Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2020
Solving security constraints for 5G slice embedding: A proof-of-concept
Computers and Security (CSEC), Volume 89, Issue Chttps://doi.org/10.1016/j.cose.2019.101662AbstractNetwork slicing is a prominent feature of 5G, which allow tenants to rent network and computing virtual resources from one or more Infrastructure Providers (InPs). Those resources are allocated according to tenants requirements, not ...
- ArticleDecember 2013
Privacy Control in Cloud VM File Systems
CLOUDCOM '13: Proceedings of the 2013 IEEE International Conference on Cloud Computing Technology and Science - Volume 02Pages 276–280https://doi.org/10.1109/CloudCom.2013.147Cloud Computing offers great benefits such as reduced IT costs and an improved business agility. Nevertheless, enterprises are still hesitant to put their sensitive data in the cloud as they notably fear privacy issues (e.g., violation of country-based ...
- research-articleJune 2011
FORPS: friends-oriented reputation privacy score
SeceS '11: Proceedings of the First International Workshop on Security and Privacy Preserving in e-SocietiesPages 19–25https://doi.org/10.1145/2107581.2107585The Friends-Oriented Reputation Privacy Score (FORPS) system provides a smart and simple way to help end-users managing their privacy in a social network. It aims to prevent a non-desirable propagation of personal sensitive data. FORPS built privacy ...
- ArticleJune 2011
A Multi-environment Application of Privacy Data Envelopes
- Mahmoud Ghorbel,
- Armen Aghasaryan,
- Marie-Pascale Dupont,
- Stephane Betge-Brezetz,
- Guy-Bertrand Kamga,
- Sophie Piekarec
POLICY '11: Proceedings of the 2011 IEEE International Symposium on Policies for Distributed Systems and NetworksPages 180–181https://doi.org/10.1109/POLICY.2011.38This demonstration illustrates the concept of Privacy Data Envelopes (PDE) where each piece of information identified by the user as privacy-sensitive is embodied (or "enveloped") into a data structure that in addition to the initial raw data carries ...
- articleJune 2010
Personalized application enablement by web session analysis and multisource user profiling
- Armen Aghasaryan,
- Murali Kodialam,
- Sarit Mukherjee,
- Yann Toms,
- Christophe Senot,
- Stéphane Betgé-Brezetz,
- T. V. Lakshman,
- Limin Wang
Mastering knowledge of the user profile is one of the technical cornerstones for service providers who handle a large amount of end user service consumption data and are well positioned to dynamically infer user interest domains. This paper presents a ...
- research-articleNovember 2008
A personalized access model: concepts and services for content delivery platforms
- Sofiane Abbar,
- Mokrane Bouzeghoub,
- Dimitre Kostadinov,
- Stéphane Lopes,
- Armen Aghasaryan,
- Stéphane Betge-Brezetz
iiWAS '08: Proceedings of the 10th International Conference on Information Integration and Web-based Applications & ServicesPages 41–47https://doi.org/10.1145/1497308.1497320Access to relevant information, adapted to user's needs, preferences and environment, is a challenge in many applications running in content delivery platforms, like IPTV, VoD and mobile Video. In order to provide users with personalized content, ...
- articleAugust 2008
Adaptive notification framework for converged environments
As communication environments converge, people have more ways in which to send and receive informationthrough various services, networks, and end-user devices. This paper proposes a notification framework architecture that allows notifications to be ...
- articleAugust 2008
A profiling engine for converged service delivery platforms
As services become increasingly personalized, mastering knowledge of user profiles is becoming a key requirement for service providers who hold large amounts of end user service consumption data. This paper describes a profiling engine that ...
- ArticleNovember 2000
Automatic Generation of Simulation Models for the Evaluation of Performance and Reliability of Architectures Specified in UML
EDO '00: Revised Papers from the Second International Workshop on Engineering Distributed ObjectsPages 83–101Non-functional requirements are especially critical in real-time and distributed systems. UML is progressively becoming a standard of object-oriented analysis and design of systems, it pays attention to software architectures specification, but it does ...