Maroun Chamoun

Learn More
Network security policy enforcement consists in configuring heterogeneous security mechanisms (IPsec gateways, ACLs on routers, stateful firewalls, proxies, etc) that are available in a given network environment. The complexity of this task resides in the number, the nature, and the interdependence of the mechanisms. We propose in this paper a formal data(More)
Due to their two main applications, instant messaging and file sharing, peer-to-peer (P2P) systems are gaining more and more attention. JXTA, an interoperable and platform independent peer-to-peer computing infrastructure, has been adopted in an increasing number of network applications providing cooperative services and more specifically a file-sharing(More)
The task of managing information technology resources becomes increasingly complex as managers must take heterogeneous systems, different networking technologies, and distributed applications into consideration. Policy-based networking (PBN) has emerged as a promising paradigm for configuration management and service provisioning. The Common Open Policy(More)
Software-Defined Networking (SDN) will revolutionize networks by decoupling the Data and Control Planes and therefore offering much more agility, flexibility and end-to-end control; and this is what is needed today by Cloud Computing. SDN benefits will allow both Enterprises and Cloud service providers to enhance their services and their user's experience.
JXTA is an interoperable and platform independent peer-to-peer computing infrastructure. It is designed in a manner to address the needs of the widest possible set of P2P applications. In this paper, we propose SOS: a Service Oriented Architecture based on JXTA with semantic support. This contribution in regards to the existing platforms can be identified(More)
Quick evolution, heterogeneity, interdependence between equipment, and many other factors induce high complexity to network security analysis. Although several approaches have proposed different analysis tools, achieving this task requires experienced and proficient security administrators who can handle all these parameters. The challenge is not to propose(More)
  • 1