International audienceThe successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the security devices. The complexity of the security requirements is additionally increased when contextual constraints are taken into account. Such situations appear when addressing the dynamism of some security requirements or when searching a finer granularity for the security rules. The context denotes those specific conditions in which the security requirements are to be met. (Re)deploying a contextual security policy depends on the security device functionalities: either (1) the devices include all functionalities necessary to deal with a context...
Abstract. The widespread diffusion of wireless-enabled portable de-vices creates novel opportunities...
The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users ...
International audienceIn conventional security systems, protected resources such as documents, hardw...
International audienceThe successful deployment of a security policy is closely related not only to ...
International audienceSecuring the access to a server, guaranteeing a certain level of protection ov...
In the present age, context-awareness is an important aspect of the dynamic environments and the dif...
The wide adoption of handled devices and remote ser-vices arises a number of security problems for u...
The growing diffusion of portable devices enable users to benefit from anytime and anywhere imprompt...
Abstract. Context-based security is an approach for modeling adaptive security solutions based on th...
International audienceSecurity is top priority for pervasive applications, for which the number of r...
One of the aspects of autonomic computing is self-protecting where systems are required to consisten...
Mobile devices are used in a variety of different situations, for example at work, at home, or while...
Mobile devices are used in a variety of different situations, for example at work, at home, or while...
International audienceIn this paper, we present a formal contextual security model for pervasive com...
Abstract: Security management is now acknowledged as a key constituent of Information Systems (IS) m...
Abstract. The widespread diffusion of wireless-enabled portable de-vices creates novel opportunities...
The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users ...
International audienceIn conventional security systems, protected resources such as documents, hardw...
International audienceThe successful deployment of a security policy is closely related not only to ...
International audienceSecuring the access to a server, guaranteeing a certain level of protection ov...
In the present age, context-awareness is an important aspect of the dynamic environments and the dif...
The wide adoption of handled devices and remote ser-vices arises a number of security problems for u...
The growing diffusion of portable devices enable users to benefit from anytime and anywhere imprompt...
Abstract. Context-based security is an approach for modeling adaptive security solutions based on th...
International audienceSecurity is top priority for pervasive applications, for which the number of r...
One of the aspects of autonomic computing is self-protecting where systems are required to consisten...
Mobile devices are used in a variety of different situations, for example at work, at home, or while...
Mobile devices are used in a variety of different situations, for example at work, at home, or while...
International audienceIn this paper, we present a formal contextual security model for pervasive com...
Abstract: Security management is now acknowledged as a key constituent of Information Systems (IS) m...
Abstract. The widespread diffusion of wireless-enabled portable de-vices creates novel opportunities...
The widespread diffusion of wireless-enabled portable devices creates novel opportunities for users ...
International audienceIn conventional security systems, protected resources such as documents, hardw...