12.07.2015 Views

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description détaillée des proj<strong>et</strong>s derecherche (en anglais)C<strong>et</strong>te partie reprend les fiches constituées pour l’élaboration du rapport annuel PRACOM <strong>2008</strong>.Protocols................................................................................................................................3Header Compression over Mobile N<strong>et</strong>works and Satellite Links ..................................................... 3Compression techniques and IPv6 for mobility ............................................................................ 5An easy-to-use solution for IPv6 connectivity.............................................................................. 6Loss Synchronization and Router Buffer Sizing with High-Speed Versions of TCP............................ 8Sensor N<strong>et</strong>works ................................................................................................................ 10Random Walk Techniques for Data Delivery in Wireless Sensor N<strong>et</strong>works .................................. 10Suppressing Neighbor Discovery in Wireless Sensor N<strong>et</strong>works .................................................... 12Media and N<strong>et</strong>works........................................................................................................... 14IP-based transmission of real-time services over wireless links ................................................... 14Video on Demand in IP Multimedia Subsystem.......................................................................... 15Radio Resource Management in Wireless N<strong>et</strong>works.......................................................... 17WiMAX Radio Resources Management and Capacity Estimation .................................................. 17Pack<strong>et</strong> scheduling and resource sharing in HSDPA..................................................................... 19Multicast for high speed wireless n<strong>et</strong>works ............................................................................... 21Management of Multiple Access N<strong>et</strong>works......................................................................... 22N<strong>et</strong>work centric QoS management in an operator h<strong>et</strong>erogeneous mobile n<strong>et</strong>work........................ 22Adaptation of Multimedia Flows in a Seamless Mobility Context .................................................. 24R<strong>et</strong>hought Mobility Management in Future Multi-technologies Access N<strong>et</strong>works ........................... 25Optimized mobility management in h<strong>et</strong>erogeneous access n<strong>et</strong>works ........................................... 26Mobility and Multihoming: interaction and benefits.................................................................... 27Security & Mobility ............................................................................................................. 29Use of a Context Transfer Protocol to reduce operational cost of access control........................... 29Optimization of Wi-Fi-WiMAX vertical handover......................................................................... 30Security Analysis and Validation ........................................................................................ 32Analysis and deployment of security policies............................................................................. 32Expression of security policies .................................................................................................33Security Testing: criteria, fault models and test generation ........................................................ 35Policy Administration .............................................................................................................. 36Specifying and deploying security in workflow management systems .......................................... 37PROTEKTO : Security platform for content providers ................................................................. 38Intrusion D<strong>et</strong>ection ........................................................................................................... 40D<strong>et</strong>ection and correlation of intrusions ..................................................................................... 40Threat response by policy revision ........................................................................................... 41Reaction after d<strong>et</strong>ection.......................................................................................................... 43Dependable Anomaly D<strong>et</strong>ection with Diagnosis ......................................................................... 45Malicious behavior d<strong>et</strong>ection in ad-hoc n<strong>et</strong>works....................................................................... 47Extract of Pracom’s Annual Report <strong>2008</strong> 1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!