The need to analyze and compare the security specifications of different applications can arise in different contexts, such as the federated environments, to provide a unification layer for the federation, or, in the construction of security components, to support the reusability of security specifications. In this paper, we propose similarity criteria and associated metrics to compare security specifications of different applications and evaluate their similarities. We consider security specifications defined according to a role-based model, which provides powerful authorization mechanisms suitable for similarity analysis. We describe the application of the proposed similarity techniques to the construction and use of reusable security com...
Pressures are increasing on organisations to take an early and more systematic approach to security....
Separation of Duty (SOD) is a fundamental principle in security systems and has a long history in co...
Role based access control (RBAC) is attracting increasing attention as a security mechanism for both...
International audienceThe interaction between different applications and services requires expressin...
The interaction between different applications and services requires expressing their security prope...
Abstract. [Context and motivation] Security mechanisms, such as fire-walls and encryption, operation...
International audienceThis paper evaluates the security specification techniques that employ Role Ba...
This paper presents a model for structuring and reusing security requirements sources. The model ser...
This paper presents a model for structuring and reusing security requirements sources. The model ser...
Abstract. Various security requirements sources need to be incorporated when developing security req...
The paper proposes a security characterization structure of software components and their compositio...
This article describes how earlier detection of security problems and the implementation of solution...
Nowadays, the growth and complexity of functionalities of current information systems, especially dy...
In a distributed component based system, it is important to model and specify the QoS (quality of se...
The administration of large Role-Based Access Control (RBAC) systems is a challenging problem. In or...
Pressures are increasing on organisations to take an early and more systematic approach to security....
Separation of Duty (SOD) is a fundamental principle in security systems and has a long history in co...
Role based access control (RBAC) is attracting increasing attention as a security mechanism for both...
International audienceThe interaction between different applications and services requires expressin...
The interaction between different applications and services requires expressing their security prope...
Abstract. [Context and motivation] Security mechanisms, such as fire-walls and encryption, operation...
International audienceThis paper evaluates the security specification techniques that employ Role Ba...
This paper presents a model for structuring and reusing security requirements sources. The model ser...
This paper presents a model for structuring and reusing security requirements sources. The model ser...
Abstract. Various security requirements sources need to be incorporated when developing security req...
The paper proposes a security characterization structure of software components and their compositio...
This article describes how earlier detection of security problems and the implementation of solution...
Nowadays, the growth and complexity of functionalities of current information systems, especially dy...
In a distributed component based system, it is important to model and specify the QoS (quality of se...
The administration of large Role-Based Access Control (RBAC) systems is a challenging problem. In or...
Pressures are increasing on organisations to take an early and more systematic approach to security....
Separation of Duty (SOD) is a fundamental principle in security systems and has a long history in co...
Role based access control (RBAC) is attracting increasing attention as a security mechanism for both...