Trust & Security

Aujourd’hui, la vie numérique fait partie intégrante de notre quotidien. Mais sans sécurité, cette nouvelle composante devient une menace pour nos données personnelles, le bon fonctionnement des entreprises et la confidentialité des échanges.

Labo bcom - confiance et securite
    Today, digital life is an integral part of our routines. But without security, this new component becomes a threat to our personal data, the normal operation of businesses, and the confidentiality of communications.

    The Trust & Security lab designs tools suited to the new challenges of cybersecurity: Preventing and detecting data leaks, isolating machines and virtualized networks, authenticating people and terminals. Its work is guided by legal skills to anticipate changes to local, national, and international law frameworks so that it can offer suitable solutions. Ultimately, the laboratory’s goal is to offer transparent but tangible security, so that the Internet can become a trusted space.

    Gaetan le Guelvoult - bcom

    Gaëtan Le Guelvouit

    Trust & Security lab Manager

    With our expertise in data protection, we can secure sensitive assets no matter where they are or what paths they take.
    products & services
    Terminal authentication - teaser produit - bcom b<>com Terminal Authentication

    Multi-factor authentication using device fingerprinting

    Ultra marker - teaser fiche produit - bcom b<>com Ultra Marker

    Video forensic watermarking

    our scientific publications

    16.04.2021

    FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms

    Browser fingerprinting consists into collecting attributes from a web browser. Hundreds of attributes have been discovered through the years. Each one of them provides a way to distinguish browsers, but also comes with a usability cost (e.g., additional collection time). In this work, we propose FPSelect, an attribute selection framework allowing verifiers to tune their browser fingerprinting…

    read the publication

    22.10.2020

    Formalization of a security access control model for the 5G system

    The race for implementing communication services over 5G has already begun. For this, network coverage is needed and resource sharing is a way to achieve it. Therefore, each provider enforces its own security requirements. Under this scenario, it is necessary to consider security access mechanisms and policy rules, to regulate how interconnections are made between the shared network functions and…

    read the publication

    30.01.2021

    Optimisation du coût de déploiement de services réseau virtualisés dans le cloud

    Les opérateurs de clouds publics offrent aux particuliers et aux entreprises la possibilité de louer des ressources in-formatiques pour répondreà leurs besoins sans investir dans leur propre matériel. Le concept de Network Functions Virtualisation (NFV) favorise la migration des opérateurs réseau de dispositifs matériels dédiés coûteux et peuévolutifs vers des fonctions réseau logicielles…

    read the publication

    01.03.2021

    Algorithmes de placement de VNFs dans des contextes mono-et multi-propriétaire

    Le concept de Network Functions Virtualisation (NFV) offre aux opérateurs réseau la possibilité de fournir des services évolutifs et moins onéreux, libérés des contraintes propres aux composants matériels. Dans les réseaux 5G, les fonctions ne doivent pas seulement être déployées dans de vastes datacenters centraux, mais également dans les réseaux edge. Nous proposons un algorithme permettant de…

    read the publication