Christophe Feltus
Université de Namur
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Christophe Feltus.
security of information and networks | 2012
Christophe Feltus; Eric Dubois; Erik H. A. Proper; Iver Band; Michaël Petit
In this paper, we describe an innovative approach for aligning the business layer and the application layer of ArchiMate to ensure that applications manage access rights consistently with enterprise goals and risk tolerances. The alignment is realized by using the responsibility of the employees, which we model using ReMoLa. The main focus of the alignment targets the definition and the assignment of the access rights needed by the employees according to business specification. The approach is illustrated and validated with a case study in a municipal hospital in Luxembourg.
availability, reliability and security | 2009
Christophe Feltus; Michaël Petit
This paper aims at building a responsibility model based on the concepts of Accountability, Capability and Commitment. The models objectives are firstly to help organizations for verifying the organizational structure and detecting policy problems and inconsistency. Secondly, the paper brings up a conceptual framework to support organization for defining their corporate, security and access control policies. Our work provides a preliminary review of the researches performed in that field and proposes, based on the analyses, an UML responsibility model and a definition of all its concepts. Thereafter, to propose a formal representation of the model, we have selected the suitable language and logic system. The analyze highlights that an important variable is whether the responsibility is perceived at a user or at a company level.
enterprise distributed object computing | 2013
Eric Grandry; Christophe Feltus; Eric Dubois
Enterprise Architecture Management (EAM) is considered to provide the mechanism for, amongst others, governing enterprise transformations required by changes in the environment. In this paper, we focus on changes that result from the analysis of information security risks and of their impacts on the services delivered by an enterprise. We present how the concepts of an information system security risks management domain can be mapped into the ArchiMate enterprise architecture modeling language. We illustrate the application of the proposed approach through the handling of a lab case.
Journal of Service Science Research | 2012
Abdelaziz Khadraoui; Christophe Feltus
Service engineering is a huge research topic that addresses the specification, the compliance and the sharing of business and IT services across companies, institutions or governmental organizations. Despite many advantages of working with the services, the guarantee of service compliance and management of the service overlaps by the stakeholders remains challenging. The objective of this document is to present a methodological approach in order to specify the links between the organizational layer and the informational layer of services. Therefore our research has focused on clarifying the responsibility dimension of the stakeholders involved in those services. The proposed approach is illustrated with an example in the context of sensitive data exchange between stakeholders from the healthcare domain.
availability, reliability and security | 2010
Christophe Feltus; Djamel Khadraoui; Jocelyn Aubert
The main objective of this paper is to provide a global decision-reaction architectural built on the requirements for a reaction after alert detection mechanisms in the frame of information systems security and more particularly applied to telecom infrastructures security. These infrastructures are distributed in nature, therefore the architecture is elaborated using the multi-agents system that provides the advantages of autonomous and interaction facilities, and has been associated to the ontoBayes model for decision support mechanism. This model helps agents to make decisions according to preference values and is built upon ontology based knowledge sharing, bayesian networks based uncertainty management and influence diagram based decision support. The Multi-Agent System decision-reaction architecture is developed in a distributed perspective and is composed of three basic layers: low level, intermediate level and high level. The proposed approach has been illustrated based on the network architecture for heterogeneous mobile computing developed by the BARWAN project. Accordingly: the Building Area constitutes the low level and aims to be the interface between the main architecture and the targeted infrastructure. The Campus-Area is the intermediate level responsible of correlating the alerts coming from different domains of the infrastructure and to smartly deploy the reaction actions.
global information infrastructure and networking symposium | 2009
Benjamin Gateau; Djamel Khadraoui; Christophe Feltus
The main focus of this paper is to provide a global architectural solution built on the requirements for a reaction after alert detection mechanisms in the frame of Information Systems Security and more particularly applied to telecom infrastructures security. These infrastructures are distributed in nature, therefore the targeted architecture is developed in a distributed perspective and is composed of three basic layers: low level, intermediate level and high level. The low level is dedicated to be the interface between the main architecture and the targeted infrastructure. The intermediate level is responsible of correlating the alerts coming from different domains of the infrastructure and to deploy smartly the reaction actions. This intermediate level is elaborated using multi-agents system that provide the advantages of autonomous and interaction facilities. The high level permits to have a supervision view of the whole infrastructure, and to manage business policy definition. The proposed approach has been successfully experimented for data access control mechanism.
research challenges in information science | 2008
Benjamin Gateau; Christophe Feltus; Jocelyn Aubert; Christophe Incoul
The generalization of open and distributed systems and the dynamics of the environment make Information Systems (IS) and, consequently, its access rights management an increasingly complex problem. Even if support for this activity appears to be well handed by current sophisticated solutions, the definition and the exploitation of an access rights management framework appropriately adapted for a company remain challenging. This statement is explained mainly by the continuous growth of the diversity of stakeholderspsila positions and by the criticality of the resources to protect. The SIM project, which stands for ldquoSecure Identity Managementrdquo, addresses this problem. The objectives of our paper are twofold. First, to make rights management align closer to business objectives by providing an innovative approach that focuses on business goals for defining access policy. The ISO/IEC 15504 process-based assessment model has been preferred for that research. Indeed, the structured framework that it offers for the description of activities allows for the establishment of meaningful links with responsibilities concepts. Secondly, to automate the deployment of policies through the company IT infrastructurepsilas components and devices by defining a multi-agent system architecture that provides autonomy and adaptability. Free and open source components have been used for the prototyping phase.
international conference on information and communication technologies | 2008
Christophe Feltus
This paper introduces a preliminary review of the research currently performed in the field of Policy. This review aims to understand the approaches covered by main research streams in that area and to highlight the advantages of the essential and most renowned solutions. The review of the literature quickly provides a plethora of publications that presents innovative proposals on the matter of policy conceptual model, engineering methods, elicitation languages, as well as cases studies. It also brings out that the papers most often refer rather evasively to the organizational model layers when aligning and positioning their theory with organizational concepts. Consequently, it sounds useful to orient and improve our own developments in the purpose of ameliorate that issue. Based on that overviews results, we are able to orient our researches more deeply by proposing an innovative approach that focuses in one hand on a policy model designed to take into account the responsibility of stakeholders and in the other hand on policy engineering method that takes care of business process while at the same time using requirement engineering principles. Responsibility is a notion that remains rarely addressed and that however embodies important and well-know concepts like accountability, capability and commitment. Moreover, responsibility constitutes a fundamental notion of management theory and is consequently identified as a meaningful bridge toward organizational artifacts. Exploiting process to define policy seems likewise to offer new research opportunities since process organizations become a more widely spread structured approach.
conference on advanced information systems engineering | 2015
Nicolas Mayer; Eric Grandry; Christophe Feltus; Elio Goettelmann
Secure information systems engineering is currently a critical but complex concern. Risk management has become a standard approach to deal with the necessary trade-offs between expected security level and control cost. However, with the current interconnection between information systems combined with the increasing regulation and compliance requirements, it is more and more difficult to achieve real information security governance. Given that risk management is not able to deal with this complexity alone, we claim that a connection with Enterprise Architecture Management (EAM) contributes in addressing the above challenges, thereby sustaining governance and compliance in organisations. In this paper, we motivate the added value of EAM to improve security risk management and propose a research agenda towards a complete framework integrating both domains.
web intelligence | 2011
Guy Guemkam; Christophe Feltus; Pierre Schmitt; Cedric Bonhomme; Djamel Khadraoui; Zahia Guessoum
Power distribution constitutes a critical service for our economy. To foreseen electricity overload and risks of power blackout according to external perturbations such as the weather, the temperature or the barometric pressure in real time is a crucial challenge. In order to face those problems, research tends to involve consumers in the utilization of the electricity based on weather conditions. Our previous works had proposed an agent based architecture to support this alert mechanism. The architecture exploited a static assignment of functions to agents. That static assignment was a weak point because isolating an agent or breaking the communication channel between two of them created serious damage on the crisis management. In this paper, we complete our previous works and make dynamic the assignment of functions mobile for agents. Our approach exploits the concept of agent responsibility that we dynamically assigned to the agent taking into consideration the agents reputation.