This paper presents the design principles for dynamic security modeling in risk-prone environments, where elements of the environment to be protected are classified in Contexts and are monitored and geo-referenced. Based on a motivating scenario, the security model elements are introduced building on the ABAC (Attribute Based Access Control) paradigm. Dynamicity is integrated into the model to make it self-adaptable to dynamic changes in the environment conditions, including the occurrence of risks and emergencies. The model aims at dynamically authorizing subjects to access diverse data and physical objects (resources) based on adaptive activation/deactivation of security rules and changes in subject or object attributes, while still prese...
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in t...
The increasing need to share information in dynamic environments has created a requirement for risk-...
The increasing need to share information in dynamic environments has created a requirement for risk-...
This paper presents the design principles for dynamic security modeling in risk-prone environments, ...
This paper presents adaptive access control for areas where risks require modifying authorizations d...
In dynamic and risk-prone environments, security rules should be flexible enough to permit the treat...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
Context-based access control is an emerging approach for modeling adaptive solution, making access c...
With the increasing complexity of cyberthreats, it is necessary to have tools to understand the chan...
Access control (AC) refers to mechanisms and policies that restrict access to resources, thus regula...
International audienceMaritime processes involve actors and systems that continuously change their u...
Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets ...
Situation Awareness is the perception of the elements in the environment within a volume of time and...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
Abstract—Security is primarily concerned with protecting assets from harm. Identifying and evaluatin...
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in t...
The increasing need to share information in dynamic environments has created a requirement for risk-...
The increasing need to share information in dynamic environments has created a requirement for risk-...
This paper presents the design principles for dynamic security modeling in risk-prone environments, ...
This paper presents adaptive access control for areas where risks require modifying authorizations d...
In dynamic and risk-prone environments, security rules should be flexible enough to permit the treat...
In monitored environments, where risks can be prevented via sensors and spatial data technologies, s...
Context-based access control is an emerging approach for modeling adaptive solution, making access c...
With the increasing complexity of cyberthreats, it is necessary to have tools to understand the chan...
Access control (AC) refers to mechanisms and policies that restrict access to resources, thus regula...
International audienceMaritime processes involve actors and systems that continuously change their u...
Security is primarily concerned with protecting assets from harm. Identifying and evaluating assets ...
Situation Awareness is the perception of the elements in the environment within a volume of time and...
Abstract—Over the years, role based access control (RBAC) has remained a dominant form of access con...
Abstract—Security is primarily concerned with protecting assets from harm. Identifying and evaluatin...
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in t...
The increasing need to share information in dynamic environments has created a requirement for risk-...
The increasing need to share information in dynamic environments has created a requirement for risk-...