National audienceThe development of security policies for information systems is usually based on a systematic risks analysis, reducing them by adopting appropriate countermeasures. These risks analysis approaches are complex and designed for well-known and static environments. To overcome this limit, we propose to extend the Model Driven Security (MDS) approach to a MDS@Runtime vision to set a Security as a Service component. Plugged on the FraSCAti middleware, our security component selects, composes and orchestrates the security services depending on the execution context to avoid both under and over protection
Actuellement, les exploitants de process industriels se tournent vers des organismes indépendants po...
This thesis aims at investigating techniques to build and control efficient, dependableand privacy-p...
Starting from different decision contexts encountered in Infrastructure Asset Management especially ...
National audienceThe development of security policies for information systems is usually based on a ...
National audienceL'objectif de ce papier consiste à décrire la base d'anomalies créée dans le cadre ...
National audienceThe most difficult problem in the domain of privacy is the one of extended data pro...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
Cyber physical systems (CPS) denote systems that embed programmable components in order to control a...
National audienceL'installation et l'exécution d'applications sur les dispositifs mobiles est une tâ...
Natural, technological, economical, or sanitary risk, whatever origin it has, is a constant concern ...
Publication de la journée ADAPT 2011Cet article présente notre projet de recherche qui consiste à ad...
National audienceCompanies are increasingly confronted with the problems caused by their reliance on...
During the last twenty years, the impact of security concerns on the development and exploitation of...
En Europe, l'étiquetage des substances et préparations chimiques dangereuses apposé sur les conditio...
The information technologies are growing in a very fast manner, which makes the informationsystems e...
Actuellement, les exploitants de process industriels se tournent vers des organismes indépendants po...
This thesis aims at investigating techniques to build and control efficient, dependableand privacy-p...
Starting from different decision contexts encountered in Infrastructure Asset Management especially ...
National audienceThe development of security policies for information systems is usually based on a ...
National audienceL'objectif de ce papier consiste à décrire la base d'anomalies créée dans le cadre ...
National audienceThe most difficult problem in the domain of privacy is the one of extended data pro...
Embedded systems are used in several domains and are parts of our daily life : we use them when we u...
Cyber physical systems (CPS) denote systems that embed programmable components in order to control a...
National audienceL'installation et l'exécution d'applications sur les dispositifs mobiles est une tâ...
Natural, technological, economical, or sanitary risk, whatever origin it has, is a constant concern ...
Publication de la journée ADAPT 2011Cet article présente notre projet de recherche qui consiste à ad...
National audienceCompanies are increasingly confronted with the problems caused by their reliance on...
During the last twenty years, the impact of security concerns on the development and exploitation of...
En Europe, l'étiquetage des substances et préparations chimiques dangereuses apposé sur les conditio...
The information technologies are growing in a very fast manner, which makes the informationsystems e...
Actuellement, les exploitants de process industriels se tournent vers des organismes indépendants po...
This thesis aims at investigating techniques to build and control efficient, dependableand privacy-p...
Starting from different decision contexts encountered in Infrastructure Asset Management especially ...