[HTML][HTML] Modèles et politiques de sécurité pour les domaines de la santé et des affaires sociales

A Abou El Kalam - 2003 - theses.hal.science
Ce mémoire propose une démarche pour définir des politiques de sécurité adaptées aux
systèmes d'informations et de communication en santé et social (SICSS). Ces systèmes …

Security model for health care computing and communication systems

AA El Kalam, Y Deswarte - Security and Privacy in the Age of Uncertainty …, 2003 - Springer
Abstract Health Care Computing and Communication Systems (HCCS) are characterized by
the complexity of the organizations to take into account and the richness of properties that …

Intrusion tolerance for internet applications

Y Deswarte, D Powell - Building the Information Society: IFIP 18th World …, 2004 - Springer
The Internet has become essential to most enterprises and many private individuals.
However, both the network and computer systems connected to it are still too vulnerable and …

Hardware support for high performance, intrusion-and fault-tolerant systems

GP Saggese, C Basile, L Romano… - Proceedings of the …, 2004 - ieeexplore.ieee.org
The paper proposes a combined hardware/software approach for realizing high
performance, intrusion-and fault-tolerant services. The approach is demonstrated for (yet not …

Watershed parallel algorithm for asynchronous processors array

B Galilee, F Mamalet, M Renaudin… - … on Multimedia and …, 2002 - ieeexplore.ieee.org
A joint algorithm-architecture analysis leads to a new version of picture segmentation system
adapted to multimedia mobile terminal constraints. The asynchronous processors network …

Intrusion-tolerant fine-grained authorization for Internet applications

V Nicomette, D Powell, Y Deswarte, N Abghour… - Journal of Systems …, 2011 - Elsevier
This paper presents the architecture of an authorization service proposed for composite
operations involving many Internet partners. The main contributions of this paper are:(1) a …

Intrusion detection and security policy framework for distributed environments

AA El Kalam, J Briffaut, C Toinard… - Proceedings of the 2005 …, 2005 - ieeexplore.ieee.org
This paper presents a novel intrusion detection approach and a new infrastructure to enforce
the security policy within a distributed system. The solution guarantees the consistency of …

[PDF][PDF] Modèle de sécurité pour le secteur de la santé.

Y Deswarte, A Abou El Kalam - Tech. Sci. Informatiques, 2004 - researchgate.net
Cet article propose un modèle de sécurité suffisamment général pour couvrir toute la
diversité des systèmes d'information et de communication de la santé (SICS). L'un des …

Conception et réalisation d'une architecture tolérant les intrusions pour des serveurs internet

A Saidane - 2005 - theses.hal.science
La connexion de systèmes critiques à Internet pose de sérieux problèmes de sécurité. En
effet, les techniques classiques de protection sont souvent inefficaces, dans ce nouveau …

[图书][B] Intrusion and fault tolerance: For wireline and wireless networks

C Basile - 2005 - search.proquest.com
The integration of wireline networks with wireless ad hoc networks is expected to have a
revolutionary impact on a wide range of applications by enabling pervasive computing. For …