Security Component

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 324 Experts worldwide ranked by ideXlab platform

Michel Riveill - One of the best experts on this subject based on the ideXlab platform.

  • Designing Security Properties-Centric Communication Protocols using a Component-Based Approach
    International Journal of Distributed Systems and Technologies, 2020
    Co-Authors: N. Nobelis, Karima Boudaoud, C. Delettre, Michel Riveill
    Abstract:

    Numerous communication protocols have been designed offering a set of Security properties through the use of cryptographic tools to secure electronic document transfer. However, there is no clear match between the tools used and Security properties they offer. To solve this problem, the authors propose to use a Component-based approach; more specifically the authors introduce the notion of high-level Security Component where each Component provides an atomic Security property. This approach will facilitate the design of new protocols that fulfill any specific set of Security properties by assembling the appropriate Components. At the same time, users using a protocol designed with these Security Components will have the assurance that the protocol satisfies the Security properties required for the electronic document transfer. The authors validate the approach by showing how the integrity property can be added to the HTTP protocol to design a Security property-centric HTTPS and in this case an integrity-only HTTPS.

  • A Component-Based Approach to Security Protocol Design
    2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications, 2011
    Co-Authors: N. Nobelis, Karima Boudaoud, C. Delettre, Michel Riveill
    Abstract:

    Electronic document transfer is a key operation in many of today's most important applications (workflow, e-commerce, etc.). Each of these applications requires different Security properties and constraints. Numerous communication protocols have been designed offering a set of Security properties through the use of cryptographic tools. However, there is no clear match between the tools used and Security properties they offer. In this paper, we propose to use a Component-based approach to secure electronic document transfer. We introduce software Components as "high-level Security Components", where each Component provides an atomic Security property such as integrity, confidentiality or authenticity. With this approach, a protocol developer is able to easily enhance an existing protocol by adding a specific Security Component providing a specific Security property. Moreover, it will be easy to design new protocols to fulfil any specific set of Security properties by assembling the appropriate Components. At the same time, a user using a protocol designed with these Security Components will have the assurance and certification that the protocol satisfies the Security properties required for the electronic document transfer at hand. Our approach is validated by showing how an integrity property can be added to the HTTP protocol to design a Security property-centric HTTP and in this case an integrity-only HTTP.

  • AINA Workshops - A Component-Based Approach to Security Protocol Design
    2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications, 2011
    Co-Authors: N. Nobelis, Karima Boudaoud, C. Delettre, Michel Riveill
    Abstract:

    Electronic document transfer is a key operation in many of today’s most important applications (workflow, e-commerce, etc.). Each of these applications requires different Security properties and constraints. Numerous communication protocols have been designed offering a set of Security properties through the use of cryptographic tools. However, there is no clear match between the tools used and Security properties they offer. In this paper, we propose to use a Component-based approach to secure electronic document transfer. We introduce software Components as "high-level Security Components", where each Component provides an atomic Security property such as integrity, confidentiality or authenticity. With this approach, a protocol developer is able to easily enhance an existing protocol by adding a specific Security Component providing a specific Security property. Moreover, it will be easy to design new protocols to fulfil any specific set of Security properties by assembling the appropriate Components. At the same time, a user using a protocol designed with these Security Components will have the assurance and certification that the protocol satisfies the Security properties required for the electronic document transfer at hand. Our approach is validated by showing how an integrity property can be added to the HTTP protocol to design a Security property-centric HTTP and in this case an integrity-only HTTP.

N. Nobelis - One of the best experts on this subject based on the ideXlab platform.

  • Designing Security Properties-Centric Communication Protocols using a Component-Based Approach
    International Journal of Distributed Systems and Technologies, 2020
    Co-Authors: N. Nobelis, Karima Boudaoud, C. Delettre, Michel Riveill
    Abstract:

    Numerous communication protocols have been designed offering a set of Security properties through the use of cryptographic tools to secure electronic document transfer. However, there is no clear match between the tools used and Security properties they offer. To solve this problem, the authors propose to use a Component-based approach; more specifically the authors introduce the notion of high-level Security Component where each Component provides an atomic Security property. This approach will facilitate the design of new protocols that fulfill any specific set of Security properties by assembling the appropriate Components. At the same time, users using a protocol designed with these Security Components will have the assurance that the protocol satisfies the Security properties required for the electronic document transfer. The authors validate the approach by showing how the integrity property can be added to the HTTP protocol to design a Security property-centric HTTPS and in this case an integrity-only HTTPS.

  • A Component-Based Approach to Security Protocol Design
    2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications, 2011
    Co-Authors: N. Nobelis, Karima Boudaoud, C. Delettre, Michel Riveill
    Abstract:

    Electronic document transfer is a key operation in many of today's most important applications (workflow, e-commerce, etc.). Each of these applications requires different Security properties and constraints. Numerous communication protocols have been designed offering a set of Security properties through the use of cryptographic tools. However, there is no clear match between the tools used and Security properties they offer. In this paper, we propose to use a Component-based approach to secure electronic document transfer. We introduce software Components as "high-level Security Components", where each Component provides an atomic Security property such as integrity, confidentiality or authenticity. With this approach, a protocol developer is able to easily enhance an existing protocol by adding a specific Security Component providing a specific Security property. Moreover, it will be easy to design new protocols to fulfil any specific set of Security properties by assembling the appropriate Components. At the same time, a user using a protocol designed with these Security Components will have the assurance and certification that the protocol satisfies the Security properties required for the electronic document transfer at hand. Our approach is validated by showing how an integrity property can be added to the HTTP protocol to design a Security property-centric HTTP and in this case an integrity-only HTTP.

  • AINA Workshops - A Component-Based Approach to Security Protocol Design
    2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications, 2011
    Co-Authors: N. Nobelis, Karima Boudaoud, C. Delettre, Michel Riveill
    Abstract:

    Electronic document transfer is a key operation in many of today’s most important applications (workflow, e-commerce, etc.). Each of these applications requires different Security properties and constraints. Numerous communication protocols have been designed offering a set of Security properties through the use of cryptographic tools. However, there is no clear match between the tools used and Security properties they offer. In this paper, we propose to use a Component-based approach to secure electronic document transfer. We introduce software Components as "high-level Security Components", where each Component provides an atomic Security property such as integrity, confidentiality or authenticity. With this approach, a protocol developer is able to easily enhance an existing protocol by adding a specific Security Component providing a specific Security property. Moreover, it will be easy to design new protocols to fulfil any specific set of Security properties by assembling the appropriate Components. At the same time, a user using a protocol designed with these Security Components will have the assurance and certification that the protocol satisfies the Security properties required for the electronic document transfer at hand. Our approach is validated by showing how an integrity property can be added to the HTTP protocol to design a Security property-centric HTTP and in this case an integrity-only HTTP.

N. Gnanambigai - One of the best experts on this subject based on the ideXlab platform.

  • Neural based Security approach for cloud databases using counter propagation
    Indian Journal of Science and Technology, 2016
    Co-Authors: S. Jegadeeswari, P. Dinadayalan, N. Gnanambigai
    Abstract:

    Neural Network is an efficient implementing technique for cryptographic algorithms to provide Security in cloud environment. Cloud Computing is an outsourced on-demand computing service, where Privacy preserving is very difficult to provide. Secured Data Sharing is important in cloud storage aspect. The proposed Neural Data Security Model ensures high data confidentiality and Security in cloud database environment. This Model is a combination of, Sensitive Data Component (SDC) and Counter Propagation Neural Data Security Component (CPNDSC). The Sensitive data Component is implemented for storing the fragmented sensitive data. In Neural Data Security Component the Neural cryptographic algorithm is used to encrypt the sensitive data to enhance the confidentiality level by using Counter Propagation Neural Network.This reasearch is carried on cloud databases and artificial Neural Network that achieves high data Security in cloud environment.

  • ICACCI - A Neural Data Security Model: Ensure high confidentiality and Security in cloud datastorage environment
    2015 International Conference on Advances in Computing Communications and Informatics (ICACCI), 2015
    Co-Authors: S. Jegadeeswari, P. Dinadayalan, N. Gnanambigai
    Abstract:

    Cloud computing is a computing paradigm which provides a dynamic environment for end users to guarantee Quality of Service (QoS) on data towards confidentiality on the out sourced data. Confidentiality is about accessing a set of information from a cloud database with a high Security level. This research proposes a new cloud data Security model, I Neurol Data Security Model to ensure high confidentiality and Security in cloud data storage environment for achieving data confidentiality in the cloud database platform. This cloud Neurol Data Security Model comprises Dynamic Hashing Fragmented Component and Feedback Neurol Data Security Component. The data Security Component deals with data encryption for sensitive data using the RSA algorithm to increase the confidentiality level. The fragmented sensitive data is stored in dynamic hashing. The Feedback Neurol Data Security Component is used to encrypt and decrypt the sensitive data by using Feedback Neural Network, This Feedback Neural Network is deployed using the RS. I Security algorithm. This work is efficient and effective for all kinds of queries requested by the user. The performance of this work is better than the conventional cloud data Security models as it achieve a high data confidentiality level.

  • A Neural Data Security Model: Ensure high confidentiality and Security in cloud datastorage environment
    2015 International Conference on Advances in Computing Communications and Informatics (ICACCI), 2015
    Co-Authors: S. Jegadeeswari, P. Dinadayalan, N. Gnanambigai
    Abstract:

    Cloud computing is a computing paradigm which provides a dynamic environment for end users to guarantee Quality of Service (QoS) on data towards confidentiality on the out sourced data. Confidentiality is about accessing a set of information from a cloud database with a high Security level This research proposes a new cloud data Security model, A Neural Data Security Model to ensure high confidentiality and Security in cloud data storage environment for achieving data confidentiality in the cloud database platform. This cloud Neural Data Security Model comprises Dynamic Hashing Fragmented Component and Feedback Neural Data Security Component. The data Security Component deals with data encryption for sensitive data using the RSA algorithm to increase the confidentiality level. The fragmented sensitive data is stored in dynamic hashing. The Feedback Neural Data Security Component is used to encrypt and decrypt the sensitive data by using Feedback Neural Network. This Feedback Neural Network is deployed using the RSA Security algorithm. This work is efficient and effective for all kinds of queries requested by the user. The performance of this work is better than the conventional cloud data Security models as it achieve a high data confidentiality level.

Karima Boudaoud - One of the best experts on this subject based on the ideXlab platform.

  • Designing Security Properties-Centric Communication Protocols using a Component-Based Approach
    International Journal of Distributed Systems and Technologies, 2020
    Co-Authors: N. Nobelis, Karima Boudaoud, C. Delettre, Michel Riveill
    Abstract:

    Numerous communication protocols have been designed offering a set of Security properties through the use of cryptographic tools to secure electronic document transfer. However, there is no clear match between the tools used and Security properties they offer. To solve this problem, the authors propose to use a Component-based approach; more specifically the authors introduce the notion of high-level Security Component where each Component provides an atomic Security property. This approach will facilitate the design of new protocols that fulfill any specific set of Security properties by assembling the appropriate Components. At the same time, users using a protocol designed with these Security Components will have the assurance that the protocol satisfies the Security properties required for the electronic document transfer. The authors validate the approach by showing how the integrity property can be added to the HTTP protocol to design a Security property-centric HTTPS and in this case an integrity-only HTTPS.

  • A Component-Based Approach to Security Protocol Design
    2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications, 2011
    Co-Authors: N. Nobelis, Karima Boudaoud, C. Delettre, Michel Riveill
    Abstract:

    Electronic document transfer is a key operation in many of today's most important applications (workflow, e-commerce, etc.). Each of these applications requires different Security properties and constraints. Numerous communication protocols have been designed offering a set of Security properties through the use of cryptographic tools. However, there is no clear match between the tools used and Security properties they offer. In this paper, we propose to use a Component-based approach to secure electronic document transfer. We introduce software Components as "high-level Security Components", where each Component provides an atomic Security property such as integrity, confidentiality or authenticity. With this approach, a protocol developer is able to easily enhance an existing protocol by adding a specific Security Component providing a specific Security property. Moreover, it will be easy to design new protocols to fulfil any specific set of Security properties by assembling the appropriate Components. At the same time, a user using a protocol designed with these Security Components will have the assurance and certification that the protocol satisfies the Security properties required for the electronic document transfer at hand. Our approach is validated by showing how an integrity property can be added to the HTTP protocol to design a Security property-centric HTTP and in this case an integrity-only HTTP.

  • AINA Workshops - A Component-Based Approach to Security Protocol Design
    2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications, 2011
    Co-Authors: N. Nobelis, Karima Boudaoud, C. Delettre, Michel Riveill
    Abstract:

    Electronic document transfer is a key operation in many of today’s most important applications (workflow, e-commerce, etc.). Each of these applications requires different Security properties and constraints. Numerous communication protocols have been designed offering a set of Security properties through the use of cryptographic tools. However, there is no clear match between the tools used and Security properties they offer. In this paper, we propose to use a Component-based approach to secure electronic document transfer. We introduce software Components as "high-level Security Components", where each Component provides an atomic Security property such as integrity, confidentiality or authenticity. With this approach, a protocol developer is able to easily enhance an existing protocol by adding a specific Security Component providing a specific Security property. Moreover, it will be easy to design new protocols to fulfil any specific set of Security properties by assembling the appropriate Components. At the same time, a user using a protocol designed with these Security Components will have the assurance and certification that the protocol satisfies the Security properties required for the electronic document transfer at hand. Our approach is validated by showing how an integrity property can be added to the HTTP protocol to design a Security property-centric HTTP and in this case an integrity-only HTTP.

C. Delettre - One of the best experts on this subject based on the ideXlab platform.

  • Designing Security Properties-Centric Communication Protocols using a Component-Based Approach
    International Journal of Distributed Systems and Technologies, 2020
    Co-Authors: N. Nobelis, Karima Boudaoud, C. Delettre, Michel Riveill
    Abstract:

    Numerous communication protocols have been designed offering a set of Security properties through the use of cryptographic tools to secure electronic document transfer. However, there is no clear match between the tools used and Security properties they offer. To solve this problem, the authors propose to use a Component-based approach; more specifically the authors introduce the notion of high-level Security Component where each Component provides an atomic Security property. This approach will facilitate the design of new protocols that fulfill any specific set of Security properties by assembling the appropriate Components. At the same time, users using a protocol designed with these Security Components will have the assurance that the protocol satisfies the Security properties required for the electronic document transfer. The authors validate the approach by showing how the integrity property can be added to the HTTP protocol to design a Security property-centric HTTPS and in this case an integrity-only HTTPS.

  • A Component-Based Approach to Security Protocol Design
    2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications, 2011
    Co-Authors: N. Nobelis, Karima Boudaoud, C. Delettre, Michel Riveill
    Abstract:

    Electronic document transfer is a key operation in many of today's most important applications (workflow, e-commerce, etc.). Each of these applications requires different Security properties and constraints. Numerous communication protocols have been designed offering a set of Security properties through the use of cryptographic tools. However, there is no clear match between the tools used and Security properties they offer. In this paper, we propose to use a Component-based approach to secure electronic document transfer. We introduce software Components as "high-level Security Components", where each Component provides an atomic Security property such as integrity, confidentiality or authenticity. With this approach, a protocol developer is able to easily enhance an existing protocol by adding a specific Security Component providing a specific Security property. Moreover, it will be easy to design new protocols to fulfil any specific set of Security properties by assembling the appropriate Components. At the same time, a user using a protocol designed with these Security Components will have the assurance and certification that the protocol satisfies the Security properties required for the electronic document transfer at hand. Our approach is validated by showing how an integrity property can be added to the HTTP protocol to design a Security property-centric HTTP and in this case an integrity-only HTTP.

  • AINA Workshops - A Component-Based Approach to Security Protocol Design
    2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications, 2011
    Co-Authors: N. Nobelis, Karima Boudaoud, C. Delettre, Michel Riveill
    Abstract:

    Electronic document transfer is a key operation in many of today’s most important applications (workflow, e-commerce, etc.). Each of these applications requires different Security properties and constraints. Numerous communication protocols have been designed offering a set of Security properties through the use of cryptographic tools. However, there is no clear match between the tools used and Security properties they offer. In this paper, we propose to use a Component-based approach to secure electronic document transfer. We introduce software Components as "high-level Security Components", where each Component provides an atomic Security property such as integrity, confidentiality or authenticity. With this approach, a protocol developer is able to easily enhance an existing protocol by adding a specific Security Component providing a specific Security property. Moreover, it will be easy to design new protocols to fulfil any specific set of Security properties by assembling the appropriate Components. At the same time, a user using a protocol designed with these Security Components will have the assurance and certification that the protocol satisfies the Security properties required for the electronic document transfer at hand. Our approach is validated by showing how an integrity property can be added to the HTTP protocol to design a Security property-centric HTTP and in this case an integrity-only HTTP.