The enforcement of fine-grained access control policies in constrained dynamic networks can become a challenging task. The inherit constraints present in those networks, which result from the limitations of the edge devices in terms of power, computational capacity and storage, require an effective and efficient access control mechanism to be in place to provide suitable monitoring and control of actions and regulate the access over the resources. In this article, we present RESPOnSE, a framework for the specification and enforcement of security policies within such environments, where the computational burden is transferred to high-tier nodes, while low-tier nodes apply risk-aware policy enforcement. RESPOnSE builds on a combination of two...
International audienceThis paper focuses on the enforcement of security properties fitting with dyna...
The abundance of large commercial and scientific data stores have driven the need for Petascale comp...
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in t...
Distributed environments such as Internet of Things, have an increasing need of introducing access a...
We investigate the cost of changing access control policies dynamically as a response action in comp...
Traditional access controls have evolved from being static and coarse-grained to being dynamic and v...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
We present a refined model for Role Based Access Control policies and define a risk measure for the ...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
In this paper, we follow the line of existing study on cryptographic enforcement of Role-Based Acces...
This paper presents adaptive access control for areas where risks require modifying authorizations d...
The increasing need to share information in dynamic environments has created a requirement for risk-...
Modern dynamic distributed information systems need access control policies to address controlling a...
Abstract—Generally the Military environments like battlefield and hostile networks operate in ad hoc...
International audienceThis paper focuses on the enforcement of security properties fitting with dyna...
The abundance of large commercial and scientific data stores have driven the need for Petascale comp...
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in t...
Distributed environments such as Internet of Things, have an increasing need of introducing access a...
We investigate the cost of changing access control policies dynamically as a response action in comp...
Traditional access controls have evolved from being static and coarse-grained to being dynamic and v...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
We present a refined model for Role Based Access Control policies and define a risk measure for the ...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
In this paper, we follow the line of existing study on cryptographic enforcement of Role-Based Acces...
This paper presents adaptive access control for areas where risks require modifying authorizations d...
The increasing need to share information in dynamic environments has created a requirement for risk-...
Modern dynamic distributed information systems need access control policies to address controlling a...
Abstract—Generally the Military environments like battlefield and hostile networks operate in ad hoc...
International audienceThis paper focuses on the enforcement of security properties fitting with dyna...
The abundance of large commercial and scientific data stores have driven the need for Petascale comp...
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in t...