International audienceSecurity is top priority for pervasive applications, for which the number of reported incidents is in constant increase. Context-based security is an emerging approach. It aims at coping with the security problems resulting from the high heterogeneity and dynamicity of such environments. In this paper, we propose a new model for policies specification based on contextual graphs. It relies on a set of contextual information collected from the system and user's environments. This approach aims at providing a convenient way for modeling security requirements in complex systems
This paper presents the basics of a new paradigm that allows generators and consumers of global cont...
A method must be provided to support the analysis of security policy rules interdependencies in a (p...
A method must be provided to support the analysis of security policy rules interdependencies in a (p...
The wide adoption of handled devices and remote ser-vices arises a number of security problems for u...
Abstract. Context-based security is an approach for modeling adaptive security solutions based on th...
The Internet has proven to be the most convenient and demanding facility for various types of busine...
The openness and heterogeneity of next generation communication networks are now highlighting more s...
International audienceIn this paper, we present a formal contextual security model for pervasive com...
Abstract. The openness and heterogeneity of next generation communication networks are now highlight...
International audienceThe successful deployment of a security policy is closely related not only to ...
International audienceSecurity patterns capture proven security knowledge to help analysts tackle se...
International audienceSecuring the access to a server, guaranteeing a certain level of protection ov...
Abstract. Security patterns have been proposed to help analysts with lit-tle security knowledge to t...
AbstractRecent research in security shows a real need for contextual information in building highly ...
Abstract: Security management is now acknowledged as a key constituent of Information Systems (IS) m...
This paper presents the basics of a new paradigm that allows generators and consumers of global cont...
A method must be provided to support the analysis of security policy rules interdependencies in a (p...
A method must be provided to support the analysis of security policy rules interdependencies in a (p...
The wide adoption of handled devices and remote ser-vices arises a number of security problems for u...
Abstract. Context-based security is an approach for modeling adaptive security solutions based on th...
The Internet has proven to be the most convenient and demanding facility for various types of busine...
The openness and heterogeneity of next generation communication networks are now highlighting more s...
International audienceIn this paper, we present a formal contextual security model for pervasive com...
Abstract. The openness and heterogeneity of next generation communication networks are now highlight...
International audienceThe successful deployment of a security policy is closely related not only to ...
International audienceSecurity patterns capture proven security knowledge to help analysts tackle se...
International audienceSecuring the access to a server, guaranteeing a certain level of protection ov...
Abstract. Security patterns have been proposed to help analysts with lit-tle security knowledge to t...
AbstractRecent research in security shows a real need for contextual information in building highly ...
Abstract: Security management is now acknowledged as a key constituent of Information Systems (IS) m...
This paper presents the basics of a new paradigm that allows generators and consumers of global cont...
A method must be provided to support the analysis of security policy rules interdependencies in a (p...
A method must be provided to support the analysis of security policy rules interdependencies in a (p...