06.21.2020
Managing Secure Inter-slice Communication in 5G Network Slice Chains
[...]
read the publication
Today, digital life is an integral part of our routines. But without security, this new component becomes a threat to our personal data, the normal operation of businesses, and the confidentiality of communications.
Its work is guided by legal skills to anticipate changes to local, national, and international law frameworks so that it can offer suitable solutions. Ultimately, the laboratory’s goal is to offer transparent but tangible security, so that the Internet can become a trusted space.
With our expertise in data protection, we can secure sensitive assets no matter where they are or what paths they take.
06.21.2020
Managing Secure Inter-slice Communication in 5G Network Slice Chains
[...]
read the publication
06.16.2020
On an Access Control Model enhancement for the 5G System
The realization of communication services over 5G needs resource sharing as a way to achieve network coverage. To do so, it is necessary to consider security access mechanisms to regulate how interconnections are made. The existing models do not address all the needs inherent to the 5G architecture, such as access control mechanisms, multi-tenancy, multi-domain and multiple security levels. This…
read the publication
05.18.2020
Browser fingerprinting consists in collecting attributes from a web browser to build a browser fingerprint. In this work, we assess the adequacy of browser fingerprints as an authentication factor, on a dataset of 4,145,408 fingerprints composed of 216 attributes. It was collected throughout 6 months from a population of general browsers. We identify, formalize, and assess the properties for…
read the publication
07.12.2016
Experimentation of Privacy Protection for JPEG Contents on Image-Sharing Platforms
[...]
read the publication