64 research outputs found

    Extending TLS with KMIP protocol for cloud computing

    Get PDF
    © 2016 IEEE. Any information system using encryption tends to have its own key management infrastructure. In practice, we find a separate key management systems dedicated to application encryption, or database encryption, or file encryption etc. This emergent needs to several key management systems and multiple cryptographic algorithms are resolved by the new Key Management Interoperability Protocol (KMIP). This work specifies how the Key Management Interoperability Protocol (KMIP) can be included in Transport Layer Security (TLS) protocol in order to provide additional security features, flexibility, interoperability and authentication specially in distributed systems like Cloud Computing. Till now, authentication in TLS is limited to digital certificate and Kerberos. In this paper, we use the Key Management Interoperability Protocol to make an additional authentication option for TLS and we reduce handshake latency to 0-RTT for repeated handshakes and 1-RTT for full handshakes. We specify also the KMIP-TLS extension and its formal validation with AVISPA tool

    Étude paramétrique des performances d'un ventilateur minier axial

    Get PDF
    La ventilation efficace des galeries souterraines est une exigence durant toute la durée de vie des mines. L’objectif de base de tout système de ventilation réside dans l’obtention d’une atmosphère aérée et sécurisée pour les travailleurs. Plusieurs technologies de ventilateurs existent dans l’industrie avec des tailles et performances assez variables. La technologie de ventilateurs axiaux reste la plus efficace, et ce, selon les caractéristiques environnementales des mines de grandes et de moyennes tailles. Actuellement, les réseaux de ventilation sont le processus le plus énergivore dans une mine, ce qui présente l’un des défis majeurs à surmonter. Ainsi les phases de réglage et de conception du ventilateur axial restent les plus importantes afin d’améliorer les performances aérodynamiques et par conséquent énergétiques. Lors de ces phases, il est possible de modifier n’importe quel paramètre (opératoire, matériel, géométrique) pour obtenir un impact positif sur la diminution de la consommation énergétique. Plusieurs paramètres dimensionnels influencent le comportement aérodynamique du ventilateur tels que l’angle d’attaque des pales, l’angle de pas des pales, l’angle de torsion et le jeu pales/tube, ainsi que les paramètres d’acquisitions tel le cas de la vitesse de rotation. Une étude paramétrique est proposée pour l’étude de performance d’un ventilateur minier axial 42 po. Deux étapes sont adoptées. Une première étape correspond à une étude préliminaire, elle a été réalisée pour étudier l’effet des deux paramètres : l'angle d’attaque et le jeu pales-tube sur les paramètres du flux d’air. La seconde étape prend en considération l’étude de la performance et la stabilité du ventilateur ainsi que la génération de la carte de performance pour ce modèle de 42 po. Les aspects mécaniques sont aussi considérés, à travers la validation d’un modèle mécanique, conçu pour l’estimation des ordres de grandeur des contraintes, des déplacements et les fréquences naturelles du modèle. Des simulations numériques ont été réalisées pour analyser l’effet des paramètres géométrique et d’acquisition sur la performance et la stabilité du ventilateur en se basant sur les courbes caractéristiques. La puissance à l’arbre moteur et la pression totale ont été comparées avec les résultats du partenaire industriel. Une très bonne tendance a été observée. De plus, l’analyse des contraintes, des déformations et la détermination des fréquences propres ont été effectuées. Enfin une carte de performance de ce type de ventilateur a été élaborée sous une vitesse de rotation de 1800 tr/min

    Optimization of extraction process of Typha leaf fibres

    Get PDF
    The influence of temperature, duration and soda (NaOH) concentration on the extraction yield, linear density, diameter, tenacity and lignin ratio of Typha leaf fibres has been studied. A factorial design of experience has been used to identify the optimum operating conditions, and equations relating to the dependent variables to the operational variables of the extraction process are established. The optimum extraction condition has been determined by the statistical study using response surface and desirability function. The morphology of the obtained fibres and chemical constituents are determined. Fibres, extracted from leaves of Typha with the optimum process, have a lignin content value of about 14% like jute, alpha-cellulose value of about 67% similar to pineapple and jute fibres, extractives content value of about 1%, starches content value of about 2% and ash content value of about 1%. Finally, the characteristics of the optimum Typha fibre are compared with those of other vegetable fibres, showing large diameter and low mechanical properties as compared to other vegetable fibres

    Preparation and characterization of compression-molded green composite sheets made of poly(3-hydroxybutyrate) reinforced with long pita fibers

    Full text link
    [EN] Novel green composites were successfully prepared from bacterial poly(3-hydroxybutyrate) (PHB) and pita fibers derived from the agave plant (Agave americana). Various weight contents (10, 20, 30, and 40 wt.-%) of pita fibers at different lengths (5, 15, and 20 mm) were successfully incorporated into PHB by compression molding. The newly prepared PHB/pita fibers composite sheets were characterized in terms of their mechanical and thermomechanical properties and then related to their morphology after fracture. Attained results indicated that the mechanical stiffness of PHB significantly improved with both the content and length of pita fibers, although ductile properties were reduced. In particular, the elastic modulus of the 40 wt.-% PHB composite sheets containing 20-mm-long pita fibers was approximately 55% higher than the unfilled PHB sheet. Shore D hardness also improved, achieving the shortest pita fibers the highest improvement. Pita fibers with lengths of 15 and 20 mm also increased the Vicat softening point and heat deflection temperature (HDT) by 38 and 21°C, respectively. Due to their optimal shape, it is concluded that pita fibers with lengths above 15 mm can potentially reinforce and improve the performance of PHB biopolymer. In addition, the compression-molding methodology described in this research work represents a cost-effective pathway to feasibly prepare long-fiber- reinforced thermoplastics (LFRTs) fully based on renewable raw materials. Resultant green composite sheets can be of interest for the development of sustainable parts in the automotive industry and other advanced applications in polymer technology.This research was supported by the Spanish Ministry of Economy and Competitiveness (project MAT2014-59242- C2-1-R). The authors also thank “Conselleria d’Educació, Cultura i Esport—Generalitat Valenciana” (grant number GV/2014/008) for financial support.Torres-Giner, S.; Montanes, N.; Fombuena, V.; Boronat, T.; Sanchez-Nacher, L. (2016). Preparation and characterization of compression-molded green composite sheets made of poly(3-hydroxybutyrate) reinforced with long pita fibers. Advances in Polymer Technology. 1-11. https://doi.org/10.1002/adv.21789S11

    SBaaS: Safe Box as a service

    No full text
    International audiencehile paperless is a source of tremendousopportunities for companies, it is also a bearing of many newrisks. Indeed, externalization of electronic filing system canexpose the company to several vulnerabilities and threats. We propose, in our gSafe (Government Safe) project a new Cloud service, named Safe Box as a service (SBaaS). SBaaS is used for probative value archiving sensitive documents during a defined period in a secure environment. We propose a layered model that intends to satisfy Cloud user requirements and Cloud security challenges. In this paper we define the technical architecture of the service and its basic components. In addition we discuss its feasibility using Hadoop Distributed File System. </p

    Keynote speech

    No full text
    International audienc

    PCM in cloud

    No full text
    International audienceData security is core concerns of hardware and software implementations. It is impacted not only by network architecture but also by access control mechanisms. In literature, there are several access control models such as the Mandatory Access Control (MAC), the Discretionary Access Control (DAC), the Role-Based Access Control (RBAC) and the latest one Usage Control Authorization, oBligation and Condition (UCONabc). We have already introduced the Profile centric modeling in previous work. In this paper we focus on the profile centric modeling using graph formalism and its implementation using matrixes. We already defined the profile as the combination of all possible authorization, obligation, condition, role, etc. and other access parameters like attributes that we can found in Cloud system. In this paper, we discuss its application, its complexity and its implementation based on Hadoop Distributed File System and using three matrixes (profile definition, profile inheritance and user assignment). The Profile centric modeling is an optimum paradigm to define access control policy in complex distributed and elastic system like cloud computing: Safe Box as a service.Published in:</p
    • …
    corecore