Solange Ghernaouti-Hélie
University of Lausanne
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Solange Ghernaouti-Hélie.
Journal of Networks | 2006
Thi Mai Trang Nguyen; Mohamed Ali Sfaxi; Solange Ghernaouti-Hélie
Quantum cryptography is a promising solution towards absolute security in long term cryptosystems. While the use of quantum cryptography in fiber optical networks gets significant advances, research on the application of quantum cryptography in mobile wireless network is still premature. In this paper, we analyze the interests of using quantum cryptography in 802.11 wireless networks, and propose a scheme integrating quantum cryptography in 802.11i security mechanisms for the distribution of the encryption keys. The use of an apparatus network to provide alternative line-of-sight paths is also discussed.
availability, reliability and security | 2006
Thi Mai Trang Nguyen; Mohamed Ali Sfaxi; Solange Ghernaouti-Hélie
Quantum cryptography is considered as a promising solution towards absolute security in long-term cryptosystems. While the application of quantum cryptography in fiber networks has significant advances, research on the application of quantum cryptography in mobile networks is still premature. In this paper, we analyze the interests of using quantum technique for the distribution of encryption keys in 802.11 wireless networks. We also propose a scheme for the integration of quantum cryptography in 802.11i security mechanisms for the establishment of the PTK (pairwise transient key).
International Conference on Network Control and Engineering for QoS, Security and Mobility | 2005
Solange Ghernaouti-Hélie; Mohamed Ali Sfaxi
Quantum cryptography could be integrated in various existing concepts and protocols to secure communications that require very high level of security. The aim of this paper is to analyse the use of quantum cryptography within PPP. We introduce basic concepts of the Point to Point Protocol; we propose a solution that integrates quantum key distribution into PPP. An example is given to demonstrate the operational feasibility of this solution
Second International Conference on Quantum, Nano and Micro Technologies (ICQNM 2008) | 2008
Stefan Rass; Mohammed Ali Sfaxi; Solange Ghernaouti-Hélie; Kyandoghere Kyamakya
This paper presents extensions to the classical point- to-point protocol PPP [RFC1661] and IPSEC [RFC 2401] in order to build networks that can do unconditionally secure message relay. Our work addresses the problem of how to integrate quantum key distribution (QKD) in networks such that little effort needs to be put on protocol engine adaption and network topology design. This article demonstrates how to ensure correct routing and secure authentication between adjacent QKD-capable nodes, in particular, it is demonstrated how a person-in-the-middle attack can be countered using universal hash functions.
availability, reliability and security | 2009
Solange Ghernaouti-Hélie
The information economy and the information society heavily depend on information security. Developing an inclusive and reliable information society should avoid any infrastructure or security divides. To master information related risks and cyberthreats, and to bring effective information security solutions to the end-users, a global and interdisciplinary approach is required. This paper considers information security issues in a holistic way, putting the individual and the question of responsibility at the core of the debate. It also points out main stakes and challenges that governments have to face when developing a national cybersecurity policy, curriculum and culture in regards of local and international needs.
international conference on internet monitoring and protection | 2008
Igli Tashi; Solange Ghernaouti-Hélie
An efficient IT security management relies upon the ability to make a good compromise between the cost of security countermeasures to be implemented, and the reality of informational risks an organization have to face. In fact, it concerns the capacity of an IT security manager to make decisions in a dynamic and complex environment. Even a well-experienced manager needs reliable tools to optimize the decision making process. The aim of this paper is to propose some relevant metrics and measurements in order to facilitate the decision making and to improve performance and accountability in security measures and procedures. We propose an approach to obtain some meaningful and useful metrics and measurements, to assess the Information Security Preparedness Level in a continuing improvement scope.
Archive | 1998
Solange Ghernaouti-Hélie; Arnaud Dufour
The aim of this chapter is to present the principal applications supported by enterprise local networks. Using a functional approach we will answer the question: “what is the local network for?”
advanced information networking and applications | 2011
Solange Ghernaouti-Hélie; Igli Tashi; David Simms
Security measures taken in isolation and without reference to a concrete and relevant assessment and evaluation of actual risks are doomed to be inefficient. At best they do not address the real issues facing an organization and simply waste resources, at worst they provide management with inappropriate comfort over the level of security management that is in place. This paper reviews the key points of some relevant international standards, discusses the links between effective risk management and optimized security measures, and provides a case study illustrating the benefits to be obtained from a structured and integrated approach.
availability, reliability and security | 2009
Igli Tashi; Solange Ghernaouti-Hélie
Managing information security within an organization is becoming a very complex task. The information security posture assessment is performed by using frameworks, methodologies or standards considering the subject separately. The model proposed within the paper aims to holistically consider all the security dimension. This is because the security level is as strong as the weakest link is. In order to minimize the likelihood that a given threat takes advantage of the weakest link a formalized structure taking into account all security elements is needed. The proposed model is based on and integrates some security best practices and standards in order to define an assured Information Security Categorization. From this point, an assessment process should be performed, giving the evidence that the information security within a given organization, is thoroughly managed.
Archive | 1998
Solange Ghernaouti-Hélie; Arnaud Dufour
The problems associated with the integration of local networks and PBX are part of the general problem of technical evolution. The two tendencies concerned are shown in Figure 9.1.