Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Ahmad Samer Wazan"'
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 1, Iss 3, Pp 422-452 (2021)
An effective network security requirement engineering is needed to help organizations in capturing cost-effective security solutions that protect networks against malicious attacks while meeting the business requirements. The diversity of currently a
Externí odkaz:
https://doaj.org/article/0ef8b20917bb4def8606297c11802048
Autor:
Ahmad Samer Wazan, David W Chadwick, Remi Venant, Eddie Billoir, Romain Laborde, Liza Ahmad, Mustafa Kaiiali
open access article Today, Linux users use sudo/su commands to attribute Linux’s administrative privileges to their programs. These commands always give the whole list of administrative privileges to Linux programs, unless there are pre-installed d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c7b822f56eec60bbc212f5c92080821a
https://hdl.handle.net/2086/22556
https://hdl.handle.net/2086/22556
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 1, Iss 22, Pp 422-452 (2021)
Journal of Cybersecurity and Privacy
Journal of Cybersecurity and Privacy, MDPI, 2021, 1 (3), pp.422-452. ⟨10.3390/jcp1030022⟩
Volume 1
Issue 3
Pages 22-452
Journal of Cybersecurity and Privacy
Journal of Cybersecurity and Privacy, MDPI, 2021, 1 (3), pp.422-452. ⟨10.3390/jcp1030022⟩
Volume 1
Issue 3
Pages 22-452
International audience; An effective network security requirement engineering is needed to help organizations in capturing cost-effective security solutions that protect networks against malicious attacks while meeting the business requirements. The
Autor:
Ahmad Samer Wazan, Frédéric Cuppens
Publikováno v:
Annals of Telecommunications. 78:133-134
Publikováno v:
SEC 2021: ICT Systems Security and Privacy Protection
36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC 2021)
36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC 2021), IFIP : International Federation for Information Processing, Jun 2021, Oslo, Norway. pp.196-209, ⟨10.1007/978-3-030-78120-0_13⟩
ICT Systems Security and Privacy Protection ISBN: 9783030781194
SEC
ICT Systems Security and Privacy Protection: 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings ; ISBN 978-3-030-78119-4
36th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2021)
36th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2021), Jun 2021, Oslo, Norway. pp.196-209, ⟨10.1007/978-3-030-78120-0_13⟩
36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC 2021)
36th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC 2021), IFIP : International Federation for Information Processing, Jun 2021, Oslo, Norway. pp.196-209, ⟨10.1007/978-3-030-78120-0_13⟩
ICT Systems Security and Privacy Protection ISBN: 9783030781194
SEC
ICT Systems Security and Privacy Protection: 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings ; ISBN 978-3-030-78119-4
36th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2021)
36th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2021), Jun 2021, Oslo, Norway. pp.196-209, ⟨10.1007/978-3-030-78120-0_13⟩
Part 4: Application and System Security; International audience; The typical way to run an administrative task on Linux is to execute it in the context of a super user. This breaks the principle of least privilege on access control. Other solutions,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::44c74d50c06c86c6c763e57174713264
https://ifip.hal.science/hal-03345757/file/512098_1_En_13_Chapter.pdf
https://ifip.hal.science/hal-03345757/file/512098_1_En_13_Chapter.pdf
Publikováno v:
EDUCON
Many IT labs require virtualization technology as students need to learn several software tools and operating systems. In an online setting, students sometimes are expected to fill the role of an IT lab architect by installing, configuring, deploying
Autor:
Abdelmalek Benzekri, Romain Laborde, Arnaud Oglaza, François Barrère, Sravani Teja Bulusu, Afonso Ferreira, Ahmad Samer Wazan
Publikováno v:
Handbook of Internet of Things
Handbook of Internet of Things, Springer, In press
HAL
Handbook of Internet of Things, Springer, In press
HAL
International audience; The increasing use of Industrial IOT (IIOT) solutions has led to an equal increase in the security risks associated with the connecteddevices. Security requirements engineering (SRE) aims at reducing these risks by implementin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::5e77a7c17fb15ffda9d6ac8dafb43ac2
https://hal.archives-ouvertes.fr/hal-03417339
https://hal.archives-ouvertes.fr/hal-03417339
Autor:
Omar Alfandi, Abdelmalek Benzekri, Ahmad Samer Wazan, David W. Chadwick, Eddie Billoir, Rémi Venant, Romain Laborde
Publikováno v:
IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing, Institute of Electrical and Electronics Engineers, 2020, pp.1-1. ⟨10.1109/TDSC.2020.3000595⟩
IEEE Transactions on Dependable and Secure Computing, Institute of Electrical and Electronics Engineers, 2020, pp.1-1. ⟨10.1109/TDSC.2020.3000595⟩
The Transport Layer Security (TLS) protocol aims to provide confidentiality and integrity of data. It is based on X.509 Certificates. Our previous research showed that popular Web Browsers exhibit non-standardized behaviour with respect to the certif
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e7291c30e7b44d5514075990878ae6dc
https://hal.archives-ouvertes.fr/hal-02863329
https://hal.archives-ouvertes.fr/hal-02863329
Publikováno v:
2020 12th Annual Undergraduate Research Conference on Applied Computing (URC).
Fast Identity Online (FIDO) Alliance and W3C have defined a set of specifications (called FIDO2) that allows a user to replace the password based authentication system. However, none of the high profile web sites have implemented FIDO2 yet as passwor
Publikováno v:
Annals of Telecommunications-annales des télécommunications
Annals of Telecommunications-annales des télécommunications, Springer, 2019, 74 (3-4), pp.185-196. ⟨10.1007/s12243-018-0673-0⟩
Annals of Telecommunications-annales des télécommunications, Springer, 2019, 74 (3-4), pp.185-196. ⟨10.1007/s12243-018-0673-0⟩
International audience; We present a dynamic security management framework where security policies are specified according to situations. Situation-based policies easily express complex dynamic security measures, are closer to business, and simplify
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::63ace6fd2ba665ed48baedf5ca00ffac
https://hal.archives-ouvertes.fr/hal-02548013/file/Laborde_24719.pdf
https://hal.archives-ouvertes.fr/hal-02548013/file/Laborde_24719.pdf