This short paper reports on a current project to conduct a detailed investigation into non-security professionals vocabulary and understanding of e-infrastructure and assets, with the longer term aim of building an ontology and controlled natural language interface that will allow them to build security policies, incorporating complex concepts such as delegation of authority, separation of duties (SoD), obligations and conditions. The interface is designed around the principle of the virtuous circle, whereby the users controlled natural language input is converted into machine processable XML, and then converted back again into natural language, so that the user can compare the computers understanding of his policy with his own. The user ca...
Collaborative research can often have demands on finer-grained security that go beyond the authentic...
The goal of the research study reported here was to investigate policy authors ‟ ability to take des...
Information Systems today rarely are contained within a single user workstation, server, or networke...
This short paper reports on a current project to conduct a detailed investigation into non-security ...
With the rapid development of web and Grid services, many researchers want to access remote resource...
This thesis is based on the research carried out under the EPSRC-funded EEAP project and the EC-fund...
The implementation of usable security is particularly challenging in the growing field of Grid compu...
Abstract: The security configuration of large networked ICT systems is a difficult and error-prone t...
Abstract—While access control mechanisms have existed in computer systems since the 1960s, modern sy...
Summary. The Semantic Web aims at enabling sophisticated and autonomic machine to machine interactio...
Over the last 35 years, researchers have proposed many different forms of security policies to contr...
A lightweight role-based access control policy authoring tool was developed for e-Scientists, a comm...
We describe a more advanced authorisation infrastructure for identity management systems which in ad...
Abstract. Quite often attacks are enabled by mis-configurations generated by human errors. Policy-ba...
This paper presents a rule-based, domain specific language for modeling access control policies whic...
Collaborative research can often have demands on finer-grained security that go beyond the authentic...
The goal of the research study reported here was to investigate policy authors ‟ ability to take des...
Information Systems today rarely are contained within a single user workstation, server, or networke...
This short paper reports on a current project to conduct a detailed investigation into non-security ...
With the rapid development of web and Grid services, many researchers want to access remote resource...
This thesis is based on the research carried out under the EPSRC-funded EEAP project and the EC-fund...
The implementation of usable security is particularly challenging in the growing field of Grid compu...
Abstract: The security configuration of large networked ICT systems is a difficult and error-prone t...
Abstract—While access control mechanisms have existed in computer systems since the 1960s, modern sy...
Summary. The Semantic Web aims at enabling sophisticated and autonomic machine to machine interactio...
Over the last 35 years, researchers have proposed many different forms of security policies to contr...
A lightweight role-based access control policy authoring tool was developed for e-Scientists, a comm...
We describe a more advanced authorisation infrastructure for identity management systems which in ad...
Abstract. Quite often attacks are enabled by mis-configurations generated by human errors. Policy-ba...
This paper presents a rule-based, domain specific language for modeling access control policies whic...
Collaborative research can often have demands on finer-grained security that go beyond the authentic...
The goal of the research study reported here was to investigate policy authors ‟ ability to take des...
Information Systems today rarely are contained within a single user workstation, server, or networke...