Access control is a crucial concern to build secure IT systems and, more specifically, to protect the confidentiality of information. However, access control is necessary, but not sufficient. Actually, IT systems can manipulate data to provide services to users. The results of a data processing may disclose information concerning the objects used in the data processing itself. Therefore, the control of information flow results fundamental to guarantee data protection. In the last years many information flow control models have been proposed. However, these frameworks mainly focus on the detection and prevention of improper information leaks and do not provide support for the dynamical creation of new objects.In this paper we extend our prev...
Access control is facing many challenges for information protection in ubiquitous and cloud computin...
AbstractConfidentiality of information is an important aspect that developers should take into consi...
[[abstract]]It is very important to integrate business processes rapidly in the current competitive ...
Access control is a crucial concern to build secure IT systems and, more specifically, to protect th...
Access control is a crucial concern to build secure IT systems and, more specifically, to protect t...
This paper presents an approach to control information flow in object-oriented systems that takes in...
We describe principles and implementation details of access control for newly created objects – like...
Providing security for a general-purpose database system is an expensive operation. An access contro...
International audienceIn this paper, we introduce a formal property characterizing access control po...
Discretionary access control, based on checking access requests against users' authorizations, does ...
In distributed applications, multiple objects cooperate to achieve some objectives. Each object is m...
Users who play roles in an executing application may be in different security levels. In the applica...
Abstract—Because information flow control mechanisms often rely on an underlying authorization mecha...
International audienceEnsuring security of data is one of the fundamental needs of people. In this c...
AbstractWe present in this article a precise security model for data confidentiality in the framewor...
Access control is facing many challenges for information protection in ubiquitous and cloud computin...
AbstractConfidentiality of information is an important aspect that developers should take into consi...
[[abstract]]It is very important to integrate business processes rapidly in the current competitive ...
Access control is a crucial concern to build secure IT systems and, more specifically, to protect th...
Access control is a crucial concern to build secure IT systems and, more specifically, to protect t...
This paper presents an approach to control information flow in object-oriented systems that takes in...
We describe principles and implementation details of access control for newly created objects – like...
Providing security for a general-purpose database system is an expensive operation. An access contro...
International audienceIn this paper, we introduce a formal property characterizing access control po...
Discretionary access control, based on checking access requests against users' authorizations, does ...
In distributed applications, multiple objects cooperate to achieve some objectives. Each object is m...
Users who play roles in an executing application may be in different security levels. In the applica...
Abstract—Because information flow control mechanisms often rely on an underlying authorization mecha...
International audienceEnsuring security of data is one of the fundamental needs of people. In this c...
AbstractWe present in this article a precise security model for data confidentiality in the framewor...
Access control is facing many challenges for information protection in ubiquitous and cloud computin...
AbstractConfidentiality of information is an important aspect that developers should take into consi...
[[abstract]]It is very important to integrate business processes rapidly in the current competitive ...