Smals Research

Main menu

Skip to primary content
Skip to secondary content
  • Home
  • Blog
  • Research Talks
  • Publications
    • Technos
    • Research reports
    • Product Reviews
    • Presentations
  • Tools
    • Smals Be Sign (EN)
    • Cloud Security Model (FR)
    • Cloud Security Model (NL)
  • Radar / Plan
    • Data & Analytics
    • AI & Machine Learning
    • Emerging Technologies
    • Security & Privacy
    • Research Plan 2025 (NL)
    • Research Plan 2025 (FR)
  • Team
  • About

Category Archives: Security

Post navigation

← Older posts
Newer posts →

L’importance de la taille des clés en cryptographie

Posted on 08/06/2012 by Julien Cathalo

La plupart des algorithmes de cryptographie utilisent des clés : c’est le cas des algorithmes de chiffrement symétrique (comme AES) ou asymétrique (comme RSA), de signature digitale, des MACs… Un paramètre important lors d’une implémentation est le choix de la taille … Continue reading →

Posted in Security | Tagged cryptography, encryption, Security | Leave a reply

Veilige paswoorden: waiting for Godot?

Posted on 05/04/2012 by Kristof Verslype

Veilige paswoorden; we weten allemaal wel dat het belangrijk is, maar vaak wordt gebruiksgemak boven veiligheid gekozen. Een aantal artikels geven een kijk op hoe het momenteel staat met de veiligheid van het gemiddelde paswoord. Gebruik binnen bedrijf Volgens het Trustwave … Continue reading →

Posted in Security | Tagged paswoord, Security | Leave a reply

Ga veilig om met uw geprivilegieerde accounts

Posted on 08/03/2012 by Bob Lannoy

Er gaat geen dag voorbij of we lezen wel ergens in de pers een bericht over het verlies van confidentiële gegevens, computerinbraken of gesaboteerde systemen. Ondanks dat deze verhalen sterk gemediatiseerd worden door security vendors zit er een grond van … Continue reading →

Posted in Security | Tagged PAM, privileged account management | Leave a reply

Password Managers: Don’t Buy It – Rent It!

Posted on 16/12/2011 by Koen Vanderkimpen

Ik maak al een paar jaar gebruik van password managers. Dat zijn tools die je toelaten om al je paswoorden op te slaan, en eventueel om ze automatisch voor je in te vullen wanneer je ergens wil inloggen. Want geef toe: … Continue reading →

Posted in Productivity, Security, Social | Tagged lastpass, RIA, roboform, Security, sso, Web 2.0 | Leave a reply

Going eXtreme for Health Care ( #devoxx )

Posted on 24/11/2011 by Koen Vanderkimpen

When Security, Performance, Scalability, and Availability all want to be the star of the show   Dirk Deridder and me gave this presentation about eXtreme Transaction Processing (XTP) for health care at Devoxx 2011. We presented a high-level overview of … Continue reading →

Posted in Data center, Security, Software engineering | Tagged devoxx, eerstelijnskluis, pcs, threshold encryption, xtp | Leave a reply

Rest & IAM – Part 3 : SCIM

Posted on 16/11/2011 by Bob Lannoy

In mijn twee vorige posts (deel 1 en deel 2) heb ik gesproken over de opkomst van een REST-gebaseerde aanpak in Identity Management. Grote internetspelers gaan volop voor een naar hun zeggen “eenvoudige en lichte” aanpak, getuige daarvan het massale … Continue reading →

Posted in Security, Standards | Tagged identity, oauth, provisioning, rest, scim | 2 Replies

Convergence, une alternative viable aux Autorités de Certification ?

Posted on 04/11/2011 by Julien Cathalo

TLS est un protocole de cryptographie standardisé par l’IETF et utilisé pour sécuriser des communications sur internet. Son utilisation sur le web est largement répandue. Par abus de langage, on l’appelle SSL, qui est en fait le nom de son … Continue reading →

Posted in Security, Standards | Tagged cryptography, encryption, Security, SSL | Leave a reply

SHA-3 : A la recherche de la nouvelle fonction de hachage cryptographique standard

Posted on 21/10/2011 by Julien Cathalo

Une fonction de hachage cryptographique est une fonction qui calcule une empreinte de taille fixe (par exemple, 160 bits soit 20 octets dans le cas de SHA-1) à partir d’un message de taille variable. Une bonne fonction de hachage doit … Continue reading →

Posted in Security, Standards | Tagged cryptography, encryption, Security | Leave a reply

Is LDAP dood?

Posted on 14/10/2011 by Bob Lannoy

Op 10 en 11 oktober vond er een LDAP conferentie plaats in Heidelberg. Het evenement trok een 60-tal deelnemers met vertegenwoordigers van de belangrijkste open source LDAP-implementaties (OpenLDAP, OpenDJ, ApacheDS) en mensen die aan de basis lagen van de LDAP-specificaties. … Continue reading →

Posted in Open Source, Security, Standards | Tagged conference, ldap, Open Source, open standards | Leave a reply

Rest & IAM – Part 2 : OAuth

Posted on 04/08/2011 by Bob Lannoy

In een vorige post werd de opgang van Identity & Access Management standaarden in REST-architecturen kort vermeld. In deze post bespreken we kort één van deze specificaties, namelijk OAuth. OAuth is een systeem dat toelaat om aan derde partijen een … Continue reading →

Posted in Security, Standards | Tagged authentication, authorization, identity, oauth, rest | 1 Reply
Page 12 of 13« First‹ Previous910111213Next ›

Newsletters & info sessions

Email: Language: Dutch French

Last documents

  • Presentation : Advanced De-identification & Linkage of Personal Data originating from Multiple Sources for Secondary Use (2025/04 - Kristof Verslype)
  • Quick Review 120: CodeQL - Outil d’analyse statique pour rechercher des vulnérabilités (2025/03 - Fabien A. P. Petitcolas)
  • Presentation : Towards Cryptographic Agility in the Public Sector (2025/01 - Kristof Verslype)
  • Quick Review 119: Unstructured - Outil d'ingestion de données (2024/10 - Katy Fokou)
  • Presentation : Privacy in Practice with Smart Pseudonymization - Lessons from the Belgian Public Sector (2024/10 - Kristof Verslype)
Avatars by Sterling Adventures
© Smals Research - Login - - Licence/Disclaimer: FR - NL
Admired Theme
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT