Michel RIVEILL | Université Nice Sophia Antipolis (original) (raw)

Papers by Michel RIVEILL

Research paper thumbnail of Supporting micro-services deployment in a safer way

The SOA ecosystem has drastically evolved since its childhood in the early 2000s. From monolithic... more The SOA ecosystem has drastically evolved since its childhood in the early 2000s. From monolithic services, micro-services now cooperate together in ultra-large scale systems. In this context, there is a tremendous need to deploy frequently new services, or new version of existing services. Container-based technologies (e.g., Docker) emerged recently to tool such deployments, promoting a black-box reuse mechanism to support off-the-shelf deployments. Unfortunately, from the service deployment point of view, such form of black-box reuse prevent to ensure what is really shipped inside the container with the service to deploy. In this paper, we propose a formalism to model and statically analyze service deployment artifacts based on state of the art deployment platforms. The static analysis mechanism leverages the hierarchy of deployment descriptors to verify a given deployment, as well as rewrite it to automatically fix common errors. The approach is validated through the automation of the guidelines provided by the user community associated to the reference Docker engine, and the analysis of 20,000 real deployment descriptors (hosted on GitHub).

Research paper thumbnail of A multi-layer architecture for high available Enterprise JavaBeans

Anais do III Workshop de Testes e Tolerância a Falhas (WTF 2002)

EJB (Enterprise JavaBeans) spec does not describe high availability as one of its properties. If ... more EJB (Enterprise JavaBeans) spec does not describe high availability as one of its properties. If the application server fails, the service remains unavailable while it recovers. Some EJB server vendors claim to provide this desirable property implementing server replicas through centralized protocols. Unfortunately, these protocols could lead to an unavailable service if the coordinator server crashes. We are presenting a new architecture aiming high available EJB servers based on distributed concepts. Our replicas are modeled as state machines synchronized by group communication primitives. We achieve high availability to EJB application servers running stateful and stateless session beans.

Research paper thumbnail of Multiple Inputs Neural Networks for Fraud Detection

2022 International Conference on Machine Learning, Control, and Robotics (MLCR)

Research paper thumbnail of Autoregressive based Drift Detection Method

2022 International Joint Conference on Neural Networks (IJCNN)

Research paper thumbnail of Communication-efficient Federated Learning through Clustering optimization

HAL (Le Centre pour la Communication Scientifique Directe), Nov 17, 2021

Research paper thumbnail of Supporting micro-services deployment in a safer way

Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Research paper thumbnail of What Do You Think About Your Company’s Leaks? A Survey on End-Users Perception Toward Data Leakage Mechanisms

Frontiers in Big Data, 2020

Data leakage can lead to severe issues for a company, including financial loss, damage of goodwil... more Data leakage can lead to severe issues for a company, including financial loss, damage of goodwill, reputation, lawsuits and loss of future sales. To prevent these problems, a company can use other mechanisms on top of traditional Access Control. These mechanisms include for instance Data Leak Prevention or Information Rights Management and can be referred as Transmission Control. However, such solutions can lack usability and can be intrusive for end-users employees. To have a better understanding of the perception and usage of such mechanisms within business infrastructures, we have conducted in this article an online survey on 150 employees. These employees come from different companies of different sizes and sectors of activity. The results show that whatever the size of the company or its sector of activity, security mechanisms such as access control and transmission control can be considered as quite intrusive and blocking for employees. Moreover, our survey also shows interes...

Research paper thumbnail of Context-aware Authorisation in Highly Dynamic Environments

Research paper thumbnail of Résolution des interférences entre les adaptations par transformations de graphes

Research paper thumbnail of A Dynamic mechanism for solving Interference Adaptation in Ubiquitous Computing Environment

Research paper thumbnail of A low-energy consuming and user-centric security management architecture adapted to mobile environments

12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, 2011

... [3] N. Nobelis, K. Boudaoud, M. Kamel, M. Riveill, "A user-centric approach for secu... more ... [3] N. Nobelis, K. Boudaoud, M. Kamel, M. Riveill, "A user-centric approach for secure communication protocols". ... Proc. of the IEEE, Vol. 94, February 2006. [16] A. Benameur et aI., SERENITY project, Deliverable W A7.D3.1-S&D Architecture Specification, May 2007. 725

Research paper thumbnail of Designing Security Protocols Adapted to the Constraints of Mobile Environments

2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2010

Research paper thumbnail of Construction and management of cooperative distributed applications with OLAN

Proceedings of International Workshop on Object Orientation in Operating Systems, 1995

Research paper thumbnail of Design and Implementation of Object-Oriented Spatial Views

Research paper thumbnail of Validation and Verification of an UML/OCL Model with USE and B: Case Study and Lessons Learnt

2008 IEEE International Conference on Software Testing Verification and Validation Workshop, 2008

Runtime adaptations of applications generate new risks of bugs and unpredicted interactions that ... more Runtime adaptations of applications generate new risks of bugs and unpredicted interactions that may lead the application execution to an unsafe state. Although execution supports are enough mature to implement such adaptation mechanisms, there is still a lack of formal foundations to support such a process. Our work consists in adopting a Model Driven Engineering approach to express adaptation safety

Research paper thumbnail of Securing Mobile Mashups with SCCM

2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013

ABSTRACT Today, creation of basic mobile widget mashups is a straightforward task. However, desig... more ABSTRACT Today, creation of basic mobile widget mashups is a straightforward task. However, designing mobile mashups that are actually secure to use remains very challenging. In this paper, we discuss the security risks introduced by mobile mashups and then propose a platform independent architecture called SCCM for securing this type of mashups. SCCM has been implemented on an Android platform, and the results of our security evaluations are encouraging.

Research paper thumbnail of Cascaded Aspects of Assembly for ubiquitous computing

2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 2012

Research paper thumbnail of Abstracting object interactions using composition filters

Lecture Notes in Computer Science

Research paper thumbnail of A Low-energy Consuming and Component-based Security Management Architecture for Mobile Devices

Security and Management, 2010

Research paper thumbnail of System services for distributed application configuration

Proceedings. Fourth International Conference on Configurable Distributed Systems (Cat. No.98EX159)

Research paper thumbnail of Supporting micro-services deployment in a safer way

The SOA ecosystem has drastically evolved since its childhood in the early 2000s. From monolithic... more The SOA ecosystem has drastically evolved since its childhood in the early 2000s. From monolithic services, micro-services now cooperate together in ultra-large scale systems. In this context, there is a tremendous need to deploy frequently new services, or new version of existing services. Container-based technologies (e.g., Docker) emerged recently to tool such deployments, promoting a black-box reuse mechanism to support off-the-shelf deployments. Unfortunately, from the service deployment point of view, such form of black-box reuse prevent to ensure what is really shipped inside the container with the service to deploy. In this paper, we propose a formalism to model and statically analyze service deployment artifacts based on state of the art deployment platforms. The static analysis mechanism leverages the hierarchy of deployment descriptors to verify a given deployment, as well as rewrite it to automatically fix common errors. The approach is validated through the automation of the guidelines provided by the user community associated to the reference Docker engine, and the analysis of 20,000 real deployment descriptors (hosted on GitHub).

Research paper thumbnail of A multi-layer architecture for high available Enterprise JavaBeans

Anais do III Workshop de Testes e Tolerância a Falhas (WTF 2002)

EJB (Enterprise JavaBeans) spec does not describe high availability as one of its properties. If ... more EJB (Enterprise JavaBeans) spec does not describe high availability as one of its properties. If the application server fails, the service remains unavailable while it recovers. Some EJB server vendors claim to provide this desirable property implementing server replicas through centralized protocols. Unfortunately, these protocols could lead to an unavailable service if the coordinator server crashes. We are presenting a new architecture aiming high available EJB servers based on distributed concepts. Our replicas are modeled as state machines synchronized by group communication primitives. We achieve high availability to EJB application servers running stateful and stateless session beans.

Research paper thumbnail of Multiple Inputs Neural Networks for Fraud Detection

2022 International Conference on Machine Learning, Control, and Robotics (MLCR)

Research paper thumbnail of Autoregressive based Drift Detection Method

2022 International Joint Conference on Neural Networks (IJCNN)

Research paper thumbnail of Communication-efficient Federated Learning through Clustering optimization

HAL (Le Centre pour la Communication Scientifique Directe), Nov 17, 2021

Research paper thumbnail of Supporting micro-services deployment in a safer way

Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Research paper thumbnail of What Do You Think About Your Company’s Leaks? A Survey on End-Users Perception Toward Data Leakage Mechanisms

Frontiers in Big Data, 2020

Data leakage can lead to severe issues for a company, including financial loss, damage of goodwil... more Data leakage can lead to severe issues for a company, including financial loss, damage of goodwill, reputation, lawsuits and loss of future sales. To prevent these problems, a company can use other mechanisms on top of traditional Access Control. These mechanisms include for instance Data Leak Prevention or Information Rights Management and can be referred as Transmission Control. However, such solutions can lack usability and can be intrusive for end-users employees. To have a better understanding of the perception and usage of such mechanisms within business infrastructures, we have conducted in this article an online survey on 150 employees. These employees come from different companies of different sizes and sectors of activity. The results show that whatever the size of the company or its sector of activity, security mechanisms such as access control and transmission control can be considered as quite intrusive and blocking for employees. Moreover, our survey also shows interes...

Research paper thumbnail of Context-aware Authorisation in Highly Dynamic Environments

Research paper thumbnail of Résolution des interférences entre les adaptations par transformations de graphes

Research paper thumbnail of A Dynamic mechanism for solving Interference Adaptation in Ubiquitous Computing Environment

Research paper thumbnail of A low-energy consuming and user-centric security management architecture adapted to mobile environments

12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, 2011

... [3] N. Nobelis, K. Boudaoud, M. Kamel, M. Riveill, "A user-centric approach for secu... more ... [3] N. Nobelis, K. Boudaoud, M. Kamel, M. Riveill, "A user-centric approach for secure communication protocols". ... Proc. of the IEEE, Vol. 94, February 2006. [16] A. Benameur et aI., SERENITY project, Deliverable W A7.D3.1-S&D Architecture Specification, May 2007. 725

Research paper thumbnail of Designing Security Protocols Adapted to the Constraints of Mobile Environments

2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2010

Research paper thumbnail of Construction and management of cooperative distributed applications with OLAN

Proceedings of International Workshop on Object Orientation in Operating Systems, 1995

Research paper thumbnail of Design and Implementation of Object-Oriented Spatial Views

Research paper thumbnail of Validation and Verification of an UML/OCL Model with USE and B: Case Study and Lessons Learnt

2008 IEEE International Conference on Software Testing Verification and Validation Workshop, 2008

Runtime adaptations of applications generate new risks of bugs and unpredicted interactions that ... more Runtime adaptations of applications generate new risks of bugs and unpredicted interactions that may lead the application execution to an unsafe state. Although execution supports are enough mature to implement such adaptation mechanisms, there is still a lack of formal foundations to support such a process. Our work consists in adopting a Model Driven Engineering approach to express adaptation safety

Research paper thumbnail of Securing Mobile Mashups with SCCM

2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013

ABSTRACT Today, creation of basic mobile widget mashups is a straightforward task. However, desig... more ABSTRACT Today, creation of basic mobile widget mashups is a straightforward task. However, designing mobile mashups that are actually secure to use remains very challenging. In this paper, we discuss the security risks introduced by mobile mashups and then propose a platform independent architecture called SCCM for securing this type of mashups. SCCM has been implemented on an Android platform, and the results of our security evaluations are encouraging.

Research paper thumbnail of Cascaded Aspects of Assembly for ubiquitous computing

2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 2012

Research paper thumbnail of Abstracting object interactions using composition filters

Lecture Notes in Computer Science

Research paper thumbnail of A Low-energy Consuming and Component-based Security Management Architecture for Mobile Devices

Security and Management, 2010

Research paper thumbnail of System services for distributed application configuration

Proceedings. Fourth International Conference on Configurable Distributed Systems (Cat. No.98EX159)