Michel RIVEILL | Université Nice Sophia Antipolis (original) (raw)
Papers by Michel RIVEILL
The SOA ecosystem has drastically evolved since its childhood in the early 2000s. From monolithic... more The SOA ecosystem has drastically evolved since its childhood in the early 2000s. From monolithic services, micro-services now cooperate together in ultra-large scale systems. In this context, there is a tremendous need to deploy frequently new services, or new version of existing services. Container-based technologies (e.g., Docker) emerged recently to tool such deployments, promoting a black-box reuse mechanism to support off-the-shelf deployments. Unfortunately, from the service deployment point of view, such form of black-box reuse prevent to ensure what is really shipped inside the container with the service to deploy. In this paper, we propose a formalism to model and statically analyze service deployment artifacts based on state of the art deployment platforms. The static analysis mechanism leverages the hierarchy of deployment descriptors to verify a given deployment, as well as rewrite it to automatically fix common errors. The approach is validated through the automation of the guidelines provided by the user community associated to the reference Docker engine, and the analysis of 20,000 real deployment descriptors (hosted on GitHub).
Anais do III Workshop de Testes e Tolerância a Falhas (WTF 2002)
EJB (Enterprise JavaBeans) spec does not describe high availability as one of its properties. If ... more EJB (Enterprise JavaBeans) spec does not describe high availability as one of its properties. If the application server fails, the service remains unavailable while it recovers. Some EJB server vendors claim to provide this desirable property implementing server replicas through centralized protocols. Unfortunately, these protocols could lead to an unavailable service if the coordinator server crashes. We are presenting a new architecture aiming high available EJB servers based on distributed concepts. Our replicas are modeled as state machines synchronized by group communication primitives. We achieve high availability to EJB application servers running stateful and stateless session beans.
2022 International Conference on Machine Learning, Control, and Robotics (MLCR)
2022 International Joint Conference on Neural Networks (IJCNN)
HAL (Le Centre pour la Communication Scientifique Directe), Nov 17, 2021
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Frontiers in Big Data, 2020
Data leakage can lead to severe issues for a company, including financial loss, damage of goodwil... more Data leakage can lead to severe issues for a company, including financial loss, damage of goodwill, reputation, lawsuits and loss of future sales. To prevent these problems, a company can use other mechanisms on top of traditional Access Control. These mechanisms include for instance Data Leak Prevention or Information Rights Management and can be referred as Transmission Control. However, such solutions can lack usability and can be intrusive for end-users employees. To have a better understanding of the perception and usage of such mechanisms within business infrastructures, we have conducted in this article an online survey on 150 employees. These employees come from different companies of different sizes and sectors of activity. The results show that whatever the size of the company or its sector of activity, security mechanisms such as access control and transmission control can be considered as quite intrusive and blocking for employees. Moreover, our survey also shows interes...
12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, 2011
... [3] N. Nobelis, K. Boudaoud, M. Kamel, M. Riveill, "A user-centric approach for secu... more ... [3] N. Nobelis, K. Boudaoud, M. Kamel, M. Riveill, "A user-centric approach for secure communication protocols". ... Proc. of the IEEE, Vol. 94, February 2006. [16] A. Benameur et aI., SERENITY project, Deliverable W A7.D3.1-S&D Architecture Specification, May 2007. 725
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of International Workshop on Object Orientation in Operating Systems, 1995
2008 IEEE International Conference on Software Testing Verification and Validation Workshop, 2008
Runtime adaptations of applications generate new risks of bugs and unpredicted interactions that ... more Runtime adaptations of applications generate new risks of bugs and unpredicted interactions that may lead the application execution to an unsafe state. Although execution supports are enough mature to implement such adaptation mechanisms, there is still a lack of formal foundations to support such a process. Our work consists in adopting a Model Driven Engineering approach to express adaptation safety
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013
ABSTRACT Today, creation of basic mobile widget mashups is a straightforward task. However, desig... more ABSTRACT Today, creation of basic mobile widget mashups is a straightforward task. However, designing mobile mashups that are actually secure to use remains very challenging. In this paper, we discuss the security risks introduced by mobile mashups and then propose a platform independent architecture called SCCM for securing this type of mashups. SCCM has been implemented on an Android platform, and the results of our security evaluations are encouraging.
2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 2012
Lecture Notes in Computer Science
Security and Management, 2010
Proceedings. Fourth International Conference on Configurable Distributed Systems (Cat. No.98EX159)
The SOA ecosystem has drastically evolved since its childhood in the early 2000s. From monolithic... more The SOA ecosystem has drastically evolved since its childhood in the early 2000s. From monolithic services, micro-services now cooperate together in ultra-large scale systems. In this context, there is a tremendous need to deploy frequently new services, or new version of existing services. Container-based technologies (e.g., Docker) emerged recently to tool such deployments, promoting a black-box reuse mechanism to support off-the-shelf deployments. Unfortunately, from the service deployment point of view, such form of black-box reuse prevent to ensure what is really shipped inside the container with the service to deploy. In this paper, we propose a formalism to model and statically analyze service deployment artifacts based on state of the art deployment platforms. The static analysis mechanism leverages the hierarchy of deployment descriptors to verify a given deployment, as well as rewrite it to automatically fix common errors. The approach is validated through the automation of the guidelines provided by the user community associated to the reference Docker engine, and the analysis of 20,000 real deployment descriptors (hosted on GitHub).
Anais do III Workshop de Testes e Tolerância a Falhas (WTF 2002)
EJB (Enterprise JavaBeans) spec does not describe high availability as one of its properties. If ... more EJB (Enterprise JavaBeans) spec does not describe high availability as one of its properties. If the application server fails, the service remains unavailable while it recovers. Some EJB server vendors claim to provide this desirable property implementing server replicas through centralized protocols. Unfortunately, these protocols could lead to an unavailable service if the coordinator server crashes. We are presenting a new architecture aiming high available EJB servers based on distributed concepts. Our replicas are modeled as state machines synchronized by group communication primitives. We achieve high availability to EJB application servers running stateful and stateless session beans.
2022 International Conference on Machine Learning, Control, and Robotics (MLCR)
2022 International Joint Conference on Neural Networks (IJCNN)
HAL (Le Centre pour la Communication Scientifique Directe), Nov 17, 2021
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Frontiers in Big Data, 2020
Data leakage can lead to severe issues for a company, including financial loss, damage of goodwil... more Data leakage can lead to severe issues for a company, including financial loss, damage of goodwill, reputation, lawsuits and loss of future sales. To prevent these problems, a company can use other mechanisms on top of traditional Access Control. These mechanisms include for instance Data Leak Prevention or Information Rights Management and can be referred as Transmission Control. However, such solutions can lack usability and can be intrusive for end-users employees. To have a better understanding of the perception and usage of such mechanisms within business infrastructures, we have conducted in this article an online survey on 150 employees. These employees come from different companies of different sizes and sectors of activity. The results show that whatever the size of the company or its sector of activity, security mechanisms such as access control and transmission control can be considered as quite intrusive and blocking for employees. Moreover, our survey also shows interes...
12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, 2011
... [3] N. Nobelis, K. Boudaoud, M. Kamel, M. Riveill, "A user-centric approach for secu... more ... [3] N. Nobelis, K. Boudaoud, M. Kamel, M. Riveill, "A user-centric approach for secure communication protocols". ... Proc. of the IEEE, Vol. 94, February 2006. [16] A. Benameur et aI., SERENITY project, Deliverable W A7.D3.1-S&D Architecture Specification, May 2007. 725
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of International Workshop on Object Orientation in Operating Systems, 1995
2008 IEEE International Conference on Software Testing Verification and Validation Workshop, 2008
Runtime adaptations of applications generate new risks of bugs and unpredicted interactions that ... more Runtime adaptations of applications generate new risks of bugs and unpredicted interactions that may lead the application execution to an unsafe state. Although execution supports are enough mature to implement such adaptation mechanisms, there is still a lack of formal foundations to support such a process. Our work consists in adopting a Model Driven Engineering approach to express adaptation safety
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013
ABSTRACT Today, creation of basic mobile widget mashups is a straightforward task. However, desig... more ABSTRACT Today, creation of basic mobile widget mashups is a straightforward task. However, designing mobile mashups that are actually secure to use remains very challenging. In this paper, we discuss the security risks introduced by mobile mashups and then propose a platform independent architecture called SCCM for securing this type of mashups. SCCM has been implemented on an Android platform, and the results of our security evaluations are encouraging.
2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 2012
Lecture Notes in Computer Science
Security and Management, 2010
Proceedings. Fourth International Conference on Configurable Distributed Systems (Cat. No.98EX159)