Charleroi, Belgium
Charleroi, Belgium

Time filter

Source Type

Massonet P.,CETIC | Sheridan C.,Flexiant
Communications in Computer and Information Science | Year: 2016

Cloud federation enables cloud providers to collaborate and share their resources to create a large virtual pool of resources at multiple network locations. Different types of federation architectures for clouds and datacenters have been proposed and implemented. An effective, agile and secure federation of cloud networking resources is key to impact the deployment of federated applications. The main goal of this project is two-fold: research and develop techniques to federate cloud network resources, and to derive the integrated management cloud layer that enables an efficient and secure deployment of federated cloud applications. © Springer International Publishing Switzerland 2016.

Achour A.,CETIC | Deru L.,CETIC | Deprez J.C.,CETIC
Procedia Computer Science | Year: 2015

The advent of the Internet of Things where billions of devices are able to exchange their data to give a better control to users on their environment has led to the expansion of Wireless Sensor Networks (WSN). To address the specificities of WSN, standards on networking protocols for low power sensors such as 6LoWPAN have been developed. While 6LoWPAN is well suited to fixedsensor WSN, it must be extended to better address mobile sensors. However, so far little effort has been devoted to the handling of mobile sensor node peculiarities. In this article, generic mobility scenarios are highlighted, existing mobility solutions based in Mobile IPv6 are reviewed and remaining challenges to handle mobile sensors properly are identified. © 2015 The Authors. Published by Elsevier B.V.

Kumaran S.,University of Kigali | Nsenga J.,CETIC
Advances in Intelligent Systems and Computing | Year: 2016

Remote healthcare centers located in sub-Saharan of Africa are still facing a shortage of healthcare practitioners, yielding long queue of patients in waiting rooms during several hours. This situation increases the risk that critical patients are consulted too late, motivating the importance of priority-based patient scheduling systems. This paper presents the design of a Multi-Priority Triage Chair (MPTC) to be installed at the entrance of patient's waiting rooms such that each new patient first sits in the MPTC to measure its vital signs and register his/her other priority parameters such as arrival time, travel time or distance between the concerned center and its home, and so on. The proposed MPTC will then update in real-time the consultation planning in order to statistically minimize (i) the number of critical patients not treated within a pre-defined waiting time, (ii) the number of patients waiting for more than a pre-defined period and (iii) the number of patients living relatively far who gets their consultation postponed to another day. © Springer International Publishing AG 2016.

Viseur R.,CETIC | Viseur R.,University of Mons
CLOSER 2016 - Proceedings of the 6th International Conference on Cloud Computing and Services Science | Year: 2016

Cloud computing and open source are two disruptive innovations. Both deeply modify the way the computer resources are made available and monetized. They evolve between competition (e.g. open source software for desktop versus SaaS applications) and complementarity (e.g. cloud solutions based on open source components or cloud applications published under open source license). PaaSage is an open source integrated platform to support both design and deployment of cloud applications. The PaaSage consortium decided to publish the source code as open source. It needed a process for the open source license selection. Open source licensing scheme born before the development of cloud computing and evolved with the creation of new open source licenses suitable for SaaS applications. The license is a part of project governance and strongly influences the life of the project. In the context of the PaaSage European project, the issue of the open source license selection for cloud computing software has been addressed. The first section of the paper describes the state of the art about open source licenses including the known issues, a generic license-selection scheme and the automated source code analysis practices. The second section studies the common choices of licenses in cloud computing projects. The third section proposes a FLOSS license-selection process for cloud computing project following five steps: (1) inventoring software components, (2) selecting open source license, (3) approving license selection (vote), (4) spreading practical details and (5) monitoring source code. The fourth section describes the PaaSage use case. The last section consists in a discussion of the results. Copyright © 2016 by SCITEPRESS-Science and Technology Publications, Lda. All rights reserved.

Viseur R.,CETIC | Viseur R.,University of Mons
INFORSID 2016 - Actes du 8e Forum Jeunes Chercheurs du Congres INFORSID | Year: 2016

The open source software are used by the majority of companies; some of them do not hesitate to play a leading role in their development. These practices result in challenges related to the governance of information systems and open source projects. The fork, as division of a community, can be the serious consequence of poor governance. After a state of the art dedicated to the concepts of open source governance and fork, we propose two sets of case studies, the first ones about major projects discussed in the scientific literature, the second ones about a set of forks. On this basis, we develop various ways to limit the risk of forks, identify four logics of open source governance, discuss the interest of inner source strategies to organize a transition between proprietary and open source strategies, show similarities in terms of needs in governance between open source software and open source innovation projects, and further stress the impact of the governance on competition.

Kritikos K.,ICS FORTH | Massonet P.,CETIC
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2016

Multi-cloud application management can optimize the provisioning of cloud-based applications by exploiting whole variety of services offered by cloud providers and avoiding vendor lock-in. To enable such management, model-driven approaches promise to partially automate the provisioning process. However, such approaches tend to neglect security aspects and focus only on low-level infrastructure details or quality of service aspects. As such, our previous work proposed a security meta-model, bridging the gap between high- and low-level security requirements and capabilities, able to express security models exploited by a planning algorithm to derive an optimal application deployment plan by considering both types of security requirements. This work goes one step further by focusing on runtime adaptation of multi-cloud applications based on security aspects. It advocates using adaptation rules, expressed in the event-condition-action form, which drive application adaptation behaviour and enable assuring a more-or-less stable security level. Firing such rules relies on deploying security metrics and adaptation code in the cloud to continuously monitor rule event conditions and fire adaptation actions for applications when the need arises. © Springer International Publishing Switzerland 2016.

Massonet P.,CETIC | Arenas A.,IE Business School
Proceedings - 2012 8th International Conference on the Quality of Information and Communications Technology, QUATIC 2012 | Year: 2012

With the growing popularity of cloud computing, it is important to have guarantees on the quality of the protection. This is particularly true for infrastructure as a service (IaaS) and the need for protecting applications that are deployed in a cloud. Applications come with different levels of required protection and thus require different levels of protection at the infrastructure level. Quality of protection should be commensurate with the risks. In the cloud responsibility for protecting the application is split between the cloud user (the one who deploys the application) and the cloud provider that manages the infrastructure. The responsibility for securing the application is still in the hands of the cloud user. However the responsibility for securing the infrastructure on which the application runs is in the hands of the cloud provider. For the cloud user to be able to guarantee a given level of protection he must obtain some guarantees in quality of protection from the cloud infrastructure in which the application runs. This article describes and compares a client side (transparent) and a provider side (less transparent) model for specifying and monitoring quality of protection in IaaS, and discusses the benefits and pitfalls of the two models. The paper concludes by comparing these models to assess which one is the most adequate for IaaS. The contribution of this paper is to suggest the need for more transparent quality of protection management in clouds and to provide a method for moving from non-transparent quality of protection models to more transparent quality of protection models based on risk analysis of threats and the identification of the security controls to be monitored. The approach is illustrated with an example for monitoring VM/data location in a cloud. © 2012 IEEE.

Viseur R.,CETIC | Viseur R.,University of Mons
31st INFORSID 2013 | Year: 2013

Using the content of Wikipedia articles is common in academic research. However the practicalities are rarely analyzed. Our research focuses on extracting biographical information about personalities from Belgium. Our research is organized into three sections. The first section provides a state of the art for data retrieval in Wikipedia. A second section presents the case study about data mining for biographical Belgian personalities. Different solutions are discussed and the adopted solution is implemented. In the third section, the quality of the extraction is discussed. Practical recommendations for researchers wishing to use Wikipedia are also proposed on the basis of our case study. Copyright © (2013) by INFORSID.

Viseur R.,CETIC | Viseur R.,University of Mons
Proceedings of the 10th International Symposium on Open Collaboration, OpenSym 2014 | Year: 2013

Wikipedia is a collaborative multilingual encyclopedia launched in 2001. We already conducted a first research on the extraction of biographical data about personalities from Belgium in order to build a large database with biographical data. However, the question of the reliability of the data arises. In particular, in the case of Wikipedia, the data are generated by users and could be subject to errors. In consequence, we wanted to answer to the following question: are the data introduced in Wikipedia articles reliable? Our research is organized in three sections. The first section provides a brief state of the art about the reliability of the user-generated data. A second section presents the methodology of our research. A third section will present the results. The error rates that were measured for the birthdate is low (0.75%), although it is higher than the 0.21% score that we observed for the baseline (reference sources). In a fourth section, the results are discussed.

Viseur R.,CETIC | Viseur R.,University of Mons
DATA 2015 - 4th International Conference on Data Management Technologies and Applications, Proceedings | Year: 2015

The term "open data" refers to information that has been made technically and legally available for reuse. In our research, we focus on the particular case of open research data. We conducted a literature review in order to determine what are the motivations to release open research data and what are the issues related to the development of open research data. Our research allowed to identify seven motivations for researchers to open research data and discuss seven issues. The paper highlights the lack of dedicated data infrastructure and the need for developing the researcher's ability to animate online communities.

Loading CETIC collaborators
Loading CETIC collaborators