Distributed access control schemes sad usually use automatic access control configuration schemes. These methods rely on three criteria to improve the positioning of access control rules. In this paper we show that the alteration of one of these criteria can bring some redundancy in the access control configuration. This redundancy can be used to improve the trust a security officer can have in the access control process integrity. We demonstrate that the overhead generated by this redundancy is generally negligible when the underlying network is sufficiently big. Key-Word
Access control is the process of mediating every request to resources and data maintained by a syste...
We introduce the notion of resiliency policies in the context of access control systems. Such polici...
Access control (AC) is the core of every architectural solution for information security. Indeed, no...
We investigate the cost of changing access control policies dynamically as a response action in comp...
Many approaches have been used or proposed for providing security for information dissemination over...
Peer-reviewedThe existence of errors or inconsistencies in the configuration of security components,...
Access control is an important component in the security of communication systems. While cryptograph...
International audienceThis paper addresses the consistency of initially heterogeneous access control...
Part 5: Distributed SystemsInternational audienceDue to inherent delays and performance costs, the d...
As control systems are becoming more complex and capable with much functionality, it requires more e...
Firewalls and network access controls play important roles in security control and protection. Those...
Large networks service a significant number of endpoints, each of which access a sizable number of a...
System administrators specify the access control policy they want and implement the relevant configu...
In recent years, digitalization is having a great impact on industry. Especially the rising degree o...
Distance-bounding protocols can o er protection against attacks on access control systems that requ...
Access control is the process of mediating every request to resources and data maintained by a syste...
We introduce the notion of resiliency policies in the context of access control systems. Such polici...
Access control (AC) is the core of every architectural solution for information security. Indeed, no...
We investigate the cost of changing access control policies dynamically as a response action in comp...
Many approaches have been used or proposed for providing security for information dissemination over...
Peer-reviewedThe existence of errors or inconsistencies in the configuration of security components,...
Access control is an important component in the security of communication systems. While cryptograph...
International audienceThis paper addresses the consistency of initially heterogeneous access control...
Part 5: Distributed SystemsInternational audienceDue to inherent delays and performance costs, the d...
As control systems are becoming more complex and capable with much functionality, it requires more e...
Firewalls and network access controls play important roles in security control and protection. Those...
Large networks service a significant number of endpoints, each of which access a sizable number of a...
System administrators specify the access control policy they want and implement the relevant configu...
In recent years, digitalization is having a great impact on industry. Especially the rising degree o...
Distance-bounding protocols can o er protection against attacks on access control systems that requ...
Access control is the process of mediating every request to resources and data maintained by a syste...
We introduce the notion of resiliency policies in the context of access control systems. Such polici...
Access control (AC) is the core of every architectural solution for information security. Indeed, no...