Cyber-physical systems (CPS) and IoT systems are nowadays commonly designed as self-adaptive, endowing them with the ability to dynamically reconfigure to reflect their changing environment. This adaptation concerns also the security, as one of the most important properties of these systems. Though the state of the art on adaptivity in terms of security related to these systems can often deal well with fully anticipated situations in the environment, it becomes a challenge to deal with situations that are not or only partially anticipated. This uncertainty is however omnipresent in these systems due to humans in the loop, open-endedness and only partial understanding of the processes happening in the environment. In this paper, we pa...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
Affecting multiple parts in software systems, security requirements often tangle with functional req...
As organisations expand and interconnect, authorisation infrastructures become increasingly difficul...
Cyber-physical systems (CPS) and IoT systems are nowadays commonly designed as self-adaptive, endowi...
Cyber-physical systems (CPS) and IoT systems are nowadays commonly designed as self-adaptive, endowi...
none2noIn addition to traditional security challenges, the heterogeneity, dynamicity, and variabilit...
peer-reviewedAccess control systems are deployed in organizations to protect critical cyber-physica...
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a pro...
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a pro...
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a pro...
Specifying, enforcing and evolving access control policies is essential to prevent security breaches...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
Affecting multiple parts in software systems, security requirements often tangle with functional req...
As organisations expand and interconnect, authorisation infrastructures become increasingly difficul...
Cyber-physical systems (CPS) and IoT systems are nowadays commonly designed as self-adaptive, endowi...
Cyber-physical systems (CPS) and IoT systems are nowadays commonly designed as self-adaptive, endowi...
none2noIn addition to traditional security challenges, the heterogeneity, dynamicity, and variabilit...
peer-reviewedAccess control systems are deployed in organizations to protect critical cyber-physica...
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a pro...
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a pro...
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a pro...
Specifying, enforcing and evolving access control policies is essential to prevent security breaches...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
Affecting multiple parts in software systems, security requirements often tangle with functional req...
As organisations expand and interconnect, authorisation infrastructures become increasingly difficul...