Self-adaptive access control, in which self- * properties are applied to protecting systems, is a promising solution for the handling of malicious user behaviour in complex infras-tructures. A major challenge in self-adaptive access con-trol is ensuring that chosen adaptations are valid, and pro-duce a satisfiable model of access. The contribution of this paper is the generation, transformation and verification of Role Based Access Control (RBAC) models at run-time, as a means for providing assurances that the adaptations to be deployed are valid. The goal is to protect the system against insider threats by adapting at run-time the access control policies associated with system resources, and access rights assigned to users. Depending on th...
In this paper, we follow the line of existing study on cryptographic enforcement of Role-Based Acces...
Any model of access control has two fundamental aims: to ensure that resources are protected from in...
Self-protecting access control mechanisms can be described as an approach to enforcing security in a...
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a pro...
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a pro...
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a pro...
We present an approach for dynamically reconfiguring the role-based access control (RBAC) of informa...
© 2017 IEEE. We present an approach for dynamically reconfiguring the role-based access control (RBA...
Traditional approaches in access control rely on immutable criteria in which to decide and award acc...
As organisations expand and interconnect, authorisation infrastructures become increasingly difficul...
Self-adaptive systems are able to modify their behaviour and/or structure in response to changes tha...
Self-adaptive systems are able to modify their behaviour and/or structure in response to changes tha...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
The paper presents an approach based on machine learning to refine attribute-based access control p...
In this paper, we follow the line of existing study on cryptographic enforcement of Role-Based Acces...
In this paper, we follow the line of existing study on cryptographic enforcement of Role-Based Acces...
Any model of access control has two fundamental aims: to ensure that resources are protected from in...
Self-protecting access control mechanisms can be described as an approach to enforcing security in a...
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a pro...
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a pro...
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a pro...
We present an approach for dynamically reconfiguring the role-based access control (RBAC) of informa...
© 2017 IEEE. We present an approach for dynamically reconfiguring the role-based access control (RBA...
Traditional approaches in access control rely on immutable criteria in which to decide and award acc...
As organisations expand and interconnect, authorisation infrastructures become increasingly difficul...
Self-adaptive systems are able to modify their behaviour and/or structure in response to changes tha...
Self-adaptive systems are able to modify their behaviour and/or structure in response to changes tha...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
The paper presents an approach based on machine learning to refine attribute-based access control p...
In this paper, we follow the line of existing study on cryptographic enforcement of Role-Based Acces...
In this paper, we follow the line of existing study on cryptographic enforcement of Role-Based Acces...
Any model of access control has two fundamental aims: to ensure that resources are protected from in...
Self-protecting access control mechanisms can be described as an approach to enforcing security in a...