53 résultats

  • Présentation des fondamentaux du management du risque et d’EBIOS Risk Manager

    • 29 novembre 2019

    • Inria Center of the University of Rennes - -Petri/Turing room

    Orateur : Vincent Loriot (ANSSI)

    Résumé :a. Présentation ANSSIb. Tendances de la menace cyber et démarche pour s’en protégerc. Fondamentaux de la méthode EBIOS Risk ManagerLa présentation théorique sera complétée avec un atelier pratique couvrant les sujets suivants :a. Les besoins et enjeux de sécuritéb. Les couples Source de Risque / Objectif Viséc. La cartographie de menace de l’écosystème 
  • La protection des flux en télévision numérique

    • 22 novembre 2019

    • Inria Center of the University of Rennes - -Petri/Turing room

    Orateur : Eric Desmicht (DGA)

    En télévision numérique, des flux numériques comportant de la vidéo sont mis à la disposition des utilisateurs via différents média (cable, satellite, TNT, IP…) et différentes techniques (broadcast, multicast, unicast, support numérique…). Pour garantir les revenus des opérateurs de télévision à péage proposant des contenus à forte valeur ajoutée, il est essentiel que seuls les consommateurs ayant[…]
  • Subject Access Request and Proof of Ownership

    • 25 octobre 2019

    • Inria Center of the University of Rennes - -Petri/Turing room

    Orateur : Cédric Lauradoux (INRIA Rhône-Alpes)

    The GDPR (General Data Protection Regulation) provides rights on our data: access, rectification, objection, etc. However, this regulation is not binding on how we can exercise these rights. Data controllers have therefore deployed various methods to authenticate subject requests. We have analyzed how this authentication process can fail and examined its consequences. Our study shows that a key[…]
  • A Formal Analysis of 5G Authentication

    • 03 juin 2019

    • Inria Center of the University of Rennes - -Petri/Turing room

    Orateur : Sasa Radomirovic (University of Dundee)

    Mobile communication networks connect much of the world’s population. The security of users’ calls, text messages, and mobile data depends on the guarantees provided by the Authenticated Key Exchange protocols used. For the next-generation network (5G), the 3GPP group has standardized the 5G AKA protocol for this purpose.In this talk, I will report on our formalization of the 5G standard’s AKA[…]
  • Voting : You Can’t Have Privacy without Individual Verifiability

    • 01 mars 2019

    • Inria Center of the University of Rennes - -Petri/Turing room

    Orateur : Joseph Lallemand (Loria)

    Electronic voting typically aims at two main security goals: vote privacy and verifiability. These two goals are often seen as antagonistic and some national agencies even impose a hierarchy between them: first privacy, and then verifiability as an additional feature. Verifiability typically includes individual verifiability (a voter can check that her ballot is counted); universal verifiability […]
  • A Compositional and Complete approach to Verifying Privacy Properties using the Applied Pi-calculus

    • 08 février 2019

    • Inria Center of the University of Rennes - -Petri/Turing room

    Orateur : Ross Horne (University of Luxembourg)

    The pi-calculus was introduced for verifying cryptographic protocols by Abadi and Fournet in 2001. They proposed an equivalence technique, called bisimilarity, useful for verify privacy properties. It is widely acknowledged (cf. Paige and Tarjan 1987), that bisimilarity is more efficient to check than trace equivalence; however, surprisingly, tools based on the applied pi-calculus typically still[…]