peer reviewedModel-Driven Security is a specialization of Model-Driven Engineering (MDE) that focuses on making security models productive, i.e., enforceable in the final deployment. Among the variety of models that have been studied in a MDE perspective, one can mention access control models that specify the access rights. So far, these models mainly focus on static definitions of access control policies, without taking into account the more complex, but essential, delegation of rights mechanism. User delegation is a meta-level mechanism for administrating access rights, which allows a user without any specific administrative privileges to delegate his/her access rights to another user. This paper analyses the main hard-points for introd...
Abstract The paper addresses the issue of providing access control via delegation and constraint man...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
International audienceOrganisations are facilitated and conducted using workflow management systems....
peer reviewedModel-Driven Security (Mds) is a specialized Model-Driven Engineering (Mde) approach fo...
One of the most challenging problems in managing large networks is the complexity of security admini...
Abstract. Delegation is a mechanism that allows a user A to act on another user B’s behalf by making...
International audienceIn the field of access control, delegation is an important aspect that is cons...
Part 4: Access Control IIInternational audienceIn this paper we first introduce a logic for describi...
Traditional approaches in access control rely on immutable criteria in which to decide and award acc...
International audienceSecurity is a key-challenge for software engineering, especially when consider...
International audienceDelegation mechanisms are receiving increasing interest from the research comm...
International audienceThe main aim of access control models is to provide means to simplify the mana...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
This paper introduces a model to facilitate delegation, including ad-hoc delegation, in cross securi...
International audienceWe address the issue of formally validating the deployment of access control s...
Abstract The paper addresses the issue of providing access control via delegation and constraint man...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
International audienceOrganisations are facilitated and conducted using workflow management systems....
peer reviewedModel-Driven Security (Mds) is a specialized Model-Driven Engineering (Mde) approach fo...
One of the most challenging problems in managing large networks is the complexity of security admini...
Abstract. Delegation is a mechanism that allows a user A to act on another user B’s behalf by making...
International audienceIn the field of access control, delegation is an important aspect that is cons...
Part 4: Access Control IIInternational audienceIn this paper we first introduce a logic for describi...
Traditional approaches in access control rely on immutable criteria in which to decide and award acc...
International audienceSecurity is a key-challenge for software engineering, especially when consider...
International audienceDelegation mechanisms are receiving increasing interest from the research comm...
International audienceThe main aim of access control models is to provide means to simplify the mana...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
This paper introduces a model to facilitate delegation, including ad-hoc delegation, in cross securi...
International audienceWe address the issue of formally validating the deployment of access control s...
Abstract The paper addresses the issue of providing access control via delegation and constraint man...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
International audienceOrganisations are facilitated and conducted using workflow management systems....