Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Solange Ghernaouti-Hélie is active.

Publication


Featured researches published by Solange Ghernaouti-Hélie.


Journal of Networks | 2006

802.11i Encryption Key Distribution Using Quantum Cryptography

Thi Mai Trang Nguyen; Mohamed Ali Sfaxi; Solange Ghernaouti-Hélie

Quantum cryptography is a promising solution towards absolute security in long term cryptosystems. While the use of quantum cryptography in fiber optical networks gets significant advances, research on the application of quantum cryptography in mobile wireless network is still premature. In this paper, we analyze the interests of using quantum cryptography in 802.11 wireless networks, and propose a scheme integrating quantum cryptography in 802.11i security mechanisms for the distribution of the encryption keys. The use of an apparatus network to provide alternative line-of-sight paths is also discussed.


availability, reliability and security | 2006

Integration of quantum cryptography in 802.11 networks

Thi Mai Trang Nguyen; Mohamed Ali Sfaxi; Solange Ghernaouti-Hélie

Quantum cryptography is considered as a promising solution towards absolute security in long-term cryptosystems. While the application of quantum cryptography in fiber networks has significant advances, research on the application of quantum cryptography in mobile networks is still premature. In this paper, we analyze the interests of using quantum technique for the distribution of encryption keys in 802.11 wireless networks. We also propose a scheme for the integration of quantum cryptography in 802.11i security mechanisms for the establishment of the PTK (pairwise transient key).


International Conference on Network Control and Engineering for QoS, Security and Mobility | 2005

Upgrading PPP security by Quantum Key Distribution

Solange Ghernaouti-Hélie; Mohamed Ali Sfaxi

Quantum cryptography could be integrated in various existing concepts and protocols to secure communications that require very high level of security. The aim of this paper is to analyse the use of quantum cryptography within PPP. We introduce basic concepts of the Point to Point Protocol; we propose a solution that integrates quantum key distribution into PPP. An example is given to demonstrate the operational feasibility of this solution


Second International Conference on Quantum, Nano and Micro Technologies (ICQNM 2008) | 2008

Secure Message Relay over Networks with QKD-Links

Stefan Rass; Mohammed Ali Sfaxi; Solange Ghernaouti-Hélie; Kyandoghere Kyamakya

This paper presents extensions to the classical point- to-point protocol PPP [RFC1661] and IPSEC [RFC 2401] in order to build networks that can do unconditionally secure message relay. Our work addresses the problem of how to integrate quantum key distribution (QKD) in networks such that little effort needs to be put on protocol engine adaption and network topology design. This article demonstrates how to ensure correct routing and secure authentication between adjacent QKD-capable nodes, in particular, it is demonstrated how a person-in-the-middle attack can be countered using universal hash functions.


availability, reliability and security | 2009

An Inclusive Information Society Needs a Global Approach of Information Security

Solange Ghernaouti-Hélie

The information economy and the information society heavily depend on information security. Developing an inclusive and reliable information society should avoid any infrastructure or security divides. To master information related risks and cyberthreats, and to bring effective information security solutions to the end-users, a global and interdisciplinary approach is required. This paper considers information security issues in a holistic way, putting the individual and the question of responsibility at the core of the debate. It also points out main stakes and challenges that governments have to face when developing a national cybersecurity policy, curriculum and culture in regards of local and international needs.


international conference on internet monitoring and protection | 2008

Efficient Security Measurements and Metrics for Risk Assessment

Igli Tashi; Solange Ghernaouti-Hélie

An efficient IT security management relies upon the ability to make a good compromise between the cost of security countermeasures to be implemented, and the reality of informational risks an organization have to face. In fact, it concerns the capacity of an IT security manager to make decisions in a dynamic and complex environment. Even a well-experienced manager needs reliable tools to optimize the decision making process. The aim of this paper is to propose some relevant metrics and measurements in order to facilitate the decision making and to improve performance and accountability in security measures and procedures. We propose an approach to obtain some meaningful and useful metrics and measurements, to assess the Information Security Preparedness Level in a continuing improvement scope.


Archive | 1998

Services and Applications

Solange Ghernaouti-Hélie; Arnaud Dufour

The aim of this chapter is to present the principal applications supported by enterprise local networks. Using a functional approach we will answer the question: “what is the local network for?”


advanced information networking and applications | 2011

Optimizing Security Efficiency through Effective Risk Management

Solange Ghernaouti-Hélie; Igli Tashi; David Simms

Security measures taken in isolation and without reference to a concrete and relevant assessment and evaluation of actual risks are doomed to be inefficient. At best they do not address the real issues facing an organization and simply waste resources, at worst they provide management with inappropriate comfort over the level of security management that is in place. This paper reviews the key points of some relevant international standards, discusses the links between effective risk management and optimized security measures, and provides a case study illustrating the benefits to be obtained from a structured and integrated approach.


availability, reliability and security | 2009

A Security Management Assurance Model to Holistically Assess the Information Security Posture

Igli Tashi; Solange Ghernaouti-Hélie

Managing information security within an organization is becoming a very complex task. The information security posture assessment is performed by using frameworks, methodologies or standards considering the subject separately. The model proposed within the paper aims to holistically consider all the security dimension. This is because the security level is as strong as the weakest link is. In order to minimize the likelihood that a given threat takes advantage of the weakest link a formalized structure taking into account all security elements is needed. The proposed model is based on and integrates some security best practices and standards in order to define an assured Information Security Categorization. From this point, an assessment process should be performed, giving the evidence that the information security within a given organization, is thoroughly managed.


Archive | 1998

Computer Telephony Integration (CTI)

Solange Ghernaouti-Hélie; Arnaud Dufour

The problems associated with the integration of local networks and PBX are part of the general problem of technical evolution. The two tendencies concerned are shown in Figure 9.1.

Collaboration


Dive into the Solange Ghernaouti-Hélie's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Igli Tashi

University of Lausanne

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

David Simms

University of Lausanne

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kyandoghere Kyamakya

Alpen-Adria-Universität Klagenfurt

View shared research outputs
Researchain Logo
Decentralizing Knowledge