International audienceWe propose in this paper a framework in which the security policies of services in a distributed environment can be expressed. Services interact by exchanging credentials. Each service is made up of an access control policy protecting the access to the service, and of a trust negotiation policy controlling the accessibility of the credentials for other services. We add a workflow layer for each service to model its dynamic evolution with respect to the performed accesses. Unlike most of the access control policies which are uniquely based on roles, we choose an attribute based framework leading to more flexibility in the characterization of users. The strengths of this framework are its ability to control and check the...
Distributed systems with decentralized control, such as peer-to-peer systems, computing grids acros...
In trust negotiation and other distributed proving systems, networked entities cooperate to form pro...
Abstract. Existing authorization mechanisms fail to provide powerful and robust tools for handling s...
International audienceWe propose in this paper a framework in which the security policies of service...
The main objective of this thesis is to define a high level logical language that can express comple...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
Multidomain environments where multiple organizations interoperate with each other are becoming a re...
Dynamic self-organizing groups like wikipedia, and f/oss have special security requirements not addr...
In open systems like the Internet, traditional approaches to security based on identity do not provi...
Abstract—Service-oriented computing promotes collaboration by defining the standards layer that allo...
We describe an architecture for secure, indepen-dent, interworking services (Oasis). Each service is...
Ensuring secure and authorized access to remote services and information resources in a dynamic coll...
This paper proposes a logic based framework that extends role based access control systems with dyna...
Authorization plays an essential role to ensure the security of a wide variety of computing and IT s...
In trust negotiation and other forms of distributed proving, networked entities cooperate to form pr...
Distributed systems with decentralized control, such as peer-to-peer systems, computing grids acros...
In trust negotiation and other distributed proving systems, networked entities cooperate to form pro...
Abstract. Existing authorization mechanisms fail to provide powerful and robust tools for handling s...
International audienceWe propose in this paper a framework in which the security policies of service...
The main objective of this thesis is to define a high level logical language that can express comple...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
Multidomain environments where multiple organizations interoperate with each other are becoming a re...
Dynamic self-organizing groups like wikipedia, and f/oss have special security requirements not addr...
In open systems like the Internet, traditional approaches to security based on identity do not provi...
Abstract—Service-oriented computing promotes collaboration by defining the standards layer that allo...
We describe an architecture for secure, indepen-dent, interworking services (Oasis). Each service is...
Ensuring secure and authorized access to remote services and information resources in a dynamic coll...
This paper proposes a logic based framework that extends role based access control systems with dyna...
Authorization plays an essential role to ensure the security of a wide variety of computing and IT s...
In trust negotiation and other forms of distributed proving, networked entities cooperate to form pr...
Distributed systems with decentralized control, such as peer-to-peer systems, computing grids acros...
In trust negotiation and other distributed proving systems, networked entities cooperate to form pro...
Abstract. Existing authorization mechanisms fail to provide powerful and robust tools for handling s...