Specification and Enforcement of Dynamic Authorization Policies Oriented by Situations (original) (raw)
2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS)
visibility
…
description
6 pages
link
1 file
Sign up for access to the world's latest research.
checkGet notified about relevant papers
checkSave papers to use in your research
checkJoin the discussion with peers
checkTrack your impact
Related papers
Towards Privacy-Enhanced Authorization Policies and Languages
Lecture Notes in Computer Science, 2005
Specification and design of advanced authentication and authorization services
Computer Standards & Interfaces, 2005
An advanced policy based authorisation infrastructure
Proceedings of the 5th ACM workshop on Digital identity management, 2009
Modelling and Deploying Security Policies
Proceedings of the Fifth International Conference on Web Information Systems and Technologies, 2009
A Typed Model for Dynamic Authorizations
Electronic Proceedings in Theoretical Computer Science, 2016
Automated Decomposition of Access Control Policies
Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05)
Semantic-based Obligation for Context-Based Access Control
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
On the design, implementation and application of an authorisation architecture for web services
International Journal of Information and Computer Security, 2007
Arxiv preprint arXiv:0903.2171, 2009
Enabling automated threat response through the use of a dynamic security policy
Journal in Computer Virology, 2007
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Related papers
An Authorization Mechanism for a Document Database
1994
On Accesscheckingin Capability Based Systems
1987
Towards a Scalable and Dynamic Access Control System for Web Services
Proceedings of the 8th International Conference on Web Information Systems and Technologies, 2012
The Policy Machine for Security Policy Management
Lecture Notes in Computer Science, 2001
A policy-based access control mechanism for the corporate Web
Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), 2000
On the notion of redundancy in access control policies
2013
Automatic Composition of Services with Security Policies
2008 IEEE Congress on Services - Part I, 2008
Model-Checking Access Control Policies
2016
Role based access control for the world wide web
1997
Dynamic types for authentication*
Journal of Computer Security, 2007
Assessment of access control systems
2006
From Security Protocols to Systems Security
Lecture Notes in Computer Science, 2005
How to Specify Security Services: A Practical Approach
Lecture Notes in Computer Science, 2003
Implementing and Managing Policy Rules in Attribute Based Access Control
2015 IEEE International Conference on Information Reuse and Integration, 2015
Security Patterns for Physical Access Control Systems
Lecture Notes in Computer Science, 2007
2015 IEEE 28th Computer Security Foundations Symposium, 2015
The Patterns for Information System Security
Proceedings of the 11th International Conference on Enterprise Information
A Web Service for Hypermedia Role-Based Access Policies
IEEE Latin America Transactions, 2006
On the use of OWL reasoning for evaluating access control policies
2015
Context-Driven Policy Enforcement and Reconciliation for Web Services
Proceedings of the Eighth International Conference on Enterprise Information Systems, 2006
Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach
Journal of cybersecurity and privacy, 2022
Access to Data and Employee Actions for Information Security
Sciendo eBooks, 2019
The Russian Second Generation in Tallinn and Kohtla-Järve, 2011
The NIST model for role-based access control
Proceedings of the fifth ACM workshop on Role-based access control - RBAC '00, 2000