Security policy provides a way to define the constraints on behavior of the members belonging to a system, organization or other entities. With the development of IT technology such as Grid Computing and Cloud Computing, more and more applications and platforms exchange their data and services for cooperating. Toward this trend, security becomes an important issue and security policy has to be applied in order to ensure the safety of data and service interaction. In this thesis, we deal with one type of security policy: access control policy. Access control policy protects the privileges of resource's utilization and there exist different policy models for various scenarios. Our goal is to ensure that the service customer well expresses her...
In open systems like the Internet, traditional approaches to security based on identity do not provi...
International audienceThe interaction between different applications and services requires expressin...
Recent advance in cloud computing has transformed the way information is managed and consumed. Cloud...
Security policy provides a way to define the constraints on behavior of the members belonging to a s...
The growth of the Internet has been accompanied by the growth of e-services (e.g. e-commerce, ehealt...
The main objective of this thesis is to define a high level logical language that can express comple...
International audienceThe secure interaction between different applications and services requires ne...
Le contrôle d'accès permet de spécifier une partie de la politique de sécurité d'un SI (système d'in...
Security issues are delaying fast adoption of cloud computing and security mechanisms to ensure its ...
Security is a critical concern for any information system. Security properties such as confidentiali...
Interoperation and services sharing among different systems are becoming new paradigms for enterpris...
In order to protect resources from unauthorized access and data leakage in companies, security exper...
The Cloud computing paradigm promises reliable services, accessible from anywhere in the world, in a...
The paradigm of service composition emerged in the context of service oriented architectures, where ...
In open systems like the Internet, traditional approaches to security based on identity do not provi...
International audienceThe interaction between different applications and services requires expressin...
Recent advance in cloud computing has transformed the way information is managed and consumed. Cloud...
Security policy provides a way to define the constraints on behavior of the members belonging to a s...
The growth of the Internet has been accompanied by the growth of e-services (e.g. e-commerce, ehealt...
The main objective of this thesis is to define a high level logical language that can express comple...
International audienceThe secure interaction between different applications and services requires ne...
Le contrôle d'accès permet de spécifier une partie de la politique de sécurité d'un SI (système d'in...
Security issues are delaying fast adoption of cloud computing and security mechanisms to ensure its ...
Security is a critical concern for any information system. Security properties such as confidentiali...
Interoperation and services sharing among different systems are becoming new paradigms for enterpris...
In order to protect resources from unauthorized access and data leakage in companies, security exper...
The Cloud computing paradigm promises reliable services, accessible from anywhere in the world, in a...
The paradigm of service composition emerged in the context of service oriented architectures, where ...
In open systems like the Internet, traditional approaches to security based on identity do not provi...
International audienceThe interaction between different applications and services requires expressin...
Recent advance in cloud computing has transformed the way information is managed and consumed. Cloud...