Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborative research environments like PlanetLab. Unfortunately, when it comes to the security analysis of these systems, the whole is certainly greater than the sum of its parts. That is, local intrusion detection and audit practices are insufficient for detecting distributed attacks such as coordinated network reconnaissance, stepping-stone attacks, and violations of application-level trust constraints between security domains. A distributed process that coordinates information from each member could detect these types of violations, but privacy concerns between member o...
International audienceThe omnipresence of services offered by diverse applications leads customers t...
When using distributed storage systems to outsource data storage into the cloud, it is often vital t...
Using server storage, clients can distantly store their information and appreciate the on-request to...
Recent trends in Internet computing have led to the popularization of many forms of virtual organiza...
Recent trends in Internet computing have led to the popularization of many forms of virtual organiza...
Organizations security becomes increasingly more difficult to obtain due to the fact that informatio...
International audienceOrganizations security becomes increasingly more difficultto obtain due to the...
Abstract To overcome the problem of attacks on networks, new Intrusion Detec-tion System (IDS) appro...
EGC 2009 selected papersInternational audienceTo overcome the problem of attacks on networks, new In...
In this paper, we propose a confidential logging and auditing service for distributed information sy...
In the age of Internet and loosely coupled applications, privacy has become a matter of concern. Ind...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Event correlation is a widely-used data processing methodology, and is useful for the distributed mo...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
This paper presents a new framework for distributed intrusion detection based on taint marking. Our ...
International audienceThe omnipresence of services offered by diverse applications leads customers t...
When using distributed storage systems to outsource data storage into the cloud, it is often vital t...
Using server storage, clients can distantly store their information and appreciate the on-request to...
Recent trends in Internet computing have led to the popularization of many forms of virtual organiza...
Recent trends in Internet computing have led to the popularization of many forms of virtual organiza...
Organizations security becomes increasingly more difficult to obtain due to the fact that informatio...
International audienceOrganizations security becomes increasingly more difficultto obtain due to the...
Abstract To overcome the problem of attacks on networks, new Intrusion Detec-tion System (IDS) appro...
EGC 2009 selected papersInternational audienceTo overcome the problem of attacks on networks, new In...
In this paper, we propose a confidential logging and auditing service for distributed information sy...
In the age of Internet and loosely coupled applications, privacy has become a matter of concern. Ind...
The rapidly increasing array of Internet-scale threats is a pressing problem for every organization ...
Event correlation is a widely-used data processing methodology, and is useful for the distributed mo...
The problem of mitigating maliciously injected signals in interconnected systems is dealt with in th...
This paper presents a new framework for distributed intrusion detection based on taint marking. Our ...
International audienceThe omnipresence of services offered by diverse applications leads customers t...
When using distributed storage systems to outsource data storage into the cloud, it is often vital t...
Using server storage, clients can distantly store their information and appreciate the on-request to...