Mikaël Ates

Learn More
In this paper, we provide a literature review of modern remote laboratories. According to this state-of-theart, we explain why remote laboratories are at a technological crossroad, whereas they were slugging for a decade. From various observations based on our review, we try to identify possible evolutions for the next generation of remote laboratories.
We express in this paper a position about the evolution of the high layers of the future Internet related to digital identity management. The digital identities are often wrongly considered as endpoints. We argue an Identity-Centric Internet consistent with the concepts of Identity in the Cloud and Identity as a Service. We give architectural notions and(More)
Digital identity management intra and inter information systems, and, service oriented architectures security, are the roots of identity federation. This kind of security architectures aims at enabling information systems interoperability. Existing architectures, however, do not consider interoperability of heterogeneous federation architectures. In this(More)
Unlinkability is a privacy feature supported by those multi-party security protocols allowing anonymous users’ credential exchanges among different organizations. Proper signature schemes, based on discrete logarithms, must be used in order to guarantee the above requirements as well as selective disclosure of information. In this paper, we highlight that(More)
In this article, we expose the basics of distributed identity management systems and characterize what makes an identity federation architecture a singular one. We depict the evolutions and current trends of the interconnection of information systems by exposing what could be a global identity management system issued from the convergence of multiple(More)
Role management may be hard to achieve in dynamic virtual organizations. In such entities, the users are usually unknown by the participating organizations except their home organization. The issue comes from the difficulty to apply the access control policies of the users' home organizations into a different organization. Insofar, to use roles is relevant(More)