Charleroi, Belgium
Charleroi, Belgium
Time filter
Source Type

Kritikos K.,ICS FORTH | Kirkham T.,STFC | Kryza B.,AGH University of Science and Technology | Massonet P.,CETIC
Future Generation Computer Systems | Year: 2017

Multi-cloud adaptive application provisioning can solve the vendor lock-in problem and allows optimising user requirements by selecting the best from the multitude of services offered by different cloud providers. To this end, such provisioning type is increasingly supported by new or existing research prototypes and platforms. One major concern, actually preventing users from moving to the cloud, comes with respect to security, which becomes more complex in multi-cloud settings. Such a concern spans two main aspects: (a) suitable access control on user personal data, VMs and platform services and (b) planning and adapting application deployments based on security requirements. As such, this paper addresses both security aspects by proposing a novel model-driven approach and architecture which secures multi-cloud platforms, enables users to have their own private space and guarantees that application deployments are not only constructed based on but can also maintain a certain user-required security level. Such a solution exploits state-of-the-art security standards, security software and secure model management technology. Moreover, it covers different access control scenarios involving external, web-based and programmatic user authentication. © 2016 Elsevier B.V.

Sellami R.,CETIC | Ahmed-Nacer M.,Orange S.A. | Ahmed-Nacer M.,University of Science and Technology Houari Boumediene | Mouton S.,CETIC
CLOSER 2017 - Proceedings of the 7th International Conference on Cloud Computing and Services Science | Year: 2017

Cloud computing has recently attracted full attention of many organizations due to its economic, business and technical benefits. Indeed, we observe that the proliferation of offers by cloud providers raises several challenges. One of these innovative challenges is applications deployment in multiple PaaS providers. In fact, developers need to provision components of the same application across multiple PaaS depending on their related requirements and PaaS capabilities. They will not only have to deploy their applications, but they will also have to consider migrating services from one PaaS to another, and to manage distributed applications spanning multiple environments. In this paper, we present and discuss the requirements of applications deployment in multiple PaaS providers and we analyze current state of the art. ©2017 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.

Massonet P.,CETIC | Sheridan C.,Flexiant
Communications in Computer and Information Science | Year: 2016

Cloud federation enables cloud providers to collaborate and share their resources to create a large virtual pool of resources at multiple network locations. Different types of federation architectures for clouds and datacenters have been proposed and implemented. An effective, agile and secure federation of cloud networking resources is key to impact the deployment of federated applications. The main goal of this project is two-fold: research and develop techniques to federate cloud network resources, and to derive the integrated management cloud layer that enables an efficient and secure deployment of federated cloud applications. © Springer International Publishing Switzerland 2016.

Achour A.,CETIC | Deru L.,CETIC | Deprez J.C.,CETIC
Procedia Computer Science | Year: 2015

The advent of the Internet of Things where billions of devices are able to exchange their data to give a better control to users on their environment has led to the expansion of Wireless Sensor Networks (WSN). To address the specificities of WSN, standards on networking protocols for low power sensors such as 6LoWPAN have been developed. While 6LoWPAN is well suited to fixedsensor WSN, it must be extended to better address mobile sensors. However, so far little effort has been devoted to the handling of mobile sensor node peculiarities. In this article, generic mobility scenarios are highlighted, existing mobility solutions based in Mobile IPv6 are reviewed and remaining challenges to handle mobile sensors properly are identified. © 2015 The Authors. Published by Elsevier B.V.

Kumaran S.,University of Kigali | Nsenga J.,CETIC
Advances in Intelligent Systems and Computing | Year: 2016

Remote healthcare centers located in sub-Saharan of Africa are still facing a shortage of healthcare practitioners, yielding long queue of patients in waiting rooms during several hours. This situation increases the risk that critical patients are consulted too late, motivating the importance of priority-based patient scheduling systems. This paper presents the design of a Multi-Priority Triage Chair (MPTC) to be installed at the entrance of patient's waiting rooms such that each new patient first sits in the MPTC to measure its vital signs and register his/her other priority parameters such as arrival time, travel time or distance between the concerned center and its home, and so on. The proposed MPTC will then update in real-time the consultation planning in order to statistically minimize (i) the number of critical patients not treated within a pre-defined waiting time, (ii) the number of patients waiting for more than a pre-defined period and (iii) the number of patients living relatively far who gets their consultation postponed to another day. © Springer International Publishing AG 2016.

Viseur R.,CETIC | Viseur R.,University of Mons
CLOSER 2016 - Proceedings of the 6th International Conference on Cloud Computing and Services Science | Year: 2016

Cloud computing and open source are two disruptive innovations. Both deeply modify the way the computer resources are made available and monetized. They evolve between competition (e.g. open source software for desktop versus SaaS applications) and complementarity (e.g. cloud solutions based on open source components or cloud applications published under open source license). PaaSage is an open source integrated platform to support both design and deployment of cloud applications. The PaaSage consortium decided to publish the source code as open source. It needed a process for the open source license selection. Open source licensing scheme born before the development of cloud computing and evolved with the creation of new open source licenses suitable for SaaS applications. The license is a part of project governance and strongly influences the life of the project. In the context of the PaaSage European project, the issue of the open source license selection for cloud computing software has been addressed. The first section of the paper describes the state of the art about open source licenses including the known issues, a generic license-selection scheme and the automated source code analysis practices. The second section studies the common choices of licenses in cloud computing projects. The third section proposes a FLOSS license-selection process for cloud computing project following five steps: (1) inventoring software components, (2) selecting open source license, (3) approving license selection (vote), (4) spreading practical details and (5) monitoring source code. The fourth section describes the PaaSage use case. The last section consists in a discussion of the results. Copyright © 2016 by SCITEPRESS-Science and Technology Publications, Lda. All rights reserved.

Viseur R.,CETIC | Viseur R.,University of Mons
INFORSID 2016 - Actes du 8e Forum Jeunes Chercheurs du Congres INFORSID | Year: 2016

The open source software are used by the majority of companies; some of them do not hesitate to play a leading role in their development. These practices result in challenges related to the governance of information systems and open source projects. The fork, as division of a community, can be the serious consequence of poor governance. After a state of the art dedicated to the concepts of open source governance and fork, we propose two sets of case studies, the first ones about major projects discussed in the scientific literature, the second ones about a set of forks. On this basis, we develop various ways to limit the risk of forks, identify four logics of open source governance, discuss the interest of inner source strategies to organize a transition between proprietary and open source strategies, show similarities in terms of needs in governance between open source software and open source innovation projects, and further stress the impact of the governance on competition.

Kritikos K.,ICS FORTH | Massonet P.,CETIC
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2016

Multi-cloud application management can optimize the provisioning of cloud-based applications by exploiting whole variety of services offered by cloud providers and avoiding vendor lock-in. To enable such management, model-driven approaches promise to partially automate the provisioning process. However, such approaches tend to neglect security aspects and focus only on low-level infrastructure details or quality of service aspects. As such, our previous work proposed a security meta-model, bridging the gap between high- and low-level security requirements and capabilities, able to express security models exploited by a planning algorithm to derive an optimal application deployment plan by considering both types of security requirements. This work goes one step further by focusing on runtime adaptation of multi-cloud applications based on security aspects. It advocates using adaptation rules, expressed in the event-condition-action form, which drive application adaptation behaviour and enable assuring a more-or-less stable security level. Firing such rules relies on deploying security metrics and adaptation code in the cloud to continuously monitor rule event conditions and fire adaptation actions for applications when the need arises. © Springer International Publishing Switzerland 2016.

Viseur R.,CETIC | Viseur R.,University of Mons
31st INFORSID 2013 | Year: 2013

Using the content of Wikipedia articles is common in academic research. However the practicalities are rarely analyzed. Our research focuses on extracting biographical information about personalities from Belgium. Our research is organized into three sections. The first section provides a state of the art for data retrieval in Wikipedia. A second section presents the case study about data mining for biographical Belgian personalities. Different solutions are discussed and the adopted solution is implemented. In the third section, the quality of the extraction is discussed. Practical recommendations for researchers wishing to use Wikipedia are also proposed on the basis of our case study. Copyright © (2013) by INFORSID.

Viseur R.,CETIC | Viseur R.,University of Mons
DATA 2015 - 4th International Conference on Data Management Technologies and Applications, Proceedings | Year: 2015

The term "open data" refers to information that has been made technically and legally available for reuse. In our research, we focus on the particular case of open research data. We conducted a literature review in order to determine what are the motivations to release open research data and what are the issues related to the development of open research data. Our research allowed to identify seven motivations for researchers to open research data and discuss seven issues. The paper highlights the lack of dedicated data infrastructure and the need for developing the researcher's ability to animate online communities.

Loading CETIC collaborators
Loading CETIC collaborators