We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An example resiliency policy requires that upon removal of any susers, there should still exist ddisjoint sets of users such that the users in each set together possess certain permissions of interest. Such a policy ensures that even when emergency situations cause some users to be absent, there still exist independent teams of users that have the permissions necessary for carrying out critical tasks. The Resiliency Checking Problem determines whether an access control state satisfies a given resiliency policy. We show that the general case of the problem and several...
The workflow satisfiability problem is the problem of finding an assignment of users to tasks (i.e.,...
Networked systems are subject to a wide range of challenges whose nature changes over time, includin...
The enforcement of fine-grained access control policies in constrained dynamic networks can become a...
We introduce the notion of resiliency policies in the context of access control systems. Such polici...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
Access control offers mechanisms to control and limit the actions or operations that are performed b...
Cyber-physical systems (CPS) are characterised by interactions of physical and computational compone...
Our goal is to achieve a high degree of fault tolerance through the control of a safety critical sys...
In ownership-based access control frameworks with the possibility of delegating permissions and admi...
International audienceThis paper explores the notion of resilience of a fault in a DES, as the abili...
Our goal is to achieve a high degree of fault tolerance through the control of a safety critical sys...
The condition of t-resilience stipulates that an n-process program is only obliged to make progress ...
International audienceConstraints such as separation-of-duty are widely used to specify requirements...
We present an access-control policy specification and verifi-cation process that is well-suited to m...
Workflows are complex operational processes that include security constraints restricting which user...
The workflow satisfiability problem is the problem of finding an assignment of users to tasks (i.e.,...
Networked systems are subject to a wide range of challenges whose nature changes over time, includin...
The enforcement of fine-grained access control policies in constrained dynamic networks can become a...
We introduce the notion of resiliency policies in the context of access control systems. Such polici...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
Access control offers mechanisms to control and limit the actions or operations that are performed b...
Cyber-physical systems (CPS) are characterised by interactions of physical and computational compone...
Our goal is to achieve a high degree of fault tolerance through the control of a safety critical sys...
In ownership-based access control frameworks with the possibility of delegating permissions and admi...
International audienceThis paper explores the notion of resilience of a fault in a DES, as the abili...
Our goal is to achieve a high degree of fault tolerance through the control of a safety critical sys...
The condition of t-resilience stipulates that an n-process program is only obliged to make progress ...
International audienceConstraints such as separation-of-duty are widely used to specify requirements...
We present an access-control policy specification and verifi-cation process that is well-suited to m...
Workflows are complex operational processes that include security constraints restricting which user...
The workflow satisfiability problem is the problem of finding an assignment of users to tasks (i.e.,...
Networked systems are subject to a wide range of challenges whose nature changes over time, includin...
The enforcement of fine-grained access control policies in constrained dynamic networks can become a...