ABSTRACT Policy-based management could be a terribly effective methodology to guard sensitive info. However, the over claim of privileges is widespread in rising applications, together with mobile applications and social network services, as a result of the applications' users concerned in policy administration have very little information of policy-based management. The over claim will be leveraged by malicious applications, then result in serious privacy leakages and loss. To resolve this issue, this paper proposes a completely unique policy administration mechanism, mentioned as cooperative policy administration CPA, to change the policy administration. In CPA, a policy administrator will talk to different similar policies to line u...
Abstract-Healthcare system consist of a number of sub-networks by physicatly. Since each sub-network...
International audienceTodays enterprises rely entirely on their information systems, usually connect...
The tremendous development of Internet infrastructures as well as communication technologies has led...
Abstract: We introduce two approaches for improving privacy policy management in online social netwo...
Autonomic systems are needed to self-manage the increasing complexity of pervasive communications ac...
Personal Mobility Management System, a distributed application developed at the Multimedia & Mobile ...
Abstract—The advent of emerging computing technologies such as service-oriented architecture and clo...
The enforcement of sensitive policies in untrusted environments is still an open challenge for polic...
Currently, there is an increasing tendency to migrate the management of communications and informati...
International audienceMany papers have addressed policy-based management of networks focusing on sec...
The flexibility, scalability, dynamic nature, portability and identity-less features of Attribute Ba...
Managing access control policies can be a daunting process, given the frequent policy decisions that...
Policy-based management of computer systems, computer networks and devices is a critical technology ...
International audienceThe novel scenarios enabled by emerging mobile social applications raise serio...
Mobile social networks give online social networking sites the abilities to extend their services to...
Abstract-Healthcare system consist of a number of sub-networks by physicatly. Since each sub-network...
International audienceTodays enterprises rely entirely on their information systems, usually connect...
The tremendous development of Internet infrastructures as well as communication technologies has led...
Abstract: We introduce two approaches for improving privacy policy management in online social netwo...
Autonomic systems are needed to self-manage the increasing complexity of pervasive communications ac...
Personal Mobility Management System, a distributed application developed at the Multimedia & Mobile ...
Abstract—The advent of emerging computing technologies such as service-oriented architecture and clo...
The enforcement of sensitive policies in untrusted environments is still an open challenge for polic...
Currently, there is an increasing tendency to migrate the management of communications and informati...
International audienceMany papers have addressed policy-based management of networks focusing on sec...
The flexibility, scalability, dynamic nature, portability and identity-less features of Attribute Ba...
Managing access control policies can be a daunting process, given the frequent policy decisions that...
Policy-based management of computer systems, computer networks and devices is a critical technology ...
International audienceThe novel scenarios enabled by emerging mobile social applications raise serio...
Mobile social networks give online social networking sites the abilities to extend their services to...
Abstract-Healthcare system consist of a number of sub-networks by physicatly. Since each sub-network...
International audienceTodays enterprises rely entirely on their information systems, usually connect...
The tremendous development of Internet infrastructures as well as communication technologies has led...