<?xml version="1.0" encoding="UTF-8"?><lom:lom xmlns:lom="http://ltsc.ieee.org/xsd/LOM" xmlns:lomfr="http://www.lom-fr.fr/xsd/LOMFR">
<lom:general>
<lom:identifier>
<lom:catalog>URI</lom:catalog>
<lom:entry>http://ori.unit-c.fr/uid/unit-ori-wf-1-3061</lom:entry>
</lom:identifier>
<lom:title>
<lom:string language="eng">Computer security (série : Colloquium Jacques Morgenstern)</lom:string>
</lom:title>
<lom:language>eng</lom:language>
<lom:description>
<lom:string language="eng">Butler Lampson, one of the pioneers in computer security, once wrote:
"What people want from computer security is to be as secure with computers as they are in the real world".
Increasingly, however, the "real world" is full of interconnected computers in critical roles. Accordingly, computer security becomes more essential but also harder to define and even harder to achieve.
This lecture is an introduction to some of the themes and techniques of computer security. It emphasizes security protocols. These play a well-established role in authentication in distributed sytems and related tasks; they have many other actual or imagined applications, for instance discouraging junk email ("spam"). Over time, useful methods have been developed for the design and analysis of security protocols. Advances in other parts of computer security, in particular those that touch system administrators and users, remain more sporadic and challenging ********************************</lom:string>
</lom:description>
<lom:keyword>
<lom:string language="fre">fuscia</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">conférence</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">recherche</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">STIC</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">protocole de sécurité</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">confidentialité</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">intégrité</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">disponibilité</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">authentification</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">communication</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">spam</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">clé</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">cryptage</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">attaque</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">pi calcul</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">analyse formelle</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">mémoire</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">puissance de calcul</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">cache</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">contrôle d'accès</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">Binder</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">logique</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">base de données</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">intégration</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">TSIMMIS</lom:string>
</lom:keyword>
<lom:keyword>
<lom:string language="fre">MSL</lom:string>
</lom:keyword>
<lom:structure>
<lom:source>LOMv1.0</lom:source>
<lom:value>atomic</lom:value>
</lom:structure>
<lom:aggregationLevel>
<lom:source>LOMv1.0</lom:source>
<lom:value>2</lom:value>
</lom:aggregationLevel>
<lomfr:documentType>
<lomfr:source>LOMv1.0</lomfr:source>
<lomfr:value>image en mouvement</lomfr:value>
</lomfr:documentType>
</lom:general>
<lom:lifeCycle>
<lom:status>
<lom:source>LOMv1.0</lom:source>
<lom:value>final</lom:value>
</lom:status>
<lom:contribute>
<lom:role>
<lom:source>LOMv1.0</lom:source>
<lom:value>author</lom:value>
</lom:role>
<lom:entity>BEGIN:VCARD
VERSION:3.0
N:Abadi;Martín;;;
FN:Martín Abadi
EMAIL;TYPE=INTERNET:
ORG:University of California
END:VCARD</lom:entity>
<lom:date>
<lom:dateTime>2003-03-18</lom:dateTime>
</lom:date>
</lom:contribute>
<lom:contribute>
<lom:role>
<lom:source>LOMv1.0</lom:source>
<lom:value>publisher</lom:value>
</lom:role>
<lom:entity>BEGIN:VCARD
VERSION:3.0
N:Institut National de Recherche en Informatique et en Automatique;;;;
FN:Institut National de Recherche en Informatique et en Automatique
EMAIL;TYPE=INTERNET:
ORG:
END:VCARD</lom:entity>
<lom:entity>BEGIN:VCARD
VERSION:3.0
N:Université de Nice;;;;
FN:Université de Nice
EMAIL;TYPE=INTERNET:
ORG:
END:VCARD</lom:entity>
<lom:entity>BEGIN:VCARD
VERSION:3.0
N:Ecole Polytechnique Universitaire;;;;
FN:Ecole Polytechnique Universitaire
EMAIL;TYPE=INTERNET:
ORG:
END:VCARD</lom:entity>
<lom:entity>BEGIN:VCARD
VERSION:3.0
N:Laboratoire I3S;;;;
FN:Laboratoire I3S
EMAIL;TYPE=INTERNET:
ORG:
END:VCARD</lom:entity>
<lom:date>
<lom:dateTime>2009-06-02</lom:dateTime>
</lom:date>
</lom:contribute>
</lom:lifeCycle>
<lom:metaMetadata>
<lom:identifier>
<lom:catalog>URI</lom:catalog>
<lom:entry>http://ori.unit-c.fr/uid/unit-ori-wf-1-3062</lom:entry>
</lom:identifier>
<lom:contribute>
<lom:role>
<lom:source>LOMv1.0</lom:source>
<lom:value>creator</lom:value>
</lom:role>
<lom:entity>BEGIN:VCARD
VERSION:3.0
N:Gilles-Gallet;Isabelle;Isabelle;;;
FN:Isabelle Gilles-Gallet;Isabelle
EMAIL;TYPE=INTERNET:
ORG:UNIT
END:VCARD</lom:entity>
<lom:date>
<lom:dateTime>2009-06-08</lom:dateTime>
</lom:date>
</lom:contribute>
<lom:contribute>
<lom:role>
<lom:source>LOMv1.0</lom:source>
<lom:value>validator</lom:value>
</lom:role>
<lom:entity>BEGIN:VCARD
VERSION:3.0
N:Gilles-Gallet;Isabelle;Isabelle;;;
FN:Isabelle Gilles-Gallet;Isabelle
EMAIL;TYPE=INTERNET:
ORG:UNIT
END:VCARD</lom:entity>
<lom:date>
<lom:dateTime>2009-06-08</lom:dateTime>
</lom:date>
</lom:contribute>
<lom:metadataSchema>LOMv1.0</lom:metadataSchema>
<lom:metadataSchema>LOMFRv1.0</lom:metadataSchema>
<lom:metadataSchema>SupLOMFRv1.0</lom:metadataSchema>
<lom:language>eng</lom:language>
</lom:metaMetadata>
<lom:technical>
<lom:format>video/mpeg</lom:format>
<lom:location>http://iww.inria.fr/colloquium/fr/martin-abadi-computer-security/</lom:location>
<lom:duration>
<lom:duration>PT58M32S</lom:duration>
</lom:duration>
</lom:technical>
<lom:educational>
<lom:learningResourceType>
<lom:source>LOMv1.0</lom:source>
<lom:value>lecture</lom:value>
</lom:learningResourceType>
<lom:intendedEndUserRole>
<lom:source>LOMv1.0</lom:source>
<lom:value>learner</lom:value>
</lom:intendedEndUserRole>
<lom:intendedEndUserRole>
<lom:source>LOMv1.0</lom:source>
<lom:value>teacher</lom:value>
</lom:intendedEndUserRole>
<lom:context>
<lom:source>LOMv1.0</lom:source>
<lom:value>higher education</lom:value>
</lom:context>
<lom:context>
<lom:source>LOMFRv1.0</lom:source>
<lom:value>doctorat</lom:value>
</lom:context>
<lom:typicalAgeRange>
<lom:string language="fre">24 et +</lom:string>
</lom:typicalAgeRange>
<lom:difficulty>
<lom:source>LOMv1.0</lom:source>
<lom:value>difficult</lom:value>
</lom:difficulty>
<lom:typicalLearningTime>
<lom:duration>PT2H</lom:duration>
</lom:typicalLearningTime>
<lom:description>
<lom:string language="fre">Cycle de conférences mensuelles, les Colloquium Jacques Morgenstern peuvent être choisis par les étudiants de l'Ecole Doctorale STIC dans le cadre des heures de formation complémentaire.
Les orateurs interviennent en français ou en anglais.</lom:string>
</lom:description>
<lomfr:activity>
<lomfr:source>LOMFRv1.0</lomfr:source>
<lomfr:value>s'informer</lomfr:value>
</lomfr:activity>
<lomfr:activity>
<lomfr:source>LOMFRv1.0</lomfr:source>
<lomfr:value>apprendre</lomfr:value>
</lomfr:activity>
</lom:educational>
<lom:rights>
<lom:cost>
<lom:source>LOMv1.0</lom:source>
<lom:value>no</lom:value>
</lom:cost>
<lom:copyrightAndOtherRestrictions>
<lom:source>LOMv1.0</lom:source>
<lom:value>yes</lom:value>
</lom:copyrightAndOtherRestrictions>
<lom:description>
<lom:string language="fre">Document libre, dans le cadre de la licence Creative Commons (http://creativecommons.org/licenses/by-nd/2.0/fr/), citation de l'auteur obligatoire et interdiction de désassembler (paternité, pas de modification)</lom:string>
</lom:description>
</lom:rights>
<lom:relation>
<lom:kind>
<lom:source>LOMv1.0</lom:source>
<lom:value>ispartof</lom:value>
</lom:kind>
<lom:resource>
<lom:identifier>
<lom:catalog>URI</lom:catalog>
<lom:entry>http://ori.unit-c.fr/uid/unit-ori-wf-1-3045</lom:entry>
</lom:identifier>
<lom:description>
<lom:string language="fre">Colloquium Jacques Morgenstern</lom:string>
</lom:description>
</lom:resource>
</lom:relation>
<lom:classification>
<lom:purpose>
<lom:source>LOMv1.0</lom:source>
<lom:value>discipline</lom:value>
</lom:purpose>
<lom:taxonPath>
<lom:source>
<lom:string language="fre">Classification UNIT</lom:string>
</lom:source>
<lom:taxon>
<lom:id>1309</lom:id>
<lom:entry>
<lom:string language="fre">Sécurité des données: chiffrement, virus, cryptographie, ?</lom:string>
</lom:entry>
</lom:taxon>
<lom:taxon>
<lom:id>1303</lom:id>
<lom:entry>
<lom:string language="fre">Mode de traitement des données: temps réel, en parallèle, distribués, ?</lom:string>
</lom:entry>
</lom:taxon>
</lom:taxonPath>
<lom:taxonPath>
<lom:source>
<lom:string language="fre">CDD 22e éd.</lom:string>
</lom:source>
<lom:taxon>
<lom:id>005.8</lom:id>
<lom:entry>
<lom:string language="fre"/>
</lom:entry>
</lom:taxon>
<lom:taxon>
<lom:id>004.3</lom:id>
<lom:entry>
<lom:string language="fre"/>
</lom:entry>
</lom:taxon>
</lom:taxonPath>
</lom:classification>
</lom:lom>