Since they manage a great number of sensitive assets, information and communication systems in health care and social (called SICSS) are quite good targets for malicious people. The MP61 project aims to face the lack of information security for SICSS, since classical access control models cannot deal with dynamic use of contexts and complexity of user organizations. One objective of MP6 is to define a tool to enable users to express security policies for SICSS, which satisfy expected security policies. This paper suggests a number of concepts which are relevant and necessary to define such policies. And last it shows how the expressiveness and deductive mechanisms of first order logical languages make it possible to model SICSS security pol...
This paper introduces a tool that is being developed for the expression of information security poli...
Abstract. There exist many approaches to specify and to define secu-rity policies. We present here a...
International audienceSecurity requirements are part of business requirements, either because they d...
Since they manage a great number of sensitive assets, information and communication systems in healt...
While information technology is essential in complex, cooperative and largely distributed applicatio...
This paper proposes a security model which is generic enough to cover all the diversity of Health Ca...
Abstract-Healthcare system consist of a number of sub-networks by physicatly. Since each sub-network...
The last years have seen the definition of many languages, models and standards tailored to specify ...
The main objective of this thesis is to define a high level logical language that can express comple...
This paper analyses the problem of specifying a security policy for organizations. First, various is...
Le contrôle d'accès permet de spécifier une partie de la politique de sécurité d'un SI (système d'in...
International audienceDesigning a security policy for an information system (IS) is a non-trivial ta...
Security is a key aspect in information systems (IS) development. One cannot build a bank IS without...
International audienceNone of the classical access control models such as DAC, MAC, RBAC, TBAC or TM...
We propose a language for formal specification of serviceoriented architectures. The language suppor...
This paper introduces a tool that is being developed for the expression of information security poli...
Abstract. There exist many approaches to specify and to define secu-rity policies. We present here a...
International audienceSecurity requirements are part of business requirements, either because they d...
Since they manage a great number of sensitive assets, information and communication systems in healt...
While information technology is essential in complex, cooperative and largely distributed applicatio...
This paper proposes a security model which is generic enough to cover all the diversity of Health Ca...
Abstract-Healthcare system consist of a number of sub-networks by physicatly. Since each sub-network...
The last years have seen the definition of many languages, models and standards tailored to specify ...
The main objective of this thesis is to define a high level logical language that can express comple...
This paper analyses the problem of specifying a security policy for organizations. First, various is...
Le contrôle d'accès permet de spécifier une partie de la politique de sécurité d'un SI (système d'in...
International audienceDesigning a security policy for an information system (IS) is a non-trivial ta...
Security is a key aspect in information systems (IS) development. One cannot build a bank IS without...
International audienceNone of the classical access control models such as DAC, MAC, RBAC, TBAC or TM...
We propose a language for formal specification of serviceoriented architectures. The language suppor...
This paper introduces a tool that is being developed for the expression of information security poli...
Abstract. There exist many approaches to specify and to define secu-rity policies. We present here a...
International audienceSecurity requirements are part of business requirements, either because they d...