-attacks poses a tremendous challenge IDS solutions that rely on database historical attack signatures. Therefore, industrial pull robust IDSs are capable flagging zero-day attacks is growing. Current outlier-based detection research suffers from high false-negative rates, thus limiting their practical use performance. This paper...
The rapid growth of mobile applications has imposed new threats to privacy: users often find it challenging ensure that their privacy policies are consistent with the requirements a diverse range access personal information under different contexts. This problem exacerbates when depend on each other and therefore share permissions resources in ways opaque an end-user. To meet needs representing resolving dependencies issues policies, we pro-pose extension P-RBAC model for reasoning about...
ABAC allows for high flexibility in access control over a system through the definition of policies based on attribute values.In context an IoT-based system, these data can be supplied its sensors connected to real world, allowing context-awareness.However, model alone does not include proposals implementing security verified and/or meaningful values rather than raw flowing from sensors.Nor it allow implement immediate action when some flaw is detected, while this possibility technically...
We are now living in the significant era where technologies advancing very quickly. Among leading technologies, Internet of Things or IoT short is standing at peak inflated expectation Gartner Hype Cycle [1]. The application has evolved from home appliances smart environment such as tv, refrigerator, door and grown into building, city, healthcare, industry. could imagine that everything go online to cut cost, add value businesses increase users convenience. prediction been made [2] there...
IoT technology allows people to connect and control devices remotely anywhere anytime. However, serious concerns are raised over access of sensitive (e.g. portable health device) personal information pertaining them. The static model used in conventional system, which does not take into account the profile behaviour agent requesting system determine risk associated with request, fit well be some scenarios application domains smart healthcare). In this paper, we propose an adaptive risk-aware...
To proactively defend computer systems against cyber-attacks, a honeypot system—purposely designed to be prone attacks—is commonly used detect attacks, discover new vulnerabilities, exploits or malware before they actually do real damage systems. Its usefulness lies in being able operate without identified as trap by adversaries; otherwise, its values are significantly reduced. A is classified the degree of interactions that provide attacker: low, medium and high-interaction honeypots....
Smart home user usually controls smart devices through application, which is managed by user's account. Thus, compromised account possible and countermeasure to such attack can help protect both data pertaining them. In this paper, we propose a security in case of system introducing another layer access control beyond the traditional authentication method (e.g. username password). our proposed approach, although successfully authenticated, he subjects at or permission level for every attempt...
Privacy-aware usage control is a of the private data with aim to protect owner privacy. In privacy-aware system, purpose strictly controlled ensure that privacy properly protected and would never be used beyond what it authorized for. To fulfill level protection, requires strong enforcement policy, in particular, usage. However, there are many difficulties enforcement. One which validate an agent when requests perform action, particularly distributed environments where processing carried out...
LIMBS is an open source brokerage system developed in the framework of CALIBRATE project. relies on standards and contents to promote exchanges learning resources within a federation e-learning systems. Contrary CELEBRATE system, from which it derives, LIMBS's role limited carrying routing messages exchanged by members rather than enforcing semantic interoperability. With LIMBS, interoperability becomes responsibility that rely "clients" communicate with support negotiation common query...
In this paper, we present a model for licensing scheme that allows the expression, negotiation and management of digital rights, in federated object-sharing environment. We first discuss motivations issues around rights (DRM), then describe DRM implementation celebrate project, propose an extension to order take into account licenses as opposed individual rights.
Enforcing the purpose of data usage means to ensure that are used as it intends for and excessive cannot happen. In general, enforcement is a complicated task. The main difficulty identify an agent when requests perform action. this paper, we discuss design issue model based on our proposed structure: pre–, ongoing–, post–enforcement. We also propose solution control designed distributed healthcare information system, particularly, pre– ongoing–enforcement purpose. Furthermore, validate with...
In this paper, we present a model for licensing scheme that allows the expression, negotiation and management of digital rights, in federated object-sharing environment. We first discuss motivations issues around rights (DRM), then describe DRM implementation celebrate project, propose an extension to order take into account licenses as opposed individual rights.
Purpose of access is one the core concepts in privacy which considers data user's intent as a factor making control decisions and enforcement purpose required to ensure that used what it intends for. In general, complicated task. The main difficulty how identify an agent when requests perform action. this paper, we discuss design issue based on our proposed (defined) structure: pre-enforcement, ongoing-enforcement, post-enforcement. We also propose solution for usage designed distributed...
The paper reports on the current research activities related to delivery of a federated global identity management framework for provisioning secure ICT services; this represents significant step towards development security services Web, Grid and particularly future Mobile Wireless communication (ICT platforms). overall aim is provide seamless traversal access distributed resources in heterogeneous Grid, spaces. Furthermore, order consider value usefulness Trust-ME its strategic impact...