International audienceOne of the most interesting paradigms of Ambient Intelligence is that networks of pervasive intelligent interfaces recognize our presence and mould our environment to our immediate needs. In this paper, we present an example of how an access control model such as XACML adapts its functionality at runtime to new and unforeseen requirements. In previous work, we have proposed a three levels hierarchy of artefacts to semantically represent Security and Dependability solutions so that they can be automatically applied and adapted to new context requirements. Here we apply those artefacts throughout two case studies covering (i) the representation of the XACML model and (ii) a Policy Enforcement Point. The use of these arte...
With lot of hype surrounding policy-based computing, XACML (eXtensible Access Control Markup Languag...
Abstract. Social Networks, as the main axis of Web 2.0, are creating a number of interesting challen...
Part 2: Security, Access Control and Intrusion DetectionInternational audienceUsage control model (U...
International audienceOne of the most interesting paradigms of Ambient Intelligence is that networks...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
Pervasive computing and Internet of Things (IoT) have recently received considerable interest to dep...
Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issu...
Risk-aware access control (RAAC) has shown promise as an approach to addressing the increasing need ...
Abstract. We present a formal, tool-supported approach to the design and maintenance of access contr...
We present a formal, tool-supported approach to the design and maintenance of access control policie...
Traditional access control solutions, based on preliminary identification and authentication of the ...
With the widespread use of web services, there is a need for adequate security and privacy support t...
International audienceRecently ubiquitous technology has invaded almost every aspect of the modern l...
One of the aspects of autonomic computing is self-protecting where systems are required to consisten...
Over the last few years there has been a rapid development of technologies such as ubiquitous comput...
With lot of hype surrounding policy-based computing, XACML (eXtensible Access Control Markup Languag...
Abstract. Social Networks, as the main axis of Web 2.0, are creating a number of interesting challen...
Part 2: Security, Access Control and Intrusion DetectionInternational audienceUsage control model (U...
International audienceOne of the most interesting paradigms of Ambient Intelligence is that networks...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
Pervasive computing and Internet of Things (IoT) have recently received considerable interest to dep...
Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issu...
Risk-aware access control (RAAC) has shown promise as an approach to addressing the increasing need ...
Abstract. We present a formal, tool-supported approach to the design and maintenance of access contr...
We present a formal, tool-supported approach to the design and maintenance of access control policie...
Traditional access control solutions, based on preliminary identification and authentication of the ...
With the widespread use of web services, there is a need for adequate security and privacy support t...
International audienceRecently ubiquitous technology has invaded almost every aspect of the modern l...
One of the aspects of autonomic computing is self-protecting where systems are required to consisten...
Over the last few years there has been a rapid development of technologies such as ubiquitous comput...
With lot of hype surrounding policy-based computing, XACML (eXtensible Access Control Markup Languag...
Abstract. Social Networks, as the main axis of Web 2.0, are creating a number of interesting challen...
Part 2: Security, Access Control and Intrusion DetectionInternational audienceUsage control model (U...