Aller à : contenu haut bas recherche
 
 
EN     FR
Vous êtes ici:   UNIL > HEC Inst. > HEC App. > RECHERCHE
 
 

Solange Ghernaouti

Contact

Full Professor
Department of Information Systems


Contact
sgh@unil.ch
Tel 021.692.35.80
Fax 0216923585

Postal address
Université de Lausanne
Quartier UNIL-Chamberonne
Bâtiment Internef
1015 Lausanne

Internef, room 136
Tel 021.692.34.21



Other address
Université de Lausanne
Quartier UNIL-Chamberonne
Bâtiment Internef
1015 Lausanne

Teaching

bachelor Cyberespace et Internet
Related programme
Bachelor of Science (BSc) in Management
master Cybersécurité et intelligence économique
Related programme
Master of Science (MSc) in Information Systems

Research

Research areas

Axes de recherche
Comprehensive approach of cybersecurity and cybecrime

Cyberissues' strategic analysis

Cybersecurity and cyberdefense research

Innovation and prospective analysis in cybersecurity and business intelligence

Assessment of security measures' efficiency

Critical information infrastructure protection

Risk Management

Assistants

Léonore Cellier
lleonore.cellier@unil.ch



  Célia Guisolan
celia.guisolan@unil.ch



 

Publications

100 last publications ordered by: publication type  -  year

: Peer Reviewed

Articles

Ghernaouti-Hélie S. (2012). The cybercrime ecosystem & privacy issues - mains challenges and perspectives from a social perspective. ERCIM News, 90, 10-11.


Ghernaouti-Hélie S. , Länger T. (2012). Quantum key distribution for next generation networks. Magazine Hackin9 Extra - Cryptography, 1, 40-46.


Ghernaouti-Hélie S., Parent C. ; Spaccapietra S. (2012). Geolocalisation and privacy issues. MODAP Newsletter (Mobility, data mining, and privacy), 3, 3.


Ghernaouti-Hélie S., Tölle J. ; Quisquater J.-J. (2012). Introduction to the special theme « Cybercrime and Privacy Issues ». ERCIM News, 90, 9.


Ghernaouti-Hélie S. (2011). Menaces, conflits dans le cyberespace et cyberpouvoir. Sécurité & Stratégie - Dossier spécial: la sécurité à l'international / Revue de la Documentation française, 7, 61 - 67.


Ghernaouti-Hélie S. (2008). Un monde numérique particulièrement vulnérable à la criminalité. La Documentation française - Problèmes politiques et sociaux - Dossier N° 953 La délinquance électronique, 13-15.


Ghernaouti-Hélie S. (2007). Cybercriminalité: réponse des institutions. Hakin9 Magazine.


Ghernaouti-Hélie S. (2007). Information security, Internet security or critical information infrastructure protection? ICT security challenges for citizens, organisations and states. European CIIP Newsletter, 3, 27-28. Peer Reviewed


Tashi I. , Ghernaouti-Hélie S. (2007). Quantum Cryptography: An innovation in the domain of secure information transmission. Business White Paper. Peer Reviewed


Nguyen Thi M.T., Sfaxi M.A. ; Ghernaouti-Hélie S. (2006). 802.11i Encryption Key Distribution Using Quantum Cryptography. Journal of Network, 1, 9-20. Peer Reviewed


Ghernaouti-Hélie S. (2005). Cybercriminalité: le risque n'est pas virtuel. La Documentation française, Problèmes économiques. Dossier "L' économie souterraine dans la mondialisation", NA.


Books

Ghernaouti S. (2017). La cybercriminalité - Les nouvelles armes du pouvoir. Les Presses polytechniques et universitaires romandes, Lausanne, Suisse.


Ghernaouti S. , Dufour A. (2017). Internet (3073). Presses Universitaires de France , Paris, France.


Ghernaouti S. (2016). Cybersécurité, sécurité informatique et réseaux. Dunod, Malakoff, France.


Ghernaouti -Hélie S. (2013). Les cyberrisques - Réalités et perspectives. SCARG (Swiss Cybersecurity Advisory and Research Group).


Ghernaouti-Hélie S. (2013). Cyber Power - Crime, Conflict and Security in Cyberspace. EPFL Press, Lausanne.


Ghernaouti S. (2013). Sécurité informatique et réseaux. Dunod, Malakoff, France.


Dufour A. , Ghernaouti-Hélie S. (2012). Internet. PUF.


Ghernaouti S. , Tashi I. (2011). Information Security Evaluation - A Holistic Approach. EPFL Press - Presses polytechniques et universitaires romandes, Lausanne, Switzerland.


Schjolberg S. , Ghernaouti-Hélie S. (2011). A Global Protocol on Cybersecurity and Cybercrime: An initiative for peace and security in cyberspace. Cybercrimedata, Oslo.


Berger R. , Ghernaouti-Hélie S. (2010). Technocivilisation - Pour une philosophie du numérique. PPUR (Presses Polytechniques et Universitaires Romandes), Lausanne, Suisse.


Ghernaouti-Hélie S. (2009). Cybersecurity Guide for Developing Countries. ITU-D (International Telecommunication Union), Geneva, Switzerland.


Ghernaouti-Hélie S. (2009). La Cybercriminalité : le visible et l'invisible. PPUR (Presses Polytechniques et Universitaires Romandes), Lausanne, Suisse.


Schjolberg S. , Ghernaouti-Hélie S. (2009). A Global Protocol on Cybersecurity and Cybercrime: An initiative for peace and security in cyberspace. Cybercrimedata, Oslo.


Ghernaouti-Hélie S. (2008). Information Security for Economic and social development. United Nations Economic and Social Commission for Asia and the Pacific (UNESCAP), Bangkok, Thailand.


Ghernaouti-Hélie S. (2006). Guide de la cybersécurité pour les pays en développement. UIT (Union Internationale des Télécommunications), Genève, Suisse.


Ghernaouti-Hélie S. (2004). Reflets d'une certaine criminalité économique: criminalité informatique, cyber-criminalité, cyber terrorisme. l'Harmattan.


Ghernaouti-Hélie S. , Dufour A. (2002). Internet & Sécurité. PUF, Paris, France.


Ghernaouti-Hélie S. , Dufour A. (2001). De l'ordinateur à la société de l'information. PUF, Paris, France.


Ghernaouti-Hélie S. (2000). Sécurité Internet: stratégies et technologies. Dunod, Paris, France.


Ghernaouti-Hélie S. , et al. (2000). L'homme et ses métiers : La révolution Internet. Nouvelle Librairie de France, Diffusion SGED.


Ghernaouti-Hélie S. (1998). Stratégie et ingénierie de la sécurité des réseaux. InterEditions.


Ghernaouti-Hélie S. , Dufour A. (1998). Enterprise Networks and Telephony : From technologies to business strategy. Springer-Verlag, London, UK.


Servin C. , Ghernaouti-Hélie S. (1998). Les hauts débits en télécoms. InterEditions.


Ghernaouti-Hélie S. , Dufour A. (1995). Réseaux locaux et téléphonie. Masson.


Ghernaouti-Hélie S. , et al. (1994). Network management : Concepts and tools. Chapman & Hall.


Ghernaouti-Hélie S. , et al. (1994). Gérer les réseaux de télécommunication de l'entreprise. Dunod, 3 tomes.


Ghernaouti-Hélie S. (1993). Client/Serveur : les outils du traitement coopératif. Masson.


Ghernaouti-Hélie S. , et al. (1992). Gestion des réseaux : concepts et outils. Masson.


Ghernaouti-Hélie S. (1990). Réseaux, applications réparties normalisées. Eyrolles.


Book Sections

Ghernaouti S. (2014). The role of CBMs in a renewed vision of international cybersecurity: prospects for a global response and an international treaty . The Quest for cyberconfidence (pp. 10-21). International Telecommunication Union (ITU), Geneva, Switzerland.


Ghernaouti S. (2014). The Cybersecurity Continuum to Enhance Cyber Resilience. The Quest for Cyber Confidence (pp. 76-82). International Telecommunication Union (ITU), Geneva, Switzerland.


Ghernaouti S. (2014). Foreword. Architecting User-Centric Privacy-As-A-Set-Of-Services: A Digital Identity-Related Privacy Framework (pp. ix-x). Switzerland: Springer International Publishing.


Ghernaouti-Hélie S. (2011). La cybercriminalité: Le cyberespace une valeur commune à protéger. Rapport de l'Observatoire National de la Délinquance et des Réponses Pénales 2011 (ONDRP), sous la direction d'Alain Bauer. Institut National en Hautes Etudes et Sécurité et de la Justice (INHESJ) (pp. 775-904). CNRS Editions, Paris, France.


Ghernaouti-Hélie S. (2011). Des cybergraines d'une présence infinie. Un homme de parole - Hommage à René Berger. Le Cadratin - Iderive, Vevey.


Ghernaouti S. (2011). Connecter le monde de manière responsable. Pour un management responsable au 21e siècle (pp. 7-13). Pearson, Paris, France. Peer Reviewed


Ghernaouti-Hélie S. , Debbagh T. (2010). Organizational structures. Global Cybersecurity Agenda : a Framework for International Cooperation. International Telecommunication Union (ITU), Geneva, Switzerland.


Ghernaouti-Hélie S. , Tallo I. (2010). Capacity Building. Global Cybersecurity Agenda : a Framework for International Cooperation. International Telecommunication Union (ITU), Geneva, Switzerland.


Tashi I. , Ghernaouti-Hélie S. (2010). A Security Assurance Model to Holistically Assess the Information Security Posture. Complex Intelligent Systems and their Applications (Vol. 41, pp. 83-108). New York, USA: Springer New York.


Ghernaouti-Hélie S. (2007). Cybercriminalité et sécurité intérieure : état des lieux et éléments de prévention. Traité de sécurité intérieure (pp. 246-259). Centre International de Criminologie Comparée (CiCC), Université de Montréal, Canada.


Ghernaouti-Hélie S. , Sfaxi M. A. (2007). Guaranteerring Security of Financial Transaction by Using Quantum Cryptography in Banking Environment. E-business and Telecommunication Networks (Vol. 3, pp. 139-149). Springer, Berlin, Heidelberg.


Ghernaouti-Hélie S. (2006). L'intelligence juridique dans la gestion de la sécurité des systèmes d'information et des réseaux de télécommunication. Droit des sociétés : Mélanges en l'honneur de Roland Ruedin (pp. 87-98). Helbing & Lichtenhahn.


Ribaux O., Birrer S., Rossy Q., Capt S., Loset S., Cartier J. et al. (2006). Recherche et développement en analyse criminelle financière, la contribution de l'université. Guide méthodologique et des bonnes pratiques de l'analyse financière criminelle (Methodological guide to best practices in financial criminal analysis). JAI/2004/AGIS/175.


Ghernaouti-Hélie S. (2005). La cybercriminalité, reflets d'une certaine criminalité économique. La criminalité économique : ses manifestations, sa prévention et sa répression (pp. 243-253). L'Harmattan, Paris, France .


Ghernaouti-Hélie S. (2004). Reflets d'une certaine criminalité économique: criminalité informatique, cyber-criminalité, cyber terrorisme. Les Cahiers de l'Institut de lutte contre la criminalité économique. Edition l'Harmattan, Neuchâtel.


In Proceedings

Simms D. , Ghernaouti S. (2013, Mar). Structured and Unstructured Data in the Cloud: A Swiss Perspective on Readiness and Internal Controls. 27th International Conference on Advanced Information Networking and Applications Workshops (pp. 643-648). IEEE. Peer Reviewed


Ayed G. B. , Ghernaouti-Helie S. (2012, Aug). Processes View Modeling of Identity-related Privacy Business Interoperability: Considering User-Supremacy Federated Identity Technical Model and Identity Contract Negotiation. 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (pp. 906-913). Institute of Electrical and Electronics Engineers (IEEE).


Ben Ayed G. , Ghernaouti-Helie S. (2012, Sep). Service-Oriented Digital Identity-Related Privacy Interoperability: Implementation Framework of Privacy-as-a-Set-of-Services (PaaSS). Enterprise Interoperability : 4th International IFIP Working Conference, IWEI 2012, Harbin, China, September 6-7, 2012. Proceedings, 122 (pp. 193-200). Springer.


Ghernaouti-Hélie S. (2012, Mar). The global cybercrime ecosystem: Major players and their relationships - challenges from a societal perspective. The Europe - Asia Pacific - Commonwealth of Independent States (EUR-ASP-CIS) Cross Regional Seminar - "Current Methods for Combating Cybercrime" - IMPACTS - ITU - Odessa, Ukraine, 28-30 March 2012.


Ghernaouti-Helie S. (2012, Sep). Going Digital – Rethinking Cybersecurity and Confidence in a Connected World: A Challenge for Society. 2012 Third International Conference on Emerging Security Technologies (pp. 8-11). Institute of Electrical and Electronics Engineers (IEEE).


Ghernaouti-Hélie S. , Berger R. (2012, May). Techno Sacré, cyberespace et protéisme numérique : répondre autrement aux interrogations profondes de l'humain. Lire demain - Des manuscrits antiques à l'ère digitale (pp. 709-724). Presses polytechniques et universitaires romandes.


Ben Ayed G. , Ghernaouti-Hélie S. (2011, Apr). Digital Identity Attributes Cohesion: Major Issues and Challenges for E-services Access Control. ICITeS'2011 - International Conference on Information Technology and e-Services - April 10-12 .


Ben Ayed G. , Ghernaouti-Hélie S. (2011, Jan). Digital Identity Management within Networked Information Systems: From Vertical Silos View into Horizontal User-Supremacy Processes Management. The 14th International Conference on Network-Based Information Systems (NBiS 2011), Sept. 7-9 (pp. 98-103). IEEE publications.


Ben Ayed G. , Ghernaouti-Hélie S. (2011, Mar). Claim-Based Digital Identity Fusion to Access E-Services: Major Issues and Challenges in Digital Society. International Conference on Information and Computer Applications, ICICA 2011 ,March 18-20. IEEE Press.


Ben Ayed G. , Ghernaouti-Hélie S. (2011, Jul). XRD Metadata to Make Digital Identity Less Visible and Foster Trusted Collaborations across Networked Computing Ecosystems. Networked Digital Technologies : Third International Conference, NDT 2011, Macau, China, July 11-13, 2011. Proceedings, 136.


Ben Hayed G. , Ghernaouti S. (2011, Jan). Privacy requirements specification for digital identity management systems implementation: Towards a digital society of privacy. 2011 International Conference for Internet Technology and Secured Transactions. IEEE. Peer Reviewed


Ghernaouti-Hélie S. (2011, Jan). Going digital: Cybersecurity and confidence in a connected world. Second Worldwide Cybersecurity Summit :Mobilizing for International Action, EWI 2011 .


Ghernaouti-Hélie S., Simms D. ; Tashi I. (2011, Sep). Protecting Information in a Connected World: A Question of Security and of Confidence in Security. Network-Based Information Systems (NBiS), 2011 14th International Conference on, Sept. 7-9 (pp. 208-212). IEEE publications.


Ghernaouti-Hélie S., Tashi I. ; Simms D. (2011, Mar). Optimizing security efficiency through effective risk management. 25th International Conference on Advanced Information Networking & Application (IEEE, AINA 2011) - Workshop Security Tools & Solutions - 22-25 March 2011. IEEE.


Ghernaouti-Hélie S. (2010, Feb). A national strategy for an effective cybersecurity approach and culture. 5th International conference on Availability, Reliability and Security: ARES 2010, Proceedings (pp. 370-373). IEEE. Peer Reviewed


Ghernaouti-Hélie S. (2010, Jun). Human rights in a digital interconnected world. Proceeding - 18th Biennial Conference International Telecommunication Society (ITS) in association with the 27th Annual Conference of the Japan Society of Information and Communication Research (JSICR) . Peer Reviewed


Ghernaouti-Hélie S., Tashi I. ; Simms D. (2010, Feb). A multi-stage methodology for ensuring appropriate security culture and governance. 5th International conference on Availability, Reliability and Security: ARES 2010, Proceedings (pp. 353-360). IEEE. Peer Reviewed


Schjolberg S. , Ghernaouti-Hélie S. (2010, Jun). Needs of an United Nation convention on cybersecurity and presentation of a Global Protocol on Cybersecurity and Cybercrime to answer them. Proceeding - 18th Biennial Conference International Telecommunication Society (ITS) in association with the 27th Annual Conference of the Japan Society of Information and Communication Research (JSICR) . Peer Reviewed


Tashi I. , Ghernaouti-Hélie S. (2010, Jun). Assessing the Legal and Regulatory Compliance Dimension of the Information Security. Proceeding - 18th Biennial Conference International Telecommunication Society (ITS) in association with the 27th Annual Conference of the Japan Society of Information and Communication Research (JSICR) . Peer Reviewed


Ghernaouti-Hélie S. (2009, Mar). An inclusive information society needs a global approach of information security. 4th international conference on Availability, Reliability and Security (ARES 2009), Proceedings (pp. 658-662). IEEE. Peer Reviewed


Ghernaouti-Hélie S., Simms D. ; Tashi I. (2009, Aug). Reasonable Security by Effective Risk Management Practices: From Theory to Practice. 12th International Conference on Network-Based Information Systems, 2009. NBIS '09. (pp. 226-233). IEEE. Peer Reviewed


Ghernaouti-Hélie S. , Tashi I. (2009, Mar). A security management assurance model to holistically assess the information security posture. Proceedings of the 4th international conference on Availability, Reliability and Security (ARES 2009) (pp. 756-761). IEEE. Peer Reviewed


Tashi I. , Ghernaouti-Hélie S. (2009, May). Information Security Management is not only Risk Management. Proceedings of the 2009 Fourth International Conference on Internet Monitoring and Protection (ICIMP 2009) (pp. 116-123). IEEE. Peer Reviewed


Tashi I. , Ghernaouti-Hélie S. (2009, Jan). An Holistic model to evaluate the Information Security Health State. European Telecommunications Standartization Institute (ETSI) 4th Security Workshop. Peer Reviewed


Länger T. , Ghernaouti-Hélie S. (2008, Jan). Next Steps towards Practical Application of Quantum Cryptography. Proceedings of Networking and Electronic Commerce Research Conference 2008 (NAEC 2008). Peer Reviewed


Länger T., Ghernaouti-Hélie S. ; Lenhart G. (2008, Jul). SECOQC / ETSI Open Initiative for Standardisation of Quantum Cryptography and Quantum Technologies. Proceedings of 17th International Laser Physics workshop, The International Journal Laser Physics. Peer Reviewed


Rass S., Sfaxi M.A., Ghernaouti-Hélie S. ; Kyamakya K. (2008, Feb). Secure Message Relay over Networks with QKD-Links. Proceedings of the Second International Conference on Quantum, Nano, and Micro Technologies (ICQNM 08) (pp. 10-15). Peer Reviewed


Tashi I. , Ghernaouti-Hélie S. (2008, Jul). Efficient Security Measurements and Metrics for Risk Assessment. The Third International Conference on Internet Monitoring and Protection (ICIMP 2008), Proceedings (pp. 131-138). Peer Reviewed


Ghernaouti-Hélie S. , Sfaxi M.A. (2007, Mar). Sharing information using quantum cryptography to reach the unconditional security. Proceedings of 5th Research, Innovation and Vision for the Future (RIVF) (pp. 175-180). IEEE. Peer Reviewed


Ghernaouti-Hélie S., Sfaxi M.A. ; Tashi I. (2007, Sep). How QKD can improve the security level of future e-commerce transactions. Proceedings of the 18th European Regional International Telecommunication Society Conference (ITS). Peer Reviewed


Tashi I. , Ghernaouti-Hélie S. (2007, Apr). Security metrics to improve information security management. Proceedings of 6th Annual Security Conference. Peer Reviewed


Tashi I. , Ghernaouti-Hélie S. (2007, Aug). ISO security standards as leverage on IT Security Management. Proceedings of 13th Americas Conference on Information Systems (AMCIS). Peer Reviewed


Tashi I. , Ghernaouti-Hélie S. (2007, Oct). Quantum security for business and commercial applications. Proceedings of Networking and Electronic Commerce Research Conference 2007 (NAEC 2007). Peer Reviewed


Villa A., Iglesias J. ; Ghernaouti-Hélie S. (2007, Oct). Knowledge Sharing by means of OpenAdap.net. Proceedings of 2nd Workshop IST_Africa - Supporting Research Engagement with Africa. Peer Reviewed


Villa A., Iglesias J. ; Ghernaouti-Hélie S. (2007, Sep). OpenAdap.net - A socialware for knowledge sharing. Proceedings of International Conference on Internet Technologies and Applications (ITA). Peer Reviewed


Villa A., Iglesias J. ; Ghernaouti-Hélie S. (2007, Jun). OpenAdapt.net: a dynamic middleware for knowledge production and distribution. Proceedings of International conference - Towards a Knowledge Society: Is Knowledge a Public Good? Dynamics of Knowledge Production and Distribution (ESSHRA). Bern. Peer Reviewed


Ghernaouti-Hélie S. (2006, Jun). Risques informatiques d'origine cybercriminelle et gestion de la sécurité. Proceedings of Colloque AFME. Montréal, Canada.


Ghernaouti-Hélie S. , Sfaxi M.A. (2006, Aug). Applying QKD to reach unconditional security in telecommunications. Proceedings of 17th International Telecommunication Society Conference (ITS Europe 2006). Amsterdam, The Netherlands. Peer Reviewed


Madhour H., Sfaxi M.A., Wentland M. ; Ghernaouti-Hélie S. (2006, Jul). Ownership Detection and Protection for Learning Objects. Proceedings of ICALT (International Conference on Advanced Learning Technologies) (pp. 784-788). IEEE. Peer Reviewed


Nguyen Thi M.T., Sfaxi M.A. ; Ghernaouti-Hélie S. (2006, Apr). Integration of quantum cryptography in 802.11 networks. Proceedings of The First International Conference on Availability, Reliability and Security (ARES 2006). Peer Reviewed


Rass S., Sfaxi M.A. ; Ghernaouti-Hélie S. (2006, Aug). Achieving Unconditional Security in Existing Networks using Quantum Cryptography. Proceedings of International Conference on Security and Cryptography (SECRYPT 2006) (pp. 207-210). Peer Reviewed


Tashi I. , Ghernaouti-Hélie S. (2006, Jun). La certification comme référentiel de classification de la sécurité. Proceedings of Colloque AFME, Montréal, Canada.


Villa A.E.P., Iglesias J. ; Ghernaouti-Hélie S. (2006, Jun). OpenAdap.Net: a Community-Based Shared System. Proceedings of 6th International Workshop Innovative Internet Community Systems. Neuchâtel, Switzerland. Peer Reviewed


Villa A.E.P., Iglesias J. ; Ghernaouti-Hélie S. (2006, May). OpenAdap.Net: a technical perspective. Proceedings Workshop IST_Africa - Supporting Research Engagement with Africa (IST-Africa 2006). Peer Reviewed


Villa A.E.P., Iglesias J. ; Ghernaouti-Hélie S. (2006, Oct). OpenAdap.net: a collaborative sharing environment. Proceedings of E-Challenges 2006. Peer Reviewed


Curriculum

Education

Doctor of Paris VI University in "Informatics and Telecommunication"
with distinction "Excellent"

Work experience

Full Professor
Swiss Cybersecurity Advisory and Research Group - HEC - UNIL

  • The First women Professor-promoted in Faculty of Business and Economics in 1987

  • President of the Social Commission of the University of Lausanne


Invited professor at the Sociology department of the University of Geneva (Internet and Society)
Cybersecurity and Cybercrime International Expert
Author of numerous books and publications on cyber issues
Key speaker for numerous events
One of the 100 most important personalities in French-speaking Switzerland (Forum des 100 Edition 2011 - l'Hebdo) and one of the 300 most influential figures in Switzerland (Bilan of 22 juin 2011)
She is an emblematic figure among scientists on the cutting edge of cybersecurity's research field.


Other activities

Various engagements and contributions
defending Human Rights, equal opportunities and dignity.
defending fundamental rights on Internet and in Cyberspace
protecting personal data and digital privacy

Events organization
Conferences and debates for general public and professionals
Scientific conferences and symposiums

Various editorial activities (one & off line)

Keywords

  • business intelligence
  • crisis management
  • cybercrime
  • cyberdefense
  • cybersecurity
  • cyberspace
  • data protection for individuals, organizations and states
  • economic crime
  • geopolitical context of security
  • information security audit
  • information security management
  • information security transverse and integrative approach
  • informational risk
  • informational security
  • interdisciplinary research
  • internet
  • internet philosophy
  • network and telecommunication
  • political, economical, social, legal and technological dimensions of ntic
  • protection of the critical infrastructures
  • public security
  • risk management (5)
  • security strategy
  • social networks (2)
  • training and sensitisation about information security needs and measures

 
 
Search


Internef - CH-1015 Lausanne - Suisse  -   Tél. +41 21 692 33 00  -   Fax +41 21 692 33 05
Swiss University