22 results on '"Simon Bouget"'
Search Results
2. Key Update for the IoT Security Standard OSCORE.
- Author
-
Rikard Höglund, Marco Tiloca, Simon Bouget, and Shahid Raza
- Published
- 2023
- Full Text
- View/download PDF
3. Establishing End-to-End Secure Channel for IoT Devices through an Untrusted C-ITS Network.
- Author
-
Simon Bouget, Shahid Raza, and Martin Furuhed
- Published
- 2021
- Full Text
- View/download PDF
4. Distance-Bounding, Privacy-Preserving Attribute-Based Credentials.
- Author
-
Daniel Bosk, Simon Bouget, and Sonja Buchegger
- Published
- 2020
- Full Text
- View/download PDF
5. Pleiades: Distributed Structural Invariants at Scale.
- Author
-
Simon Bouget, Yérom-David Bromberg, Adrien Luxey, and François Taïani
- Published
- 2018
- Full Text
- View/download PDF
6. Mind the Gap: Autonomous Detection of Partitioned MANET Systems using Opportunistic Aggregation.
- Author
-
Simon Bouget, Yérom-David Bromberg, Hugues Mercier, Etienne Rivière, and François Taïani
- Published
- 2018
- Full Text
- View/download PDF
7. Security and trust preserving inter- and intra-cloud VM migrations.
- Author
-
Mudassar Aslam, Simon Bouget, and Shahid Raza
- Published
- 2021
- Full Text
- View/download PDF
8. Scalable Anti-KNN: Decentralized Computation of k-Furthest-Neighbor Graphs with HyFN.
- Author
-
Simon Bouget, Yérom-David Bromberg, François Taïani, and Anthony Ventresque
- Published
- 2017
- Full Text
- View/download PDF
9. Position paper: Toward an holistic approach of Systems of Systems.
- Author
-
Simon Bouget
- Published
- 2016
- Full Text
- View/download PDF
10. Strength in Numbers: Robust Tamper Detection in Crowd Computations.
- Author
-
Bimal Viswanath, Muhammad Ahmad Bashir, Muhammad Bilal Zafar, Simon Bouget, Saikat Guha 0002, Krishna P. Gummadi, Aniket Kate, and Alan Mislove
- Published
- 2015
- Full Text
- View/download PDF
11. Polystyrene: the Decentralized Data Shape That Never Dies.
- Author
-
Simon Bouget, Hoel Kervadec, Anne-Marie Kermarrec, and François Taïani
- Published
- 2014
- Full Text
- View/download PDF
12. Mind the Gap: Détection autonome de systèmes MANET partitionnés à l'aide d’agrégations opportunistes
- Author
-
Simon Bouget, Yerom-David Bromberg, Hugues Mercier, Riviere, Etienne, Francois Taiani, 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), the World Is Distributed Exploring the tension between scale and coordination (WIDE), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT), Université de Neuchâtel (UNINE), Université Catholique de Louvain = Catholic University of Louvain (UCL), ANR-16-CE23-0016,PAMELA,Apprentissage automatique décentralisé et personnalisé sous contraintes(2016), Université de Bretagne Sud (UBS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-CentraleSupélec-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Bretagne Sud (UBS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), and UCL - SST/ICTM/INGI - Pôle en ingénierie informatique
- Subjects
Computer science ,business.industry ,Network packet ,Distributed computing ,[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS] ,020206 networking & telecommunications ,02 engineering and technology ,Mobile ad hoc network ,Partition (database) ,[INFO.INFO-MC]Computer Science [cs]/Mobile Computing ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,False positive paradox ,Wireless ,[INFO]Computer Science [cs] ,[INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC] ,business ,Wireless sensor network ,Limited resources ,Loss rate - Abstract
International audience; Mobile Ad-hoc Networks (MANETs) use limited-range wireless communications and are thus exposed to partitions when nodes fail or move out of reach of each other. Detecting partitions in MANETs is unfortunately a nontrivial task due to their inherently decentralized design and limited resources such as power or bandwidth. In this paper, we propose a novel and fully decentralized approach to detect partitions (and other large membership changes) in MANETs that is both accurate and resource efficient. We monitor the current composition of a MANET using the lightweight aggregation of compact membership-encoding filters. Changes in these filters allow us to infer the likelihood of a partition with a quantifiable level of confidence. We first present an analysis of our approach, and show that it can detect close to 100% of partitions under realistic settings, while at the same time being robust to false positives due to churn or dropped packets. We perform a series of simulations that compare against alternative approaches and confirm our theoretical results, including above 90% accurate detection even under a 40% message loss rate.
- Published
- 2018
- Full Text
- View/download PDF
13. Pleiades: Distributed Structural Invariants at Scale
- Author
-
François Taïani, Simon Bouget, Adrien Luxey, Yérom-David Bromberg, the World Is Distributed Exploring the tension between scale and coordination (WIDE), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-IMT Atlantique (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT), ANR-13-INFR-0003,SocioPlug,Cloud social sur des réseaux de plugs, pour un accès à l'information symétrique et respectueux de la vie privée(2013), Université de Bretagne Sud (UBS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-CentraleSupélec-IMT Atlantique Bretagne-Pays de la Loire (IMT Atlantique), Institut Mines-Télécom [Paris] (IMT)-Institut Mines-Télécom [Paris] (IMT)-Université de Bretagne Sud (UBS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), and Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1)
- Subjects
Structure (mathematical logic) ,Computer science ,Node (networking) ,Distributed computing ,020206 networking & telecommunications ,020207 software engineering ,02 engineering and technology ,Construct (python library) ,Overlay ,Design strategy ,Maintenance engineering ,Asynchronous communication ,0202 electrical engineering, electronic engineering, information engineering ,[INFO]Computer Science [cs] ,[INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC] ,Resilience (network) - Abstract
International audience; Modern large scale distributed systems increasingly espouse sophisticated distributed architectures characterized by complex distributed structural invariants. Unfortunately, maintaining these structural invariants at scale is time consuming and error prone, as developers must take into account asynchronous failures, loosely coordinated subsystems and network delays.To address this problem, we propose PLEIADES, a new framework to construct and enforce large-scale distributed structural invariants under aggressive conditions. PLEIADES combines the resilience of self-organizing overlays, with the expressiveness of an assembly-based design strategy. The result is a highly survivable framework that is able to dynamically maintain arbitrary complex distributed structures under aggressive crash failures. Our evaluation shows in particular that PLEIADES is able to restore the overall structure of a 25,600 node system in less than 11 asynchronous rounds after half of the nodes have crashed.
- Published
- 2018
- Full Text
- View/download PDF
14. Mind the Gap: Autonomous Detection of Partitioned MANET Systems using Opportunistic Aggregation
- Author
-
UCL - SST/ICTM/INGI - Pôle en ingénierie informatique, Simon Bouget, Yerom-David Bromberg, Hugues Mercier, Riviere, Etienne, Francois Taiani, 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS), UCL - SST/ICTM/INGI - Pôle en ingénierie informatique, Simon Bouget, Yerom-David Bromberg, Hugues Mercier, Riviere, Etienne, Francois Taiani, and 2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)
- Abstract
Mobile Ad-hoc Networks (MANETs) use limited- range wireless communications and are thus exposed to partitions when nodes fail or move out of reach of each other. Detecting partitions in MANETs is unfortunately a nontrivial task due to their inherently decentralized design and limited resources such as power or bandwidth. In this paper, we propose a novel and fully decentralized approach to detect partitions (and other large membership changes) in MANETs that is both accurate and resource efficient. We monitor the current composition of a MANET using the lightweight aggregation of compact membership-encoding filters. Changes in these filters allow us to infer the likelihood of a partition with a quantifiable level of confidence. We first present an analysis of our approach, and show that it can detect close to 100% of partitions under realistic settings, while at the same time being robust to false positives due to churn or dropped packets. We perform a series of simulations that compare against alternative approaches and confirm our theoretical results, including above 90% accurate detection even under a 40% message loss rate.
- Published
- 2018
15. Polystyrene: the Decentralized Data Shape That Never Dies
- Author
-
Hoel Kervadec, Simon Bouget, Anne-Marie Kermarrec, François Taïani, École normale supérieure - Cachan, antenne de Bretagne (ENS Cachan Bretagne), École normale supérieure - Cachan (ENS Cachan), As Scalable As Possible: foundations of large scale dynamic distributed systems (ASAP), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS), Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA), ANR-10-LABX-0007,COMIN Labs,Digital Communication and Information Sciences for the Future Internet(2010), SYSTÈMES LARGE ÉCHELLE (IRISA-D1), Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes 1 (UR1), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria), and Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)
- Subjects
business.industry ,Computer science ,Logical topology ,Survivability ,020206 networking & telecommunications ,Torus ,Extension topology ,Topology (electrical circuits) ,02 engineering and technology ,Network topology ,Decentralized computing ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Hypercube ,Routing (electronic design automation) ,[INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC] ,business ,Computer network - Abstract
International audience; Decentralized topology construction protocols organize nodes along a predefined topology (e.g. a torus, ring, or hypercube). Such topologies have been used in many contexts ranging from routing and storage systems, to publish-subscribe and event dissemination. Since most topologies assume no correlation between the physical location of nodes and their positions in the topology, they do not handle catastrophic failures well, in which a whole region of the topology disappears. When this occurs, the overall shape of the system typically gets lost. This is highly problematic in applications in which overlay nodes are used to map a virtual data space, be it for routing, indexing or storage. In this paper, we propose a novel decentralized approach that maintains the initial shape of the topology even if a large (consecutive) portion of the topology fails. Our approach relies on the dynamic decoupling between physical nodes and virtual ones enabling a fast reshaping. For instance, our results show that a 51,200-node torus converges back to a full torus in only 10 rounds after 50% of the nodes have crashed. Our protocol is both simple and flexible and provides a novel form of collective survivability that goes beyond the current state of the art.
- Published
- 2014
- Full Text
- View/download PDF
16. Macroprogramming: Concepts, State of the Art, and Opportunities of Macroscopic Behaviour Modelling.
- Author
-
CASADEI, ROBERTO
- Subjects
SENSOR networks ,INTERNET of things ,SWARM intelligence ,INTERNET forums ,THEORY-practice relationship - Abstract
Macroprogramming refers to the theory and practice of expressing the macro(scopic) behaviour of a collective system using a single program. Macroprogramming approaches are motivated by the need of effectively capturing global/system-level aspects and the collective behaviour of multiple computational components, while abstracting over low-level details. Previously, this programming style had been primarily adopted to describe the data-processing logic in sensor networks; recently, research forums on spatial computing, collective systems, and the Internet of Things have provided renewed interest in macro approaches. However, related contributions are still fragmented and lack conceptual consistency. Therefore, to foster principled research, an integrated view of the field is provided, together with opportunities and challenges. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
17. Sybil Detection Using Latent Network Structure.
- Author
-
SCHONEBECK, GRANT, SNOOK, AARON, and FANG-YI YU
- Subjects
COMPUTER security ,SOCIAL networks ,DATA analysis ,ALGORITHMS ,BIG data - Abstract
Sybil attacks, in which an adversary creates a large number of identities, present a formidable problem for the robustness of recommendation systems. One promising method of sybil detection is to use data from social network ties to implicitly infer trust. Previous work along this dimension typically a) assumes that it is difficult/costly for an adversary to create edges to honest nodes in the network; and b) limits the amount of damage done per such edge, using conductance-based methods. However, these methods fail to detect a simple class of sybil attacks which have been identified in online systems. Indeed, conductance-based methods seem inherently unable to do so, as they are based on the assumption that creating many edges to honest nodes is difficult, which seems to fail in real-world settings. We create a sybil defense system that accounts for the adversary's ability to launch such attacks yet provably withstands them by: (1) Not assuming any restriction on the number of edges an adversary can form, but instead making a much weaker assumption that creating edges from sybils to most honest nodes is difficult, yet allowing that the remaining nodes can be freely connected to. (2) Relaxing the goal from classifying all nodes as honest or sybil to the goal of classifying the "core" nodes of the network as honest; and classifying no sybil nodes as honest. (3) Exploiting a new, for sybil detection, social network property, namely, that nodes can be embedded in low-dimensional spaces. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
18. Polystyrene: the Decentralized Data Shape That Never Dies.
- Author
-
Bouget, Simon, Kervadec, Hoel, Kermarrec, Anne-Marie, and Taiani, Francois
- Published
- 2014
- Full Text
- View/download PDF
19. Table of Contents.
- Published
- 2014
- Full Text
- View/download PDF
20. Cryptology and Network Security : 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings
- Author
-
Stephan Krenn, Haya Shulman, Serge Vaudenay, Stephan Krenn, Haya Shulman, and Serge Vaudenay
- Subjects
- Computer security, Computer networks--Security measures--Congresses, Data encryption (Computer science)--Congresses, Computer networks, Software engineering, Application software
- Abstract
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS 2020, held in Vienna, Austria, in December 2020.•The 30 full papers were carefully reviewed and selected from 118 submissions. The papers focus on topics such as cybersecurity; credentials; elliptic curves; payment systems; privacy-enhancing tools; lightweight cryptography; and codes and lattices. •The conference was held virtually due to the COVID-19 pandemic.
- Published
- 2020
21. Distributed Applications and Interoperable Systems : 17th IFIP WG 6.1 International Conference, DAIS 2017, Held As Part of the 12th International Federated Conference on Distributed Computing Techniques, DisCoTec 2017, Neuchâtel, Switzerland, June 19–22, 2017, Proceedings
- Author
-
Lydia Y. Chen, Hans P. Reiser, Lydia Y. Chen, and Hans P. Reiser
- Subjects
- Computer networks, Application software, Electronic digital computers—Evaluation, Software engineering
- Abstract
This book constitutes the proceedings of the 17th IFIP International Conference on Distributed Applications and Interoperable Systems, DAIS 2017, held in Neuchâtel, Switzerland, in June 2017. The 11 papers presented together with 4 short papers in this volume were carefully reviewed and selected from 23 submissions. The papers are organized in topical sections on running system efficiently, storing data smartly, roaming in graph, building collaborative services, and making things safe.
- Published
- 2017
22. Researchers at RISE Research Institutes of Sweden Target Cloud Computing (Security and Trust Preserving Inter- and Intra-cloud Vm Migrations)
- Subjects
Investment analysis -- Reports ,Cloud computing -- Reports ,Virtual computer systems -- Reports ,Computers - Abstract
2021 APR 20 (VerticalNews) -- By a News Reporter-Staff News Editor at Information Technology Newsweekly -- Research findings on Information Technology - Cloud Computing are discussed in a new report. [...]
- Published
- 2021
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.