Trust and security

Research Domain


Research blog  /  Blog

NoGap: New security monitoring technology in the Cloud

Summary More and more people and businesses are storing their data and deploying their applications in Cloud computing infrastructures that offer the advantage of powerful, flexible and inexpensive computing resources. The massive adoption of these infrastructures that concentrate sometimes sensitive data and applications makes them a prime target for IT attacks, hence the importance of […]


Research blog  /  Blog

Dark patterns, an unacceptable downward spiral

Folder: Protecting personal data from “dark patterns” The aim of this dossier is to shed some light on the subject of manipulation techniques in the digital world, also known as “dark patterns”. The scale of the phenomenon produces significant impacts on the protection of personal data. This analysis carried out within Orange Labs for the “Confidence […]


Research blog  /  Blog

What are the measures against “dark patterns”?

Folder: Protecting personal data from “dark patterns” The aim of this dossier is to shed some light on the subject of manipulation techniques in the digital world, also known as “dark patterns”. The scale of the phenomenon produces significant impacts on the protection of personal data. This analysis carried out within Orange Labs for the “Confidence […]


Research blog  /  Blog

What are “dark patterns” and their impacts on personal data?

Folder: Protecting personal data from “dark patterns” The aim of this dossier is to shed some light on the subject of manipulation techniques in the digital world, also known as “dark patterns”. The scale of the phenomenon produces significant impacts on the protection of personal data. This analysis carried out within Orange Labs for the […]


Research blog  /  Blog

Experimenting quantum key exchange over the Côte d’Azur

Orange is involved in the University of Côte d’Azur’s Quantum@UCA project on quantum cryptographic key exchange over a city network.


Research blog  /  Blog

How increasing the confidence in the eSIM ecosystem is essential for its adoption

A key challenge for the adoption of this new type of SIM card is.


Research blog  /  Blog

Privacy-preserving Artificial Intelligence

Summary When using data in a digital service, one should usually trade-off between data usage (ease of operation, performance) and data security (user privacy, data confidentiality). This article presents the case of advanced cryptographic techniques that brings a solution that reconciles these two conflicting objectives. A lot of use cases are relevant in this context, […]


Research blog  /  Blog

Draw to sign in

The PIN is dead, long live the PIN! Thanks to Artificial Intelligence (AI), your phone is now able to recognise your handwriting. A new mobile app developed by a team of researchers from Rennes, France [1] will allow you to log in by writing on your smartphone. Replacing the famous virtual keyboard used for typing […]


Research blog  /  Blog

Web-R, a tool for designing the networks of the future

Developed by Orange, Web-R is a decision-aid tool for the placing problems that may be encountered by network architects.


Research blog  /  Blog

Blockchain for consent management: improved privacy and user control

Concerns about consent management With the deployment of more and more eHealth solutions, a critical point is for patients to be able to grant authorized persons a selected, partial or total access to their personal data. This is called consent management and is a key point for e-health. In other domains like agriculture, the need […]


Research blog  /  Blog

New Directions in Cloud Isolation

Virtualization is the foundation of cloud computing for sharing physical resources of a host among virtual instances such as virtual machines.


Research blog  /  Blog

Differential Privacy or how to anonymize datas while managing its usage?

Is it possible to identify one person whose data are scrambled among numerous data? Is it possible to cross multiple different anonymous data sources with different formats to reidentify one person? Yes it is and some articles have shown it. That’s why anonymization technologies are evolving to bring always more privacy guarantees and Differential Privacy is […]