International audienceConstraints such as separation-of-duty are widely used to specify requirements that supplement basic authorization policies. However, the existence of constraints (and authorization policies) may mean that a user is unable to fulfill her/his organizational duties because access to resources is denied. In short, there is a tension between the need to protect resources (using policies and constraints) and the availability of resources. Recent work on workflow satisfiability and resiliency in access control asks whether this tension compromises the ability of an organization to achieve its objectives. In this paper, we develop a new method of specifying constraints which subsumes much related work and allows a wider range of...
AbstractConfidentiality of information is an important aspect that developers should take into consi...
Many organizations struggle with ineffective and/or inefficient access control, but these problems a...
Access control policies describe high level requirements for access control systems. Access control ...
International audienceConstraints such as separation-of-duty are widely used to specify requirements...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
A major drawback of existing access control systems is that they have all been developed with a spec...
Many organizations struggle with ineffective and/or inefficient access control, but these problems a...
Restrictions and permissions in information systems – Authorization – can cause problems for those i...
Many organizations struggle with ineffective and/or inefficient access control, but these problems a...
Restrictions and permissions in information systems -- Authorization -- can cause problems for thos...
Abstract: Delegation is a proIIlIsmg alternative to traditional role administration paradigms in rol...
Enforcing access policies derived from management control principles is a way by which organisations...
AbstractSpecifying a security policy that includes both permissions and prohibitions, may lead to co...
AbstractAn access control system regulates the rights of users to gain access to resources in accord...
Abstract—Access control is fundamental in protecting in-formation systems but it also poses an obsta...
AbstractConfidentiality of information is an important aspect that developers should take into consi...
Many organizations struggle with ineffective and/or inefficient access control, but these problems a...
Access control policies describe high level requirements for access control systems. Access control ...
International audienceConstraints such as separation-of-duty are widely used to specify requirements...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
A major drawback of existing access control systems is that they have all been developed with a spec...
Many organizations struggle with ineffective and/or inefficient access control, but these problems a...
Restrictions and permissions in information systems – Authorization – can cause problems for those i...
Many organizations struggle with ineffective and/or inefficient access control, but these problems a...
Restrictions and permissions in information systems -- Authorization -- can cause problems for thos...
Abstract: Delegation is a proIIlIsmg alternative to traditional role administration paradigms in rol...
Enforcing access policies derived from management control principles is a way by which organisations...
AbstractSpecifying a security policy that includes both permissions and prohibitions, may lead to co...
AbstractAn access control system regulates the rights of users to gain access to resources in accord...
Abstract—Access control is fundamental in protecting in-formation systems but it also poses an obsta...
AbstractConfidentiality of information is an important aspect that developers should take into consi...
Many organizations struggle with ineffective and/or inefficient access control, but these problems a...
Access control policies describe high level requirements for access control systems. Access control ...