skip to content

Gabillon, Alban

Overview
Works: 12 works in 33 publications in 2 languages and 634 library holdings
Genres: Conference papers and proceedings 
Roles: Author, Editor, Thesis advisor
Classifications: QA76.9.D5, 005.438
Publication Timeline
Key
Publications about Alban Gabillon
Publications by Alban Gabillon
Most widely held works by Alban Gabillon
Web-based information technologies and distributed systems by Alban Gabillon( Book )
9 editions published in 2010 in English and held by 69 libraries worldwide
This book is devoted to the emerging and novel concepts, architectures and methodologies for creating an interconnected world where information can be exchanged easily, tasks can be processed collaboratively, and communities of users with similar interests can be formed transcending borders, while addressing the increasingly pervasive security threats. This book is a collection of the best papers from WITDS Track of IEEE SITIS 2008. All the chapters are newly extended versions of the original papers. The book contains four parts; the first part is devoted to Ad Hoc and Routing Protocols where novel algorithms are proposed for ad hoc networks; the second part focuses on security and policies and the various innovative solutions; the third part covers efficient algorithms for web services; the fourth part features the various intelligent systems for agent systems, smart home environment, and service-driven applications
Web-based information technologies and distributed systems by Alban Gabillon( file )
6 editions published in 2010 in English and held by 5 libraries worldwide
This book is devoted to the emerging and novel concepts, architectures and methodologies for creating an interconnected world where information can be exchanged easily, tasks can be processed collaboratively, and communities of users with similar interests can be formed transcending borders, while addressing the increasingly pervasive security threats. This book is a collection of the best papers from WITDS Track of IEEE SITIS 2008. All the chapters are newly extended versions of the original papers. The book contains four parts; the first part is devoted to Ad Hoc and Routing Protocols where novel algorithms are proposed for ad hoc networks; the second part focuses on security and policies and the various innovative solutions; the third part covers efficient algorithms for web services; the fourth part features the various intelligent systems for agent systems, smart home environment, and service-driven applications
Risks and security of internet and systems 10th international conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015 : revised selected papers by CRiSIS( Book )
7 editions published in 2016 in English and held by 3 libraries worldwide
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Risks and Security of Internet Systems, CRiSIS 2015, held in Mytilene, Lesbos Island, Greece, in July 2015. The 18 full papers presented were selected from 50 submissions. The papers sessions that have covered a broad range of topics: trust and privacy issues, privacy policies and policy based protocols, risk management, risk analysis and vulnerability assessment, cloud systems and cryptography, and attack and security measures
Étude de la phytogéographie des îles hautes de Polynésie française par classification SVM d'images multi-sources by Robin Sylvain Pouteau( Book )
2 editions published in 2011 in French and held by 2 libraries worldwide
The floristic composition of French Polynesian high volcanic islands are characterized by a great spatial heterogeneity. The existing remote sensing-based mapping methods are hardly suitable for such a complexity level. This study aims to adapt these methods in order to yield maps with a maximum accuracy. First, SVM (Support Vector Machines, a promising machine learning algorithm) classification accuracy is compared to classification accuracy of a range of other algorithms to complement the literature. Then, a ground data collection methodology that takes account of the SVM paradigm is described. We distinguish two study models requiring the same tools but dissimilar methodologies to be mapped: dominant species with a characteristic spectral response for which all available source images (multispectral, synthetic aperture RaDAR, environmental proxies) can be merged. For this purpose, we define a selective classification scheme that considers the discriminative properties of each species; And (ii) species found in the forest subcanopy or rare species which cannot be remote sensed. In this case, remote sensing data are used a priori to produce a canopy map that is subsequently staked with a set of environmental proxies to be integrated by a SVM in order to model the ecological niche of species. These methods can lead to a more accurate knowledge of plant distribution across montane tropical forest landscapes
Proceedings of the 3rd ACM Workshop on Secure Web Services Alexandria (Virginia), November 3, 2006 by ACM Workshop on Secure Web Services( Book )
1 edition published in 2006 in English and held by 2 libraries worldwide
Sécurité multi-niveaux dans les bases de données à objets by Alban Gabillon( Book )
2 editions published in 1995 in French and held by 2 libraries worldwide
Après un état de l'art critique des modèles de sécurité multi-niveaux existants pour les bases de données à objets, cette thèse présente un modèle complet et formel de sécurité multi-niveaux pour les bases de données à objets. Un langage du premier ordre est d'abord défini. Ce langage permet de formaliser aussi bien le contenu d'une base de données à objets que des contraintes d'intégrité devant être respectées dans une bases de données à objets. Ce langage est ensuite étendu afin de pouvoir classifier toute formule atomique représentant une information contenue dans la base de données. A partir des contraintes d'intégrité, des théorèmes de contrôle des flux d'information sont dérivés. Ces théorèmes doivent être respectés dans toute base de données à objets multi-niveaux. Un premier modèle de sécurité est ainsi obtenu. Ce modèle est appelé le modèle Vue Unique. Dans le modèle Vue Unique, les attributs d'un objet ou d'une classe peuvent être classifiés de façon indépendante. Le modèle Vue Unique permet donc de gérer des entités multi-niveaux. Cependant, de ce fait, le modèle Vue Unique semble difficilement implémentable. Un raffinement du modèle Vue Unique est alors proposé. Ce nouveau modèle de sécurité est appelé le modèle Multi-Vues. Dans le modèle Multi-Vues, chaque entité multi-niveaux est décomposée en plusieurs entités mono-niveau. Un langage d'interrogation ainsi que des opérations de mise à jour (insertion, suppression) pour une base de données à objets sécurisée avec le modèle Multi-Vues sont alors spécifiés. Une solution pour implémenter le modèle Multi-Vues est aussi présentée. Enfin, le problème de la déclassification des informations dans une base de données en général et dans une base de données à objets en particulier est étudié
RSIDS un IDS distribué basé sur le framework CVSS by Julien Aussibal( Book )
1 edition published in 2009 in French and held by 1 library worldwide
Intrusion detection is a method that ensures the availability concept in systems and computer networks. This availability is generally undermined by various anomalies. These anomalies can be caused either legitimately unintended result has operations working on these systems (broken link, traffic, or ...), so illegitimate with malicious operations designed to undermine the availability of these systems. The implementation of these various anomalies detection tools, such as IDS (Intrusion Detection System), contribute to early identification of these anomalies and to block them. This thesis has enabled us to develop a new generation platform to generate legitimate and illegitimate anomalies. This work was carried out under the project METROSEC. This platform has enabled us to obtain various traffic captures containing these anomalies. The various illegimitate anomalies were performed with classic tools to make Denial of Service like TFN2k or Trinoo. Legitimate Anormalies were also conducted with flash crowd phenomenon. All these catch real traffic were used in further research on intrusion detection for the evaluation of new methods of detection. In a second part, the implementation of a new detection tool seems necessary to improve the quality of detection of these anomalies. This new distributed IDS, called RSIDS (Risk Scored Intrusion Detection System), will retrieve the results of a multitude of heterogeneous probes. The use of probes will remove the risk of false alarms. Indeed, a probe is not able to detect all anomalies that occur on a system or network. Each alert provided by its probes will be evaluated according to their degree of dangerousness. The assessment of dangerousness based on the framework CVSS (Common Vulnerability Scoring System)
L'horodatage sécurisé des documents électroniques by Kaouther Blibech( Book )
1 edition published in 2006 in French and held by 1 library worldwide
Timestamping is a technique for providing proof-of-existence of a message/document at a given time. Timestamping is mandatory in many domains like patent submissions, electronic votes, electronic commerce and non-repudiation of digital signatures. In secure timestamping systems, one or several timestamping authorities process timestamping requests and provide formal proofs in order to guarantee that requests were correctly timestamped. In this thesis, we provide two secure timestamping systems. The first one uses an authenticated totally ordered append-only dictionary based on perfect skip lists. We show that our timestamping scheme has better performances than existing ones. The second one is a distributed timestamping scheme of type k among n. We first prove that this type of distributed timestamping systems is not secure if the used timestamping authorities do not use secure timestamping protocols. We then provide a new distributed timestamping scheme which is secure
Sécurité des Métadonnées by Léo Letouzey( Book )
1 edition published in 2011 in French and held by 1 library worldwide
The semantic web is a web of metadata. It is powered by several technologies which are described in w3c recommendations. These recommendations include the RDF (Ressource Description Framework) document format and the SPARQL (SPARQL Protocol and RDF Query Language) query language. The RDF format is used to describe information using a standard framework. Statements are expressed in the form of <Subject> <Predicat> <Object> (RDF triple). SPARQL is an, SQL-like, RDF query language that allows the retrieval of data inside RDDF documents. Several access control models have been proposed to protect RDF data.All these models have the same two drawbacks: 1) the security policy is based on RDF triple patterns while RDF documents are un fact graph patterns. 2) none of these models comes with an administration model defining how the security policy may be described and updated. In this thesis we introduce a new Access Control Model which deals with the semantic web needs and constraints and solves the different issues of the previous models. Finally, we describe a proxy server implementing our model
Sécurité des bases de données XML (eXtensible Markup Language) by Janvier Fansi( Book )
1 edition published in 2007 in French and held by 1 library worldwide
XML has emerged as the de facto standard for representing and exchanging information on the Internet. As Internet is a public network, corporations and organizations which use XML need mechanisms to protect XML data against unauthorised access. Thus, several schemes for XML access control have been proposed. They can be classified in two major categories: views materialization and queries rewriting techniques. In this thesis, we point out the drawbacks of views materialization approaches through the development of a prototype of secured XML database based on one of those approaches. Afterwards, we propose a technique aimed at securing XML by means of queries rewriting. We prove its correctness and show that it is more efficient than competing works. Finally, we extend our proposal in order to controlling the updating of XML databases
Protocoles cryptographiques by Duc-Phong Le( Book )
1 edition published in 2009 in French and held by 1 library worldwide
La cryptographie doit proposer des protocoles algorithmiquement efficaces et sûrs face à des menaces spécifiques. Cette thèse se propose de définir des schémas cryptographiques prouvés sûrs. La signature électronique, qui prend de plus en plus d'importance avec le développement du document électronique, est une méthode d'authentification des données. La multisignature permettant à plusieurs parties de signer un document commun est utile dans plusieurs applications comme la réalisation d'un bon de commande, d'un contrat de travail . . . Nous effectuons une première étude sur les protocoles de multisignature, leur conception et leur preuve de sécurité. Nous proposons deux schémas de multisignature sûrs contre les attaques rogue-key dans le modèle de plain public key. Leur réduction de sécurité est fine aux problèmes Diffie-Hellman. Dans un deuxième temps, nous nous intéressons à l'authentification temporelle des données qui est fournie par les schémas d'horodatage. Nous étudions le besoin d'horodater les signatures électroniques. Horodater une signature nous permet d'assurer sa non répudiation et sa validité à long terme même si au moment où l'on effectue cette preuve les éléments permettant la vérification de la signature ne sont plus valides ou que le protocole de signature a été cassé. Nous montrons comment il est possible de signer et horodater de façon _able un document électronique en une étape. Finalement, nous proposons un nouveau schéma d'horodatage de liaison assurant l'authentification temporelle absolue des documents électroniques
Sécurité Multi-Niveaux dans les Bases de Données by Alban Gabillon( Book )
1 edition published in 2000 in French and held by 1 library worldwide
 
moreShow More Titles
fewerShow Fewer Titles
Languages
English (23)
French (10)
Covers
Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.