Publications

As an applied research center, active at the regional and european level, CETIC is involved in the publication of research results in various conferences and journals related to these fields, as well as documents aimed at industry.
Our policy is to favor contributions that are close to the application fields, based on industrial case studies resulting from the research projects.

Filter by

Reset

01.07.2007

Towards a Commercial IT Service Delivery

01.07.2007

Publications scientifiques

Towards a Commercial IT Service Delivery

Christophe Ponsard, Gautier Dallons, Stéphane Mouton, Philippe Massonet : Towards a Commercial IT Service Delivery. ERCIM News 2007(70)...

En savoir plus

25.06.2012

Analysing Impact of Scalability and Heterogeneity on the Performance of Federated Cloud Security

25.06.2012

Publications scientifiques

Analysing Impact of Scalability and Heterogeneity on the Performance of...

Syed Naqvi, Arnaud Michot, Michael Van de Borne, Analysing Impact of Scalability and Heterogeneity on the Performance of Federated Cloud...

En savoir plus

18.04.2012

Security Challenges for Remote Patient Care Systems using m-Health Technologies

18.04.2012

Scientific communication

Security Challenges for Remote Patient Care Systems using m-Health...

Syed Naqvi, Philippe Drugmand, Sébastien Rousseaux, "Security Challenges for Remote Patient Care Systems using m-Health Technologies", Medetel,...

En savoir plus

01.02.2012

Digital Investigations for Enterprise Information Architectures

01.02.2012

Publications scientifiques

Digital Investigations for Enterprise Information Architectures

Syed Naqvi, Gautier Dallons, Christophe Ponsard, Digital Investigations for Enterprise Information Architectures, The Sixth International...

En savoir plus

30.01.2012

Digital Investigations and Forensic Analysis - Practices and Technologies

30.01.2012

Communication scientifique

Digital Investigations and Forensic Analysis - Practices and...

Syed Naqvi, Digital Investigations and Forensic Analysis - Practices and Technologies, Sixth International Conference on Digital Society (ICDS...

En savoir plus

30.11.2011

Securing the External Interfaces of a Federated Infrastructure Cloud

30.11.2011

Publications scientifiques

Securing the External Interfaces of a Federated Infrastructure...

Massonet P., Michot A., Naqvi S., Villari M., Latanicki J., Securing the External Interfaces of a Federated Infrastructure Cloud, In Open Source...

En savoir plus

17.05.2011

A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures

17.05.2011

Publications scientifiques

A Monitoring and Audit Logging Architecture for Data Location Compliance in...

Massonet P., Naqvi S., Ponsard C., Latanicki J., Rochwerger B., Villari M., A Monitoring and Audit Logging Architecture for Data Location...

En savoir plus

17.05.2011

Designing Efficient Security Services Infrastructure for Virtualization Oriented Architectures

17.05.2011

Publications scientifiques

Designing Efficient Security Services Infrastructure for Virtualization...

Naqvi S. "Designing Efficient Security Services Infrastructure for Virtualization Oriented Architectures, in Pervasive Information Security and...

En savoir plus

06.04.2011

Using Organisational Security Policy for Ensuring Privacy of Electronic Health Records

06.04.2011

Communication scientifique

Using Organisational Security Policy for Ensuring Privacy of Electronic...

Naqvi S., Dallons G., Michot A., Ponsard C., Using Organisational Security Policy for Ensuring Privacy of Electronic Health Records, The...

En savoir plus

08.10.2010

Protecting Corporate ICT Infrastructures by using Digital Forensics

08.10.2010

Publications scientifiques

Protecting Corporate ICT Infrastructures by using Digital Forensics

Naqvi S., Dallons G., Ponsard C., "Protecting Corporate ICT Infrastructures by using Digital Forensics", IEEE International Conference on...

En savoir plus

16.06.2010

Deriving Event-Based Usage Control Policies from Declarative Security Requirements Models

16.06.2010

Communication scientifique

Deriving Event-Based Usage Control Policies from Declarative Security...

De Landtsheer R, Ponsard C, Massonet P., "Deriving Event-Based Usage Control Policies from Declarative Security Requirements Models", Second...

En savoir plus

16.05.2010

Applying Digital Forensics in the Future Internet Enterprise Systems

16.05.2010

Publications scientifiques

Applying Digital Forensics in the Future Internet Enterprise...

Naqvi S., Dallons G., Ponsard C., "Applying Digital Forensics in the Future Internet Enterprise Systems" - European SMEs’ Perspective, Fifth...

En savoir plus

16.05.2010

Ensuring Security of the Future Internet-based Virtualization Infrastructures

16.05.2010

Publications scientifiques

Ensuring Security of the Future Internet-based Virtualization...

Naqvi S., Dallons G., Ponsard C., Massonet P., "Ensuring Security of the Future Internet-based Virtualization Infrastructures" (Position Paper),...

En savoir plus

30.11.2009

Assuring Privacy of Medical Records in an Open Collaborative Environment - A Case Study of Walloon region's eHealth Platform

30.11.2009

Publications scientifiques

Assuring Privacy of Medical Records in an Open Collaborative Environment -...

Naqvi S., Dallons G., Michot A., Ponsard C. . "Assuring Privacy of Medical Records in an Open Collaborative Environment - A Case Study of Walloon...

En savoir plus

14.12.2007

Développer une application eID - rapport d'expérience : réalisation d'un chat eID

14.12.2007

Communication scientifique

Développer une application eID - rapport d’expérience : réalisation d’un chat...

Christophe Ponsard et Jérôme Jonckers, Développer une application eID - rapport d’expérience : réalisation d’un chat eID, eID newsletter, décembre...

En savoir plus

13.09.2007

An Analysis of the Chinese Wall Pattern for Guaranteeing Confidentiality in Grid-based Virtual Organisations

13.09.2007

Communication scientifique

An Analysis of the Chinese Wall Pattern for Guaranteeing Confidentiality in...

Dallons G., Massonet P., Molderez J.F., Ponsard C., Arenas A., ’An Analysis of the Chinese Wall Pattern for Guaranteeing Confidentiality in...

En savoir plus

0 | 24