Nelly A. Delessy

Learn More
Introduction Computer information security is a growing need for organizations and individuals; therefore, computer systems must be protected against attacks [Fer01b]. In the case of computers connected in a local network, attacks may come from external networks or from other local sub-networks. A common solution to protect local networks is to incorporate(More)
SOA enables the design of flexible and modular software applications that can be used in a cross-organization context. Unfortunately, those qualities have a negative impact on the security of the software application. In this paper, we provide an approach to build secure SOA applications that takes into account the new security issues introduced by the(More)
Distributed systems introduce a new variety of security threats. The organizations that own those systems must protect their information assets from attacks. To do this we need to start with high-level models that represent the security policies of the institution. We present patterns that derive from traditional models: first, the Policy-Based Access(More)
Web services are an important way for enterprises to interoperate. They are also becoming important for user access to services that depend on location and they are appearing in mobile devices. We consider the security standards needed for the use of web services in wireless networks. Web services security standards are used for the secure design of the(More)
  • 1