Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Bertrand Marquet is active.

Publication


Featured researches published by Bertrand Marquet.


The Future Internet - Future Internet Assembly 2013 | 2013

Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures

Stéphane Betge-Brezetz; Aline Bousquet; Jérémy Briffaut; Eddy Caron; Laurent Clevy; Marie-Pascale Dupont; Guy-Bertrand Kamga; Jean-Marc Lambert; Arnaud Lefray; Bertrand Marquet; Jonathan Rouzaud-Cornabas; Lamiel Toch; Christian Toinard; Benjamin Venelle

Complying with security and privacy requirements of appliances such as mobile handsets, personal computers, servers for customers, enterprises and governments is mandatory to prevent from theft of sensitive data and to preserve their integrity. Nowadays, with the rising of the Cloud Computing approach in business fields, security and privacy are even more critical. The aim of this article is then to propose a way to build a secure and trustable Cloud. The idea is to spread and embed Secure Elements (SE) on each level of the Cloud in order to make a wide trusted infrastructure which complies with access control and isolation policies. This article presents therefore this new approach of trusted Cloud infrastructure based on a Network of Secure Elements (NoSE), and it illustrates this approach through different use cases.


Certification and Security in E-Services | 2002

SECURITY THROUGH INTEGRATION: TOWARDS A COMPREHENSIVE FRAMEWORK FOR DEVELOPMENT AND CERTIFICATION

Bertrand Marquet; Adrian Mario Rossi; Francois J. N. Cosquer

Today secured infrastructures are more and more being built by integration of both in-house components and policies, and off-the-shelf products. This poses several difficulties for developers. Despite, or because, the numerous choice of security products, it is difficult to build, in a coherent way, a comprehensive set of security features within distributed applications without severely increasing complexity and decreasing scalability of globally secured applications. Another difficulty appears when security certification needs to be achieved for such an integrated security architecture. In this paper we propose an alternative approach to building secured applications through integration which will additionally guarantee a means to achieve security certification, such as ISO 15408 (Common Criteria) [4].


Archive | 2005

Protection for wireless devices against false access-point attacks

Vinod Kumar Choyi; Bertrand Marquet; Frederic Gariador


Archive | 2005

Communication network security risk exposure management systems and methods

Francois J. N. Cosquer; Bertrand Marquet; Robert W. MacIntosh; Yvon Leclerc; Scott David D'Souza


CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security | 2007

Multi-agent based security assurance monitoring system for telecommunication infrastructures

Evren Bulut; Djamel Khadraoui; Bertrand Marquet


Archive | 2002

Embedded filtering policy manager using system-on-chip

Bertrand Marquet; Scott David D'Souza


Archive | 2002

High-speed adaptive structure of elementary firewall modules

Bertrand Marquet; Scott David D'Souza; Paul Kierstead


Archive | 2006

Mobile phone locking system using multiple biometric factors for owner authentication

Vinod Kumar Choyi; Bertrand Marquet


Archive | 2003

Non-repudiable distributed security policy synchronization

Bertrand Marquet; Frederic Gariador


Archive | 2002

Dynamic acquisition of state during security system reconfiguration

Bertrand Marquet; Adrian Mario Rossi; Francois J. N. Cosquer

Collaboration


Dive into the Bertrand Marquet's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge