130 results on '"BRUNIE, LIONEL"'
Search Results
2. Secure and efficient decentralized machine learning through group-based model aggregation
- Author
-
Mosqueda González, Brandon A., Hasan, Omar, Uriawan, Wisnu, Badr, Youakim, and Brunie, Lionel
- Published
- 2024
- Full Text
- View/download PDF
3. Managing a pool of rules for credit card fraud detection by a Game Theory based approach
- Author
-
Gianini, Gabriele, Ghemmogne Fossi, Leopold, Mio, Corrado, Caelen, Olivier, Brunie, Lionel, and Damiani, Ernesto
- Published
- 2020
- Full Text
- View/download PDF
4. GraphSIF: analyzing flow of payments in a Business-to-Business network to detect supplier impersonation
- Author
-
Canillas, Rémi, Hasan, Omar, Sarrat, Laurent, and Brunie, Lionel
- Published
- 2020
- Full Text
- View/download PDF
5. 4PR: Privacy preserving routing in mobile delay tolerant networks
- Author
-
Miao, Jingwei, Hasan, Omar, Mokhtar, Sonia Ben, Brunie, Lionel, and Hasan, Ammar
- Published
- 2016
- Full Text
- View/download PDF
6. Trust management and reputation systems in mobile participatory sensing applications: A survey
- Author
-
Mousa, Hayam, Mokhtar, Sonia Ben, Hasan, Omar, Younes, Osama, Hadhoud, Mohiy, and Brunie, Lionel
- Published
- 2015
- Full Text
- View/download PDF
7. A delay and cost balancing protocol for message routing in mobile delay tolerant networks
- Author
-
Miao, Jingwei, Hasan, Omar, Ben Mokhtar, Sonia, Brunie, Lionel, and Gianini, Gabriele
- Published
- 2015
- Full Text
- View/download PDF
8. SimAttack: private web search under fire
- Author
-
Petit, Albin, Cerqueus, Thomas, Boutet, Antoine, Mokhtar, Sonia Ben, Coquil, David, Brunie, Lionel, and Kosch, Harald
- Published
- 2016
- Full Text
- View/download PDF
9. A decentralized fault tolerance model based on level of performance for grid environment
- Author
-
Rebbah, Mohammed, Slimani, Yahya, Benyettou, Abdelkader, and Brunie, Lionel
- Published
- 2016
- Full Text
- View/download PDF
10. An investigation on the unwillingness of nodes to participate in mobile delay tolerant network routing
- Author
-
Miao, Jingwei, Hasan, Omar, Mokhtar, Sonia Ben, Brunie, Lionel, and Yim, Kangbin
- Published
- 2013
- Full Text
- View/download PDF
11. Preserving privacy of feedback providers in decentralized reputation systems
- Author
-
Hasan, Omar, Brunie, Lionel, and Bertino, Elisa
- Published
- 2012
- Full Text
- View/download PDF
12. (Dis)trust certification model for large access in a pervasive environment
- Author
-
Saadi, Rachid, Pierson, Jean‐Marc, and Brunie, Lionel
- Published
- 2005
- Full Text
- View/download PDF
13. Improving the accuracy of Business-to-Business (B2B) reputation systems through rater expertise prediction
- Author
-
Dikow, Heidi, Hasan, Omar, Kosch, Harald, Brunie, Lionel, and Sornin, Renaud
- Published
- 2015
- Full Text
- View/download PDF
14. Personalized video adaptation framework (PIAF): high-level semantic adaptation
- Author
-
El-Khoury, Vanessa, Coquil, David, Bennani, Nadia, and Brunie, Lionel
- Published
- 2014
- Full Text
- View/download PDF
15. Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey.
- Author
-
HASAN, OMAR, BRUNIE, LIONEL, and BERTINO, ELISA
- Subjects
- *
BLOCKCHAINS , *REPUTATION - Abstract
The purpose of a reputation system is to hold the users of a distributed application accountable for their behavior. The reputation of a user is computed as an aggregate of the feedback provided by fellow users in the system. Truthful feedback is clearly a prerequisite for computing a reputation score that accurately represents the behavior of a user. However, it has been observed that users can hesitate in providing truthful feedback because, for example, of fear of retaliation. Privacy-preserving reputation systems enable users to provide feedback in a private and thus uninhibited manner. In this survey, we propose analysis frameworks for privacy-preserving reputation systems. We use these analysis frameworks to reviewand compare the existing approaches. Emphasis is placed on blockchain-based systems as they are a recent significant development in the area. Blockchain-based privacy-preserving reputation systems have properties, such as trustlessness, transparency, and immutability, which prior systems do not have. Our analysis provides several insights and directions for future research. These include leveraging blockchain to its full potential in order to develop truly trustless systems, to achieve some important security properties, and to include defenses against common attacks that have so far not been addressed by most current systems. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
16. XACML for Mobility (XACML4M)—An Access Control Framework for Connected Vehicles.
- Author
-
Ashutosh, Ashish, Gerl, Armin, Wagner, Simon, Brunie, Lionel, and Kosch, Harald
- Subjects
ACCESS control ,RASPBERRY Pi ,SYSTEM integration ,RESEARCH questions ,VEHICLES ,PEDESTRIANS - Abstract
The automotive industry is experiencing a transformation with the rapid integration of software-based systems inside vehicles, which are complex systems with multiple sensors. The use of vehicle sensor data has enabled vehicles to communicate with other entities in the connected vehicle ecosystem, such as the cloud, road infrastructure, other vehicles, pedestrians, and smart grids, using either cellular or wireless networks. This vehicle data are distributed, private, and vulnerable, which can compromise the safety and security of vehicles and their passengers. It is therefore necessary to design an access control mechanism around the vehicle data's unique attributes and distributed nature. Since connected vehicles operate in a highly dynamic environment, it is important to consider context information such as location, time, and frequency when designing a fine-grained access control mechanism. This leads to our research question: How can Attribute-Based Access Control (ABAC) fulfill connected vehicle requirements of Signal Access Control (SAC), Time-Based Access Control (TBAC), Location-Based Access Control (LBAC), and Frequency-Based Access Control (FBAC)? To address the issue, we propose a data flow model based on Attribute-Based Access Control (ABAC) called eXtensible Access Control Markup Language for Mobility (XACML4M). XACML4M adds additional components to the standard eXtensible Access Control Markup Language (XACML) to satisfy the identified requirements of SAC, TBAC, LBAC, and FBAC in connected vehicles. Specifically, these are: Vehicle Data Environment (VDE) integrated with Policy Enforcement Point (PEP), Time Extensions, GeoLocation Provider, Polling Frequency Provider, and Access Log Service. We implement a prototype based on these four requirements on a Raspberry Pi 4 and present a proof-of-concept for a real-world use case. We then perform a functional evaluation based on the authorization policies to validate the XACML4M data flow model. Finally, we conclude that our proposed XACML4M data flow model can fulfill all four of our identified requirements for connected vehicles. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
17. Worker Selection Impact On Aggregation Techniques In Crowdsourcing: An Experimental Study
- Author
-
Awwad, Tarek, Bennani, Nadia, Rehn Sonigo, Veronika, Kosch, Harald, Brunie, Lionel, Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2), Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174) (FEMTO-ST), Université de Technologie de Belfort-Montbeliard (UTBM)-Ecole Nationale Supérieure de Mécanique et des Microtechniques (ENSMM)-Université de Franche-Comté (UFC), Université Bourgogne Franche-Comté [COMUE] (UBFC)-Université Bourgogne Franche-Comté [COMUE] (UBFC)-Centre National de la Recherche Scientifique (CNRS), Universität Passau [Passau], INSA LYON, and LIRIS UMR 5205
- Subjects
[INFO]Computer Science [cs] - Published
- 2021
18. Detecting Inference Attacks Involving Raw Sensor Data: A Case Study.
- Author
-
Lachat, Paul, Bennani, Nadia, Rehn-Sonigo, Veronika, Brunie, Lionel, and Kosch, Harald
- Subjects
INFERENCE (Logic) ,DETECTORS ,PERSONALLY identifiable information ,ENERGY consumption ,DETECTION limit - Abstract
With the advent of sensors, more and more services are developed in order to provide customers with insights about their health and their appliances' energy consumption at home. To do so, these services use new mining algorithms that create new inference channels. However, the collected sensor data can be diverted to infer personal data that customers do not consent to share. This indirect access to data that are not collected corresponds to inference attacks involving raw sensor data (IASD). Towards these new kinds of attacks, existing inference detection systems do not suit the representation requirements of these inference channels and of user knowledge. In this paper, we propose RICE-M (Raw sensor data based Inference ChannEl Model) that meets these inference channel representations. Based on RICE-M, we proposed RICE-Sy an extensible system able to detect IASDs, and evaluated its performance taking as a case study the MHEALTH dataset. As expected, detecting IASD is proven to be quadratic due to huge sensor data managed and a quickly growing amount of user knowledge. To overcome this drawback, we propose first a set of conceptual optimizations that reduces the detection complexity. Although becoming linear, as online detection time remains greater than a fixed acceptable query response limit, we propose two approaches to estimate the potential of RICE-Sy. The first one is based on partitioning strategies which aim at partitioning the knowledge of users. We observe that by considering the quantity of knowledge gained by a user as a partitioning criterion, the median detection time of RICE-Sy is reduced by 63%. The second approach is H-RICE-SY, a hybrid detection architecture built on RICE-Sy which limits the detection at query-time to users that have a high probability to be malicious. We show the limits of processing all malicious users at query-time, without impacting the query answer time. We observe that for a ratio of 30% users considered as malicious, the median online detection time stays under the acceptable time of 80 ms, for up to a total volume of 1.2 million user knowledge entities. Based on the observed growth rates, we have estimated that for 5% of user knowledge issued by malicious users, a maximum volume of approximately 8.6 million user's information can be processed online in an acceptable time. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
19. Detecting inference attacks involving sensor data in a multi‐database context: Issues & challenges.
- Author
-
Lachat, Paul, Bennani, Nadia, Rehn‐Sonigo, Veronika, Brunie, Lionel, and Kosch, Harald
- Abstract
Nowadays applications produce and manage data of individual among which some may be sensitive and must be protected. Moreover, with the advent of smart applications, sensor data are produced by IoT devices in a huge quantity and sent to servers in the vicinity to be stored and processed. Meanwhile, newly discovered inference channels involving sensor data gives insights on personal data and raises new threats on individuals privacy. They escape the vigilance of traditional inference detection systems devoted to protecting personal data stored locally in a database. In this paper, we motivate the need of a distributed inference detection system acting in a general multi‐database context and we highlight the issues that such a system would face. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
20. Landmark-assisted location and tracking in outdoor mobile network
- Author
-
Anisetti, Marco, Ardagna, Claudio A., Bellandi, Valerio, Damiani, Ernesto, Döller, Mario, Stegmaier, Florian, Rabl, Tilmann, Kosch, Harald, and Brunie, Lionel
- Published
- 2012
- Full Text
- View/download PDF
21. Privacy Preserving Reputation Systems based on Blockchain and other Cryptographic Building Blocks: A Survey
- Author
-
Hasan, Omar, Brunie, Lionel, Bertino, Elisa, Distribution, Recherche d'Information et Mobilité (DRIM), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Université Lumière - Lyon 2 (UL2), Université de Lyon-Institut National des Sciences Appliquées (INSA), Purdue University [West Lafayette], University of Lyon, INSA-Lyon, and CNRS - LIRIS - UMR5205
- Subjects
[INFO]Computer Science [cs] - Abstract
The purpose of a reputation system is to hold the users of a distributed application accountable for their behavior. The reputation of a user is computed as an aggregate of the feedback provided by fellow users in the system. Truthful feedback is clearly a prerequisite for computing a reputation score that accurately represents the behavior of a user. However, it has been observed that users can hesitate in providing truthful feedback, for example, due to the fear of retaliation. Privacy preserving reputation systems enable users to provide feedback in a private and thus uninhibited manner. In this survey, we propose analysis frameworks for privacy preserving reputation systems. We use these analysis frameworks to review and compare the existing systems in the literature. An emphasis is placed on blockchain-based systems as they are a recent significant development in the area. Utilizing blockchain as a building block, privacy preserving reputation systems have been able to provide properties such as trustlessness, transparency, and immutability, which were absent from prior systems. The results of the analysis reveal several insights and directions for future research. These include exploiting blockchain to its full potential to develop truly trustless systems and to implement some important security properties and defenses against common attacks that are so far ignored by a majority of the systems.
- Published
- 2020
22. Heuristics for Optimizing Multi-Clip Queries in Video Databases
- Author
-
Kosch, Harald, Mostefaoui, Ahmed, Böszörményi, László, and Brunie, Lionel
- Published
- 2004
- Full Text
- View/download PDF
23. Semantic Based Prefetching in News-on-Demand Video Servers
- Author
-
Mostefaoui, Ahmed, Kosch, Harald, and Brunie, Lionel
- Published
- 2002
- Full Text
- View/download PDF
24. PRIVA'MOV: Analysing Human Mobility Through Multi-Sensor Datasets
- Author
-
Ben Mokhtar, Sonia, Boutet, Antoine, Bouzouina, Louafi, Bonnel, Patrick, Brette, Olivier, Brunie, Lionel, Cunche, Mathieu, D 'Alu, Stephane, Primault, Vincent, Raveneau, Patrice, Rivano, Herve, Stanica, Razvan, Distribution, Recherche d'Information et Mobilité (DRIM), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Université Lumière - Lyon 2 (UL2), Laboratoire Aménagement Économie Transports (LAET), Université Lumière - Lyon 2 (UL2)-École Nationale des Travaux Publics de l'État (ENTPE)-Centre National de la Recherche Scientifique (CNRS), Triangle : action, discours, pensée politique et économique (TRIANGLE), École normale supérieure - Lyon (ENS Lyon)-Université Lumière - Lyon 2 (UL2)-Sciences Po Lyon - Institut d'études politiques de Lyon (IEP Lyon), Université de Lyon-Université de Lyon-Université Jean Monnet [Saint-Étienne] (UJM)-Centre National de la Recherche Scientifique (CNRS), CITI Centre of Innovation in Telecommunications and Integration of services (CITI), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria), Privacy Models, Architectures and Tools for the Information Society (PRIVATICS), Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-CITI Centre of Innovation in Telecommunications and Integration of services (CITI), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA), ALGorithmes et Optimisation pour Réseaux Autonomes (AGORA), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria), Laboratoire Informatique, Image et Interaction - EA 2118 (L3I), Université de La Rochelle (ULR), Université de Lyon-Institut National des Sciences Appliquées (INSA), Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Centre National de la Recherche Scientifique (CNRS)-Sciences Po Lyon - Institut d'études politiques de Lyon (IEP Lyon), Université de Lyon-Université de Lyon-Université Jean Monnet [Saint-Étienne] (UJM)-Université Lumière - Lyon 2 (UL2)-École normale supérieure - Lyon (ENS Lyon), Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria), Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Inria Grenoble - Rhône-Alpes, Institut National des Sciences Appliquées (INSA)-Université de Lyon, Université Lumière - Lyon 2 (UL2)-École Centrale de Lyon (ECL), Université de Lyon-Université de Lyon-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Lumière - Lyon 2 (UL2)-École Centrale de Lyon (ECL), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS), École normale supérieure de Lyon (ENS de Lyon)-Université Lumière - Lyon 2 (UL2)-Sciences Po Lyon - Institut d'études politiques de Lyon (IEP Lyon), Université de Lyon-Université de Lyon-Université Jean Monnet - Saint-Étienne (UJM)-Centre National de la Recherche Scientifique (CNRS), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Inria Lyon, La Rochelle Université (ULR), and Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon
- Subjects
[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] - Abstract
International audience; The wide adoption of mobile devices has created unprecedented opportunities to collect mobility traces and make them available for the research community to conduct interdisciplinary research. However, mobility traces available in the public domain are usually restricted to traces resulting from a single sensor (e.g., either GPS, GSM or WiFi). In this paper, we present the PRIVA'MOV dataset, a novel dataset collected in the city of Lyon, France on which user mobility has been collected using multiple sensors. More precisely, this dataset contains mobility traces of about 100 persons including university students, staff and their family members over 15 months collected through the GPS, WiFi, GSM, and accelerometer sensors. We provide in this paper both a quantitative and a preliminary qualitative analysis of this dataset. Specifically, we report the number of visited points of interests, GSM antennas and WiFi hotspots and their distribution across the various users. We finally analyse the uniqueness of human mobility by considering the various sensors.
- Published
- 2017
25. Technology transfer within the ProHPC TTN at ENS Lyon
- Author
-
Barberet, Christophe, Brunie, Lionel, Desprez, Frédéric, Lebourgeois, Gilles, Namyst, Raymond, Robert, Yves, Ubéda, Stéphane, and Heumen, Karine Van
- Published
- 1999
- Full Text
- View/download PDF
26. Task Characterization For An Effective Worker Targeting in Crowd Sourcing
- Author
-
Awwad, Tarek, Bennani, Nadia, Brunie, Lionel, COQUIL, David, Kosch, Harald, Sonigo, Veronika, Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA), University of Passau (University of Passau), Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174) (FEMTO-ST), Université de Technologie de Belfort-Montbeliard (UTBM)-Ecole Nationale Supérieure de Mécanique et des Microtechniques (ENSMM)-Université de Franche-Comté (UFC), and Université Bourgogne Franche-Comté [COMUE] (UBFC)-Université Bourgogne Franche-Comté [COMUE] (UBFC)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA] ,[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET] ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,[INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC] ,[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation - Abstract
International audience; In the last decade, crowdsourcing (CS) has emergedas a very promising approach for obtaining services, feedbackor data from a large number of people connected through theInternet, in a short time and at a reasonable cost. CS has beenused in a large range of contexts, thus proving its versatility. However, the quality of the services or data provided by theworkers (the "crowd") is not guaranteed, and therefore mustbe verified. This verification usually results in additional timeand cost. We propose a novel approach of quality control incrowdsourcing that reduces, and in some cases eliminates, thisoverhead. Our approach uses a learning technique to characterizeand cluster tasks, and selects, within the available crowd, the mostreliable group of workers for a given type of tasks.
- Published
- 2016
27. PEAS: Private, Efficient and Accurate Web Search
- Author
-
Petit, Albin, Cerqueus, Thomas, Ben Mokhtar, Sonia, Brunie, Lionel, Kosch, Harald, Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Université Lumière - Lyon 2 (UL2)-École Centrale de Lyon (ECL), Université de Lyon-Université de Lyon-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS), Faculty of Informatics and Mathematics (FMI), Fakultät für Informatik und Mathematik, Distribution, Recherche d'Information et Mobilité (DRIM), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Lumière - Lyon 2 (UL2)-École Centrale de Lyon (ECL), European Project: 600601,EEXCESS, Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Petit, Albin, and Enhancing Europe’s eXchange in Cultural Educational and Scientific reSources - EEXCESS - 600601 - INCOMING
- Subjects
[INFO.INFO-WB] Computer Science [cs]/Web ,[INFO.INFO-SI] Computer Science [cs]/Social and Information Networks [cs.SI] ,[INFO.INFO-WB]Computer Science [cs]/Web ,Unlinkability ,02 engineering and technology ,[INFO.INFO-SI]Computer Science [cs]/Social and Information Networks [cs.SI] ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,Indistinguishability ,Privacy ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Web search ,020201 artificial intelligence & image processing ,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] - Abstract
International audience; Accounting for the large number of queries sent by users to search engines on a daily basis, the latter are likely to learn and possibly leak sensitive information about individual users. To deal with this issue, several solutions have been proposed to query search engines in a privacy preserving way. A first category of solutions aim to hide users’ identities, thus enforcing unlinkability between a query and the identity of its originating user. A second category of approaches aims to obfuscate the content of users’ queries, or at generating fake queries in order to blur user profiles, thus enforcing indistinguishability between them. In this paper we propose PEAS, a new protocol for private Web search. PEAS combines a new efficient unlinkability protocol with a new accurate indistinguishability protocol. Experiments conducted using a real dataset of search logs show that compared to state-of-the-art approaches, PEAS decreases by up to 81.9% the number of queries linked to their original requesters. Furthermore, PEAS is accurate as it allows users to retrieve up to 95.3% of the results they would obtain using search engines in an unprotected way.
- Published
- 2015
28. The Long Road to Computational Location Privacy: A Survey.
- Author
-
Primault, Vincent, Boutet, Antoine, Mokhtar, Sonia Ben, and Brunie, Lionel
- Published
- 2019
- Full Text
- View/download PDF
29. Differentially Private Location Privacy in Practice
- Author
-
Primault, Vincent, Mokhtar, Sonia Ben, Lauradoux, Cedric, Brunie, Lionel, Distribution, Recherche d'Information et Mobilité (DRIM), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Université Lumière - Lyon 2 (UL2)-École Centrale de Lyon (ECL), Université de Lyon-Université de Lyon-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Lumière - Lyon 2 (UL2)-École Centrale de Lyon (ECL), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA), Privacy Models, Architectures and Tools for the Information Society (PRIVATICS), Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-CITI Centre of Innovation in Telecommunications and Integration of services (CITI), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Inria Lyon, Institut National de Recherche en Informatique et en Automatique (Inria), Privamov project, Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Université Lumière - Lyon 2 (UL2), Institut National des Sciences Appliquées (INSA)-Université de Lyon, CITI Centre of Innovation in Telecommunications and Integration of services (CITI), Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), and Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Inria Grenoble - Rhône-Alpes
- Subjects
FOS: Computer and information sciences ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,Computer Science - Cryptography and Security ,Cryptography and Security (cs.CR) - Abstract
With the wide adoption of handheld devices (e.g. smartphones, tablets) a large number of location-based services (also called LBSs) have flourished providing mobile users with real-time and contextual information on the move. Accounting for the amount of location information they are given by users, these services are able to track users wherever they go and to learn sensitive information about them (e.g. their points of interest including home, work, religious or political places regularly visited). A number of solutions have been proposed in the past few years to protect users location information while still allowing them to enjoy geo-located services. Among the most robust solutions are those that apply the popular notion of differential privacy to location privacy (e.g. Geo-Indistinguishability), promising strong theoretical privacy guarantees with a bounded accuracy loss. While these theoretical guarantees are attracting, it might be difficult for end users or practitioners to assess their effectiveness in the wild. In this paper, we carry on a practical study using real mobility traces coming from two different datasets, to assess the ability of Geo-Indistinguishability to protect users' points of interest (POIs). We show that a curious LBS collecting obfuscated location information sent by mobile users is still able to infer most of the users POIs with a reasonable both geographic and semantic precision. This precision depends on the degree of obfuscation applied by Geo-Indistinguishability. Nevertheless, the latter also has an impact on the overhead incurred on mobile devices resulting in a privacy versus overhead trade-off. Finally, we show in our study that POIs constitute a quasi-identifier for mobile users and that obfuscating them using Geo-Indistinguishability is not sufficient as an attacker is able to re-identify at least 63% of them despite a high degree of obfuscation., Comment: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (http://arxiv.org/abs/1410.6674)
- Published
- 2014
30. D6.2 -- First Security Proxy Prototype and Reputation Protocols
- Author
-
Mokhtar, Sonia Ben, Bennani, Nadia, Brunie, Lionel, Cerqueus, Thomas, Egyed-Zsigmond, Elöd, Hasan, Omar, Petit, Albin, Portier, Pierre-Edouard, Granitzer, Michael, Seifert, Christin, and Schlötterer, Jörg
- Published
- 2014
31. Personalization vs. Privacy in Big Data Analysis
- Author
-
Habegger, Benjamin, Hasan, Omar, Brunie, Lionel, Bennani, Nadia, Kosch, Harald, Damiani, Ernesto, Distribution, Recherche d'Information et Mobilité (DRIM), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Université Lumière - Lyon 2 (UL2), University of Passau, University of Milan, Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Faculty of Informatics and Mathematics (FMI), Fakultät für Informatik und Mathematik, and Università degli Studi di Milano-Bicocca [Milano] (UNIMIB)
- Subjects
user profiling ,big data ,EEXCESS ,[INFO]Computer Science [cs] ,recommender systems ,privacy ,ComputingMilieux_MISCELLANEOUS ,personalization - Abstract
International audience; Personalization is the process of adapting the output of a system to a user's context and profile. User information such as geographical location, academic and professional background, membership in groups, interests, preferences, opinions, etc. may be used in the process. Big data analysis techniques enable collecting accurate and rich information for user profiles in particular due to their ability to process unstructured as well as structured information in high volumes from multiple sources. Accurate and rich user profiles are important for personalization. For example, such data are required for recommender systems, which try to predict elements that a user has not yet considered. However, the information used for personalization can often be considered private, which raises privacy issues. In this paper, we discuss personalization with big data analysis techniques and the associated privacy challenges. We illustrate these aspects through the ongoing EEXCESS project. We provide a concrete example of a personalization service, proposed as part of the project, that relies on big data analysis techniques.
- Published
- 2014
32. D6.3 -- Second Security Proxy Prototype and Reputation Protocols
- Author
-
Mokhtar, Sonia Ben, Bennani, Nadia, Brunie, Lionel, Calabretto, Sylvie, Cerqueus, Thomas, Egyed-Zsigmond, Elöd, Hasan, Omar, Petit, Albin, Portier, Pierre-Edouard, Granitzer, Michael, Seifert, Christin, and Schlötterer, Jörg
- Published
- 2014
33. Centrality-based peer rewiring in semantic overlay networks (S)
- Author
-
Yang, Yulian, CALABRETTO, Sylvie, Brunie, Lionel, Distribution, Recherche d'Information et Mobilité (DRIM), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), and Université de Lyon-Université Lumière - Lyon 2 (UL2)
- Subjects
[INFO]Computer Science [cs] - Abstract
International audience; Peer rewiring aims to update peer’s contacts toother peers in networks. It is one of the classic approaches tosemantic overlay networks(SON), the network organization wherepeers with semantically similar content are clustered together.To perform peer rewiring, each peer periodically collects theinformation of other peers in the network and uses them toupdate its existing contacts. While the information are collectedeither by random or by similarity-based gradient strategy in theliterature, we propose to a centrality-based approach to improvethe efficiency of peer rewiring. The centrality is defined as peer’scapability to access other peers in its neighborhood in SON. Byintegrating centrality in the similarity-based gradient strategy,more similar peers are expected to be collected in a shorter time.We test our proposal by adding new peers in a unstructured P2Pnetwork with more than 20000 peers, where similar peers arealready clustered up. The rewiring performance of the new peersdemonstrates that our approach can greatly improve rewiringefficiency, comparing to similarity-based gradient strategy(thestate-of-the-art approach).
- Published
- 2013
- Full Text
- View/download PDF
34. D6.1 -- Policy Model for Privacy Preservation and Feasibility Report
- Author
-
Mokhtar, Sonia Ben, Bennani, Nadia, Brunie, Lionel, Cerqueus, Thomas, Egyed-Zsigmond, Elöd, Hasan, Omar, Petit, Albin, Portier, Pierre-Edouard, Granitzer, Michael, Seifert, Christin, and Schlötterer, Jörg
- Published
- 2013
35. Semi-structured Semantic Overlay for Information Retrieval in Self-organizing Networks
- Author
-
Yang, Yulian, CALABRETTO, Sylvie, Brunie, Lionel, Distribution, Recherche d'Information et Mobilité (DRIM), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), and Université de Lyon-Université Lumière - Lyon 2 (UL2)
- Subjects
Flexibility (engineering) ,Information retrieval ,Computer science ,Node (networking) ,Search engine indexing ,Overlay network ,020206 networking & telecommunications ,020207 software engineering ,Self-organizing network ,02 engineering and technology ,Management information systems ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,[INFO]Computer Science [cs] ,Routing (electronic design automation) - Abstract
International audience; As scalability and flexibility have become the critical concernsin information management systems, self-organizingnetworks attract attentions from both research and industrialcommunities. This work proposes a semi-structuredsemantic overlay for information retrieval in large-scale selforganizingnetworks. With the autonomy to their own resources,the nodes are organized into a semantic overlayhosting topically discriminative communities. For informationretrieval within a community, unstructured routing approachis employed for the sake of flexibility; While for joiningnew nodes and routing queries to a distant community, astructured mechanism is designed to save the traffic and timecost. Different from the semantic overlay in the literature,our proposal has three contributions: 1. we design topicbasedindexing to form and maintain the semantic overlay,to guarantee both scalability and efficiency; 2. We introduceunstructured routing approach within the community,to allow flexible node joining and leaving; 3. We take advantageof the interaction among nodes to capture the overlaychanges and make corresponding adaption in topic-based indexing.
- Published
- 2012
- Full Text
- View/download PDF
36. Security and Privacy Issues in Multi-Scale Digital Ecosystems
- Author
-
Brunie, Lionel, SI LIRIS, Équipe gestionnaire des publications, Distribution, Recherche d'Information et Mobilité (DRIM), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), and Université de Lyon-Université Lumière - Lyon 2 (UL2)
- Subjects
[INFO]Computer Science [cs] ,[INFO] Computer Science [cs] - Abstract
International audience; Recent advances in computer, communication and sensor/actuator technologies hint at an emerging paradigm of computing, popularly referred to as “digital ecosystems”. A Digital Ecosystem is a distributed, open socio-technical system composed of actors and services, with properties of self-organization, scalability and sustainability, inspired by natural ecosystems.A dramatic change of nature has recently affected digital ecosystems which should now be envisioned as multiscale highly heterogeneous systems at the convergence of the Internet of Things (IoT), mobile/ubiquitous computing and cloud/service-oriented computing. That is, future digital ecosystems will have to consider interaction processes that mobilize entities (typically, services) of totally different nature, origin and operational characteristics, from an embedded “thing” to a public cloud.In this talk, we will specifically focus on user-centric, ubiquitous and multi-scale digital ecosystems where users and services alike have (ubiquitous) access to a huge mass of information, produced by the local environment (sensor networks, ad-hoc networks, local servers) or remotely (Web services, distant servers, VPN-accessible private clouds, public clouds). Such digital ecosystems raise complex issues e.g., data indexing and access, data delivery, entities cooperation, scalability. However, the most sensitive issue may certainly be the enforcement of security properties and the preservation of privacy. In that perspective, the objective of this keynote is to draw an overview of security and privacy challenges in multi-scale digital ecosystems; to identify candidate methodologies to address these issues; and finally, to point out the main lines of a research agenda.
- Published
- 2012
37. Semantic Information Retrieval over P2P Network
- Author
-
Yang, Yulian, Calabretto, Sylvie, Brunie, Lionel, Distribution, Recherche d'Information et Mobilité (DRIM), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Université Lumière - Lyon 2 (UL2), and SI LIRIS, Équipe gestionnaire des publications
- Subjects
[INFO]Computer Science [cs] ,[INFO] Computer Science [cs] - Abstract
National audience; Information retrieval(IR) over peer-to-peer(P2P) network has attracted a lot of research interests because of its decentralization, self-organization and scalability. As semantic IR faces challenges in centralized information systems, semantic IR over P2P network is far challenging: 1.It's costly or impossiblel to have a global knowledge in P2P network, which is often important to semantic IR, such as LSI. 2. It's hard to locate the documents semantically relavant to a query efficiently. We present our motivation and research focus in this poster.
- Published
- 2010
38. A decentralized and autonomous replication model for mobile environments
- Author
-
Torbey, Zeina, Bennani, Nadia, Brunie, Lionel, COQUIL, David, Distribution, Recherche d'Information et Mobilité (DRIM), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Université Lumière - Lyon 2 (UL2), F. Laforest, and SI LIRIS, Équipe gestionnaire des publications
- Subjects
[INFO]Computer Science [cs] ,[INFO] Computer Science [cs] - Abstract
National audience; Data replication can improve data availability in mobile networks; but due to typical resource limitations in such environments, specific replication mechanisms are needed. In this paper, we propose CReaM, user-Centric REplicAtion Model for mobile environment. This model puts users at the centre by letting them determine the amount of resources they are willing to share. CReaM is suitable for dynamic environments where each node needs a certain level of decision autonomy. In this paper, we present CReaM's general principles and focus on one of its core function, which is its autonomic behavior that generates replication requests based on resources monitoring and user settings.
- Published
- 2010
39. Distributed Databases
- Author
-
Coquil, David, Brunie, Lionel, Kosch, Harald, University of Passau, Distribution, Recherche d'Information et Mobilité (DRIM), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Université Lumière - Lyon 2 (UL2), and SI LIRIS, Équipe gestionnaire des publications
- Subjects
[INFO]Computer Science [cs] ,[INFO] Computer Science [cs] ,ComputingMilieux_MISCELLANEOUS - Abstract
International audience
- Published
- 2010
40. Guest editorial special issue: multimodal multimedia retrieval
- Author
-
Döller, Mario, Chang, Wo, Delgado Mercè, Jaime, Brunie, Lionel, Universitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors, and Universitat Politècnica de Catalunya. DMAG - Grup d'Aplicacions Multimèdia Distribuïdes
- Subjects
Multimedia ,Multimèdia ,So, imatge i multimèdia [Àrees temàtiques de la UPC] ,Interfaces ,Informàtica::Arquitectura de computadors [Àrees temàtiques de la UPC] - Published
- 2009
- Full Text
- View/download PDF
41. Query Log Analysis for User-Centric Multimedia Databases
- Author
-
Limam, Lyes, Brunie, Lionel, Coquil, David, Kosch, Harald, Distribution, Recherche d'Information et Mobilité (DRIM), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Université Lumière - Lyon 2 (UL2), Distributed and Multimedia Information Systems (DIMIS), University of Passau, and SI LIRIS, Équipe gestionnaire des publications
- Subjects
[INFO]Computer Science [cs] ,[INFO] Computer Science [cs] - Abstract
International audience; Recently, the information community has seen the emergence of user-centric mediaapplications, which are characterized by the central position given to the user. To fulfill theuser-centric promise, it is necessary to understand and model the actions of the users of thesystem. This position paper presents a methodology for modeling the behavior of multimediadatabase users. To this end, we propose to analyze the query logs to derive the classes ofbehaviors of a user. The presented method bases on the characteristics of user queries and ontaxonomies. The behaviors are established using a query classification algorithm.
- Published
- 2008
42. DG-CastoR : Direction-based Geocast Routing protocol for VANET
- Author
-
Atechian, Talar, Brunie, Lionel, Distribution, Recherche d'Information et Mobilité (DRIM), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Université Lumière - Lyon 2 (UL2), and SI LIRIS, Équipe gestionnaire des publications
- Subjects
ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,[INFO]Computer Science [cs] ,[INFO] Computer Science [cs] - Abstract
International audience; Vehicular Ad hoc NETworks are currently attracting the attention of researchers and automobile manufacturers. There are some interesting applications for VANETs such as intelligent transportation systems for safety and comfort driving and Infotainment applications for data exchange between mobile vehicles. Disseminating and routing messages in such environments present big challenges due to the very high mobility and the frequent changes of network topology. In this paper, a novel geocast routing protocol is proposed, named DG-CastoR protocol and especially tailored for infotainment applications in VANETs. It is based on the future locations prediction of the neighbors to deliver the query packet in geocast manner to corresponding nodes. Simulation results show that, compared to multicast protocols, DG-CastoR is a robust protocol for handling a large number of nodes in VANETs. It also reduces the traffic load and the energy consumption of the devices by avoiding the unnecessary packet flooding over the network.
- Published
- 2008
43. Semantic and Cooperative Document Delivery Over Distributed Systems
- Author
-
Coquil, David, Kosch, Harald, Brunie, Lionel, Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2), Distribution, Recherche d'Information et Mobilité (DRIM), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), and SI LIRIS, Équipe gestionnaire des publications
- Subjects
[INFO]Computer Science [cs] ,[INFO] Computer Science [cs] - Abstract
In this article, we have presented an architecture for the efficient delivery of documents in a distributed systemthat integrates semantic caching and cooperation mechanisms in a consistent way. Our semantic cachingproposals are based on the monitoring of previous user requests, on a limited knowledge of the semanticproperties of the documents in the form of keywords, and on a knowledge of the semantic links betweensome of the keywords. We compute a synthesis of these properties, the temperature, that aims at being ametric of the interest of a given document for a cache. Our cooperative architecture implements documentsharing between caches at a local and global level, allowing caches to fetch documents from other nearbycaches rather than from the distant source. It also implements the sharing of information by monitoringtemperature variations. We have performed an experimental evaluation of our system using simulation, andhave found out the three potential factors of improvement of the integrated system (local proxy cooperation,intermediate proxy cooperation, semantic caching) do indeed all have a positive impact on the efficiency ofrequests processing., Architecture pour l'envoi efficace de données dans un système distribué fondé sur le déploiement de mécanismes de caches collaboratifs.
- Published
- 2008
44. Service Composition-Based Content Adaptation for Pervasive Computing Environment
- Author
-
Fawaz, Yaser, Negash, Addisalem, Brunie, Lionel, Scuturici, Vasile-Marian, Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2), and SI LIRIS, Équipe gestionnaire des publications
- Subjects
[INFO]Computer Science [cs] ,[INFO] Computer Science [cs] - Abstract
International audience; Service Composition-Based Content Adaptation for Pervasive Computing Environment
- Published
- 2007
45. SAMi: a self-adaptive information sharing middleware for a dynamic pervasive computing environment
- Author
-
Negash, Addisalem, Scuturici, Vasile-Marian, Brunie, Lionel, Distribution, Recherche d'Information et Mobilité (DRIM), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Université Lumière - Lyon 2 (UL2), and SI LIRIS, Équipe gestionnaire des publications
- Subjects
[INFO]Computer Science [cs] ,[INFO] Computer Science [cs] - Abstract
International audience; This paper presents SAMi, a self-adaptive Information sharing Middleware for a dynamic pervasive computing environment such as a Mobile Ad-hoc NETworks (MANET). SAMi can be used by co-located devices to share information regardless of their mobility pattern and density. A preliminary prototype has been developed to simulate MANETs and to implement the middleware. According to the experiment that has been performed to evaluate major features of the middleware, we found SAMi a promising middleware to share information in MANETs.
- Published
- 2007
46. Authentication and Access Control Using Trust Collaboration in Pervasive Grid Environment
- Author
-
Saadi, Rachid, Pierson, Jean-Marc, Brunie, Lionel, Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2), Cérin, Christophe, Li, and Kuan-Ching
- Subjects
[INFO]Computer Science [cs] - Abstract
International audience; Pervasive Grids emerge as a new paradigm for providing nomadic users with ubiquitous access to digital information and computing resources. However, pervasive grids arise a number of crucial issues related to privacy and security, especially authentication and access control, which constitute the security front-end.In this paper, we propose a trust based model of authentication and access control that allows nomadic users to roam from site to site and to gain access to surrounding/remote resources wrt her status in her home site and to the local policy of the site where she is standing. This model is supported by a software architecture called Chameleon. The Chameleon permits users to access grid resources and to implement adhoc interactions with the local grid site.
- Published
- 2007
- Full Text
- View/download PDF
47. A context aware Information sharing Middleware, for a dynamic pervasive computing environment
- Author
-
Negash, Addisalem, Scuturici, Vasile-Marian, Brunie, Lionel, SI LIRIS, Équipe gestionnaire des publications, Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), and Université de Lyon-Université Lumière - Lyon 2 (UL2)
- Subjects
[INFO]Computer Science [cs] ,[INFO] Computer Science [cs] - Abstract
International audience; This paper presents SAMi, a context aware Information sharing Middleware, for a dynamic pervasive computing environment such as a Mobile Ad-hoc NETworks (MANET). SAMi can be used by colocated devices to share information according to the context of users and their environment. It applies latent semantic modeling techniques and adopts techniques from service discovery to search files efficiently. A preliminary prototype has been developed to simulate MANETs and to implement the middleware. A number of experiments have been performed to evaluate major features of SAMi. Based on these experiments, we found SAMi a promising middleware to facilitate information exchange among co-located devices
- Published
- 2007
48. Expressing and Interpreting User Intention in Pervasive Service Environments
- Author
-
Bihler, Pascal, Brunie, Lionel, Scuturici, Vasile-Marian, Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2), and SI LIRIS, Équipe gestionnaire des publications
- Subjects
[INFO]Computer Science [cs] ,[INFO] Computer Science [cs] - Abstract
International audience; The introduction of pervasive computing environments enforce new ways of human-machine-interaction. The welldefined interaction interfaces will make place for other, more intuitive ways of interaction. In a pervasive service environment, the system middleware should take care of capturing the users expression of an action intention, solving ambiguousness in this expression, and executing the final pervasive action This article introduces the Pervasive Service Action Query Language (PsaQL), a language to formalize the description of a user intention using composed pervasive services. It presents the next steps of intention treatment in a pervasive service environment: A mathematical model is given, which helps to express the algorithms performing translation of the user intention into an executable action. To implement such algorithms, a suitable object- oriented model representing actions is introduced. In the scope of PERSE, a pervasive service environment developed by our research group, general evaluation metrics for such algorithms are identified, a prototype has been developed and first benchmark results are presented in this article.
- Published
- 2005
49. EMIMS: A Medical Image Management System with a Visual Multi-Criteria Query Interface
- Author
-
Chbeir, Richard, Coquil, David, Atnafu, Solomon, Brunie, Lionel, Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), and Université de Lyon-Université Lumière - Lyon 2 (UL2)
- Subjects
[INFO]Computer Science [cs] - Abstract
International audience; There are two major challenges in image data management: the integration of low and high-level features of images for retrieval purpose, and the adoption of these features with the classical DBMS to satisfy different types of applications. In our previous work, we addressed these challenges for a medical application by proposing a new image data repository model and introducing a novel system of similarity-based operators [11, 13]. In this paper, we present a prototype called Extended Medical Image Management System (EMIMS) implementing our previous proposals. EMIMS is designed to merge several facets of medical image management requirements with a generic repository model to offer new content-based 1 operators that allow users to express multi-criteria queries. We first present the architecture of EMIMS and then demonstrate its different components. We also show how a user is able to express a combination of relational and content-based queries using its visual interfaces.
- Published
- 2003
- Full Text
- View/download PDF
50. Enhancement of Web Proxies Using Semantic Information and Cooperation
- Author
-
Coquil, David, Brunie, Lionel, Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2), and SI LIRIS, Équipe gestionnaire des publications
- Subjects
[INFO]Computer Science [cs] ,[INFO] Computer Science [cs] - Abstract
International audience; Enhancement of Web Proxies Using Semantic Information and Cooperation
- Published
- 2003
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.