There is no doubt that privacy by design PbD has become a structuring paradigm for personal data protection. Certainly this paradigm has been in use since 1995; however the GDRP "The General Data Protection Regulation", by considering PbD in 2018 as a legal obligation, it testifies the PbD seven principles relevance. Companies are therefore called to put in place technical and organizational measures to integrate PbD into companies. Hence the need for a methodology to provide an exhaustive approach adapted to this implementation. Given the focus of the literature on the implementation of methodologies dedicated to the embodiment of PbD only in software systems, this article aims to propose an ISPM methodology "Information System Privacy Methodology" which focuses on the implementation of PbD in the enterprises architecture, specifically in information systems taking into account all the technical and organizational aspects which must be adopted for the said goal success.
Distributed Denial of Service (DDoS) attacks using Botnets became widely used in the Internet because of its efficiency and easy implementation. We will present in this paper a new architecture that stops DDoS attacks based on Botnet C&C (Command & control) and identify the Botmaster (the bots owner) machine.
Unlike the researches done in the attack trace-back algorithms, the aim of this architecture is not only to determine the Internet Relay Chat (IRC) servers used to control the Botnet. But also to remove the bots from the infected machines and to revel the Botmaster identityThis architecture is composed of a DDoS attacks detection agents*, spy agents* and a central agent* that coordinates between the other agents during the attack trace-back process. The trace-back process is based on hacking method in order to infiltrate the Botnet and get information about the attacker and the bots he uses. This architecture is designed to be used by the Internet service providers.
In recent years, Blockchain arose as a key technology in building autonomous decentralised financial systems. Its ability to digitize trust enables building trustless systems such as cryptocurrencies where users do not need to rely on any third party to exchange value. The success of cryptocurrencies to operate without any intermediaries draw the interest of business operators who seek to bypass intermediation and thus to reduce cost and gain competitive advantages. As a result, Blockchain was used outside the crypto-sphere to build decentralized systems. However, this portage led to the inception of new types of Blockchains adapted to different specifications and with different designs. Consequently, the technology has diverged from its baseline (Bitcoin) to the point where some systems marketed as "blockchain" share only a few design concepts with the original Blockchain design proposed by Satoshi Nakamoto. This conceptual divergence alongside the lack of comprehensive models and standards made it difficult for both system designers and decision-makers to clearly understand what is a blockchain or to choose a suitable solution.This survey has a double goal; on the one hand, it attempts to contribute to the discussion on the ontological status of DLTs by providing a taxonomy oriented-framework (DCEA) for conceptualizing and examining DLT. On the other hand, it also attempts to present an up-to-date review and evaluation of current blockchains and their variants as constructed of four layers: the data, consensus, execution and application layers.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.