• Aucun résultat trouvé

A trust framework for multi-organization environments

N/A
N/A
Protected

Academic year: 2021

Partager "A trust framework for multi-organization environments"

Copied!
166
0
0
En savoir plus ( Page)

Texte intégral

(1)

HAL Id: tel-00997693

https://tel.archives-ouvertes.fr/tel-00997693

Submitted on 28 May 2014

HAL is a multi-disciplinary open access

archive for the deposit and dissemination of sci-entific research documents, whether they are pub-lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

A trust framework for multi-organization environments

Khalifa Toumi

To cite this version:

Khalifa Toumi. A trust framework for multi-organization environments. Other. Institut National des Télécommunications, 2014. English. �NNT : 2014TELE0004�. �tel-00997693�

(2)

DOCTO

TELECOM SUDPAR

Ecole do

DOCT

A Trust

Organ

Th

Soutenue le 01 avril 2014 dev

Directeur de thèse: Ana Cav

Co-encadrant: César An

Examinateurs :

Frédéric

Nora Cu

Lidia Fu

Nina Yev

Wissam

Sammy H

DOCTORAT EN CO-ACCREDITATION

SUDPARIS ET L’UNIVERSITE EVRY VAL D’ESSO

Spécialité : Informatique

Ecole doctorale : Sciences et Ingénierie

Présentée par

Khalifa TOUMI

Pour obtenir le grade de

DOCTEUR DE TELECOM SUDPARIS

st Framework For Mul

anization Environments

Thèse dirigée par Ana CAVALLI

evant le jury composé de :

avalli

Télécom SudPar

Andrès

Brain Tec- Suiss

ric Cuppens

Télécom Bretagn

Cuppens -

Boulahia

Télécom Bretagn

Fuentes

University of M

Yevtushenko

Tomsk State Uni

m Mallouli

Montimage-Fran

y Haddad

Oppida-France

Thèse N

D’ESSONNE

ulti-nts

aris- France

isse

agne- France

agne, France

Malaga, Spain

niversity- Russia

rance

e N° 2014TELE0004

(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
(22)
(23)
(24)
(25)
(26)
(27)
(28)
(29)
(30)
(31)
(32)
(33)
(34)
(35)
(36)
(37)
(38)
(39)
(40)
(41)
(42)
(43)
(44)
(45)
(46)
(47)
(48)
(49)
(50)
(51)
(52)
(53)
(54)
(55)
(56)
(57)
(58)
(59)
(60)
(61)
(62)
(63)
(64)
(65)
(66)
(67)
(68)
(69)
(70)
(71)
(72)
(73)
(74)
(75)
(76)
(77)
(78)
(79)
(80)
(81)
(82)
(83)
(84)
(85)
(86)
(87)
(88)
(89)
(90)
(91)
(92)
(93)
(94)
(95)
(96)
(97)
(98)
(99)
(100)
(101)
(102)
(103)
(104)
(105)
(106)
(107)
(108)
(109)
(110)
(111)
(112)
(113)
(114)
(115)
(116)
(117)
(118)
(119)
(120)
(121)
(122)
(123)
(124)
(125)
(126)
(127)
(128)
(129)
(130)
(131)
(132)
(133)
(134)
(135)
(136)
(137)
(138)
(139)
(140)
(141)
(142)
(143)
(144)
(145)
(146)
(147)
(148)
(149)
(150)
(151)
(152)
(153)
(154)
(155)
(156)
(157)
(158)
(159)
(160)
(161)
(162)
(163)
(164)
(165)
(166)

Références

Documents relatifs

Similarly, the profit maximizing trustees (which are effectively fixed offer) have 0% or 100% satisfaction rate for each group of trustors and pessimal or optimal trust scores..

Empirical, correctness and robustness evaluation. When it comes to theoretical evaluation, in the classic life cycle of trust systems, correctness evaluation of trust models

Or, il ne doit pas être difficile à nos représentants à Berne de convaincre les Com- missaires Anglais, par le moyen des statisti- ques fédérales, que nous n'importons pas de

On the other hand, the framework must provide enough hot spots to support the customization of the trust server behaviour at runtime in order to accommodate new trust and

In this sense our ontology is not fully context aware however we emphasise that the trust relation is valid for a specific period of time regarding a particular action and in a

The above four dimensions provide for easy matching between problems and trust func- tions. For each of these categories, it should be clear from the situation being addressed what

Merci pour tous ces moments où tu as été notre arbitre avec JB, merci d’avoir supporté tes 2 frères et cette ambiance de garçons, merci d’être là et d’aimer

3- The conceptual hierarchy to describe the libraries of element types corresponding to structural or behavioural element at each level of the architecture

In this project, 530 ideas were collected by the following three contact points: (1) 21 ideas by students on a dedicated internet platform (2) 436 ideas by users during the

For control plane, the main functions are connection management, network access, bandwidth allocation, service QoS, radio bearer control, switching control, multicast and

While trust management systems can be used in isolation in order to provide robustness to a given architecture, cooperation incentives can be used to complement and collaborate

We determined the cation distribution in our samples by X-ray magnetic circular dichroism (XMCD), a well accepted method to do so, and by X-ray photoelectron spectroscopy (XPS), using

If we consider a trust chain ending in full disbelief, then the whole chain does not express any belief (axiom R3) and the disbelief expressed in the whole chain is exactly the

2) Spoofing detection methods have not been systemati- cally characterised. This leads to incorrect inference of signal integrity from the consistency of measurements with the

In this regard, explorative mind-maps change their size continuously, being adaptive with connectionist cells inside; mind-maps process data input incrementally and offer lots

For example, in the in- ertial spoofing detection, the causal relationship can be formulated by if referred past signals and current signal are integrous → the calculated location

To evaluate the trust in a system for an activity, two cases have to be considered: (1) the paths are independent i.e., they have no nodes in common and (2) the paths are

Philosophy in the Twentieth Century, Cambridge University

2) Observation on data: First, we show that our models on user profiles (low, medium, high and fluctuate profiles) are consistent with data collected throughout experiments. Next,

As introduced in Sec. 1, we use a running example based on Policy-based Access Control to show how “soft” deduction and abduction can be used. We suppose that the soft constraint

We take the conjunction of the formulas identified in step 2 and we ma- nipulate it to transform it in the equivalent simplified Conjunctive Nor- mal Form (CNF). We label

The challenge for developed and developing countries is now to achieve their sustainable development objectives, through individual and collective actions, benefitting