As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based Access Control (Or-BAC) model, it is possible to express such requirements using the notion of context. In Or-BAC, each privilege (permission or obligation or prohibition) only applies in a given context. A context is viewed as an extra condition that must be satisfied to activate a given privilege. In this paper, we present a taxonomy of different types of context and investigate the data the information system must manage in order to deal with these different contexts. We then explain how to model them in the Or-BAC model
Abstract. This paper focuses on problems of access control for business processes. The subject of th...
International audienceDuring interoperability exchanges, organizations are jointly conducting comput...
Due to the rapid advancement of communication technologies, the ability to support access control to...
Security polices in accounting systems are always related with the active contexts, including times,...
The role-based access control (RBAC) has become the widely used access control system for providing ...
In the present age, context-awareness is an important aspect of the dynamic environments and the dif...
Context-aware computing is an important aspect of the pervasive computing environment and its variou...
This thesis presents a new access control model called Or-BAC (Organization-Based Access Control). W...
In persasive environments, with the possibility of offering users distributed access on applications...
In modern communication environments, the ability to provide access control to services in a context...
Abstract. To date, no methodical approach has been found to integrate multiple access control extens...
International audienceNone of the classical access control models such as DAC, MAC, RBAC, TBAC or TM...
ABSTRACT Widely strewn resources have made organizations engrossed to know not only who, when and fr...
Abstract. Context-aware systems acquire and integrate multi-faceted know-ledge about their environme...
Security is a crucial concern for commercial and mission critical applications in Web-based environm...
Abstract. This paper focuses on problems of access control for business processes. The subject of th...
International audienceDuring interoperability exchanges, organizations are jointly conducting comput...
Due to the rapid advancement of communication technologies, the ability to support access control to...
Security polices in accounting systems are always related with the active contexts, including times,...
The role-based access control (RBAC) has become the widely used access control system for providing ...
In the present age, context-awareness is an important aspect of the dynamic environments and the dif...
Context-aware computing is an important aspect of the pervasive computing environment and its variou...
This thesis presents a new access control model called Or-BAC (Organization-Based Access Control). W...
In persasive environments, with the possibility of offering users distributed access on applications...
In modern communication environments, the ability to provide access control to services in a context...
Abstract. To date, no methodical approach has been found to integrate multiple access control extens...
International audienceNone of the classical access control models such as DAC, MAC, RBAC, TBAC or TM...
ABSTRACT Widely strewn resources have made organizations engrossed to know not only who, when and fr...
Abstract. Context-aware systems acquire and integrate multi-faceted know-ledge about their environme...
Security is a crucial concern for commercial and mission critical applications in Web-based environm...
Abstract. This paper focuses on problems of access control for business processes. The subject of th...
International audienceDuring interoperability exchanges, organizations are jointly conducting comput...
Due to the rapid advancement of communication technologies, the ability to support access control to...