Integration of trusted information is an important requirement from business application. As business applications adaption relies on sensor data, that information must be trustworthy enough in order to prevent any misuse of sensor data. For example, the use of un-trustworthy information in healthcare system can have severe consequence on...
-
October 2015 (v1)Journal articleUploaded on: February 28, 2023
-
November 17, 2021 (v1)Publication
International audience
Uploaded on: December 3, 2022 -
July 11, 2007 (v1)Conference paper
International audience
Uploaded on: December 3, 2022 -
August 20, 2007 (v1)Conference paper
International audience
Uploaded on: December 3, 2022 -
August 4, 2014 (v1)Conference paper
The number of mobile devices connected to the Internet is rapidly growing, inducing security issues that cannot be prevented by common mechanisms such as HTTPS. Indeed, mobile environments require light algorithms that can reduce the power-consumption and extend battery life. Moreover, HTTPS does not offer fine-grained control over the security...
Uploaded on: February 28, 2023 -
October 29, 2022 (v1)Conference paper
This study aims to use artificial neural network based classifiers to predict fraud, particularly that related to health insurance. Medicare fraud results in considerable losses for governments and insurance companies and results in higher premiums from clients. Medicare fraud costs around 13 billion euros in Europe and between 21 billion and...
Uploaded on: December 3, 2022 -
November 17, 2021 (v1)Conference paper
International audience
Uploaded on: February 22, 2023 -
August 4, 2011 (v1)Conference paper
Securing a mobile Web connection via HTTPS is a well-known drain on battery life. To solve this problem, we propose a novel, modular approach based on security properties. Our solution enables fine-grained control of the security properties used during mobile Web access, giving users the opportunity to avoid power-hungry security mechanisms...
Uploaded on: February 28, 2023 -
June 28, 2011 (v1)Conference paper
Cloud computing is a new paradigm providing software and hardware resources according to the customers' needs. However, it introduces new security risks such as confidentiality of data stored in cloud databases. Actually, this last risk is a crucial issue that must be addressed as ciphering mechanisms are not sufficient to guarantee a strong...
Uploaded on: February 28, 2023 -
October 27, 2011 (v1)Conference paper
In this paper we report the results of the experiment carried out by our institutions for participating in the track 1 of the the 2011 CAMRa challenge workshop. We ran some variations of a traditional user-based neighborhood recommender system based on two simple ideas: (1) Force the inclusion of household members into the neighborhood of the...
Uploaded on: February 28, 2023 -
July 10, 2017 (v1)Publication
Software systems became so complex that the need to decompose them into simpler, more manageable pieces became crucial. Because of this, one has to compose every isolated pieces to build the expected system. Thus, composition is a mechanism used in many different domains developed from scratch through custom composition operators. Therefore,...
Uploaded on: February 28, 2023 -
October 30, 2020 (v1)Journal article
Data leakage can lead to severe issues for a company, including financial loss, damage of goodwill, reputation, lawsuits and loss of future sales. To prevent these problems, a company can use other mechanisms on top of traditional Access Control. These mechanisms include for instance Data Leak Prevention or Information Rights Management and can...
Uploaded on: December 3, 2022 -
May 22, 2012 (v1)Conference paper
National audience
Uploaded on: February 28, 2023 -
July 2007 (v1)Journal article
International audience
Uploaded on: December 3, 2022 -
December 22, 2021 (v1)Publication
Medicare fraud results in considerable losses for governments and insurance companies and results in higher premiums from clients. Medicare fraud costs around 13 billion euros in Europe and between 21 billion and 71 billion US dollars per year in the United States. This study aims to use artificial neural network based classifiers to predict...
Uploaded on: December 3, 2022 -
November 26, 2010 (v1)Conference paper
Nowadays, Wireless Sensor Networks appear to be mature enough to be used by business applications. As delivered sensor data can strongly impact end users decision taking, business applications must rely on trustworthy sensor data. In this paper, we propose the evaluation of a trust model for sensor data [1] during its life-cycle from...
Uploaded on: February 28, 2023 -
May 17, 2011 (v1)Conference paper
Data quality analysis remains a difficult issue on several domains (e.g. geographic, software, databases, etc.). This is particularly the case on e-Health monitoring applications for chronic patients, where the need of data quality to ensure correct decision making is very important. Patients monitoring refers to a continuous observation of...
Uploaded on: February 28, 2023 -
August 28, 2006 (v1)Conference paper
Le .NET Framework, qui permet la création et l'exécution d'applications modernes conçues autour des standards de l'Internet (XML, SOAP, WSDL, HTTP), est de nos jours devenu incontournable pour la réalisation de projets informatiques. Après avoir précisé le vocabulaire autour de cette riche et complète plateforme normalisée par Microsoft,...
Uploaded on: December 4, 2022 -
October 19, 2022 (v1)Conference paper
International audience
Uploaded on: December 3, 2022 -
March 16, 2015 (v1)Conference paper
Connected objects and monitoring systems continuously produce data about their environment. Dashboards are then designed to aggregate and present these data to end-users. Technologies used to design and implement visualization dashboards are babbling from a software engineering point of view. This paper highlights how this domain could benefit...
Uploaded on: February 28, 2023 -
July 7, 2014 (v1)Conference paper
The centralized gathering and processing of user information made by traditional recommender systems can lead to user information exposure, violating her privacy. Client-side personalization methods have been created as a mean for avoiding privacy risks. Motivated by limiting the exposure of user private information, we explore the use of a...
Uploaded on: February 28, 2023 -
May 28, 2011 (v1)Publication
Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caused by mobile-specific characteristics such as access to device features or offline operation. We describe the design of SCCM, a platform independent approach to handle...
Uploaded on: February 28, 2023 -
February 1, 2023 (v1)Publication
Machine learning and artificial intelligence models are increasingly common in predictive maintenance due to their ability to automatically extract high-level features with less human intervention. These models have been shown to give good results in machinery or rotatory fault diagnosis. However, due to the complexity of vibration and audio...
Uploaded on: February 22, 2023 -
November 17, 2021 (v1)Conference paper
We study the problem of model personalization in Federated Learning (FL) with non-IID (Independent and Identically Distributed) data collected at nodes in a network, under the network communication cost constraints. Classical FL collaboratively trains a unique global model. If data is statistically heterogenic (non-IID), personalized models for...
Uploaded on: December 3, 2022 -
October 29, 2022 (v1)Conference paper
This study aims to use artificial neural network based classifiers to predict fraud, particularly that related to health insurance. Medicare fraud results in considerable losses for governments and insurance companies and results in higher premiums from clients. Medicare fraud costs around 13 billion euros in Europe and between 21 billion and...
Uploaded on: February 22, 2023