31.12.2014 Views

researResearch - Télécom Bretagne

researResearch - Télécom Bretagne

researResearch - Télécom Bretagne

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

esearc<br />

<strong>researResearch</strong><br />

SERES<br />

Network and Information Systems Security<br />

Project Leader :<br />

Frederic Cuppens<br />

Department:<br />

• Logics in Uses, Social<br />

Science and Information<br />

Project team:<br />

Ahmed Bouabdallah,<br />

Frederic Cuppens,<br />

Sylvain Gombault,<br />

Yves Le Traon,<br />

Diala Abi Haidar,<br />

Nabil Ajam,<br />

Fabien Autrel,<br />

Samiha Ayed,<br />

Meriam Ben Ghorbel,<br />

Celine Coma,<br />

Aurelien Croissant,<br />

Nora Cuppens-Boulahia,<br />

Thomas Demongeot,<br />

Yehia El Rakaiby,<br />

Wael Kanoun,<br />

Nizar Kheir,<br />

Tejeddine Mouelhi,<br />

Stere Preda,<br />

Julien Thomas<br />

Aims and objectives throughout the project<br />

Within the context of the major infrastructures of information processing, it<br />

is necessary to have efficient security mechanisms in place, in order to<br />

guarantee the confidentiality and integrity of the data while, at the same time,<br />

ensuring that commitments to quality of service and availability are<br />

maintained. The SERES project explores the mechanisms whose aim is to<br />

ensure protection against both internal and external attacks as well as dealing<br />

with the techniques enabling their detection.<br />

The themes studied concern the following points in particular :<br />

• Expression of security requirements, Security Properties and Policies ;<br />

• Network and Application Protection ;<br />

• Vulnerability Analysis and Intrusion Detection.<br />

The activities carried out within the project framework include:<br />

• Modelling and formalisation of security concepts ;<br />

• Design, development and validation of architectures, secure software<br />

and tools for the administration of security policies ;<br />

• Experimentation and evaluation of the architectures, software and tools.<br />

178

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!