Specification and Enforcement of Dynamic Authorization Policies Oriented by Situations (original) (raw)

Profile image of Bashar KabbaniBashar Kabbani

2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS)

visibility

description

6 pages

link

1 file

Sign up for access to the world's latest research.

checkGet notified about relevant papers

checkSave papers to use in your research

checkJoin the discussion with peers

checkTrack your impact

Towards Privacy-Enhanced Authorization Policies and Languages

Ernesto Damiani

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Specification and design of advanced authentication and authorization services

Jose Alfredo Montenegro

Computer Standards & Interfaces, 2005

View PDFchevron_right

An advanced policy based authorisation infrastructure

Kaniz Fatema

Proceedings of the 5th ACM workshop on Digital identity management, 2009

View PDFchevron_right

Modelling and Deploying Security Policies

Ruben Parra Alonso

Proceedings of the Fifth International Conference on Web Information Systems and Technologies, 2009

View PDFchevron_right

A Typed Model for Dynamic Authorizations

Silvia Ghilezan

Electronic Proceedings in Theoretical Computer Science, 2016

View PDFchevron_right

Automated Decomposition of Access Control Policies

David Chadwick

Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05)

View PDFchevron_right

Semantic-based Obligation for Context-Based Access Control

Dr. Ahmed Saaudi

Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

View PDFchevron_right

On the design, implementation and application of an authorisation architecture for web services

Vijay Varadharajan

International Journal of Information and Computer Security, 2007

View PDFchevron_right

Role-based access controls

David Ferraiolo

Arxiv preprint arXiv:0903.2171, 2009

View PDFchevron_right

Enabling automated threat response through the use of a dynamic security policy

Hervé Debar

Journal in Computer Virology, 2007

View PDFchevron_right

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

An Authorization Mechanism for a Document Database

Reijo Sulonen

1994

View PDFchevron_right

On Accesscheckingin Capability Based Systems

MOSES MUIRURI

1987

View PDFchevron_right

Towards a Scalable and Dynamic Access Control System for Web Services

Nadia Ben Azzouna

Proceedings of the 8th International Conference on Web Information Systems and Technologies, 2012

View PDFchevron_right

The Policy Machine for Security Policy Management

David Ferraiolo

Lecture Notes in Computer Science, 2001

View PDFchevron_right

A policy-based access control mechanism for the corporate Web

Naftaly Minsky

Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), 2000

View PDFchevron_right

On the notion of redundancy in access control policies

Mario Arrigoni Neri

2013

View PDFchevron_right

Automatic Composition of Services with Security Policies

Yannick Chevalier

2008 IEEE Congress on Services - Part I, 2008

View PDFchevron_right

Model-Checking Access Control Policies

Dimitar Guelev

View PDFchevron_right

Authorized

Catriona Macleod

2016

View PDFchevron_right

Role based access control for the world wide web

David Ferraiolo

1997

View PDFchevron_right

Dynamic types for authentication*

Michele Bugliesi

Journal of Computer Security, 2007

View PDFchevron_right

Assessment of access control systems

David Ferraiolo

2006

View PDFchevron_right

From Security Protocols to Systems Security

Brian Monahan

Lecture Notes in Computer Science, 2005

View PDFchevron_right

How to Specify Security Services: A Practical Approach

José L. Vivas

Lecture Notes in Computer Science, 2003

View PDFchevron_right

Implementing and Managing Policy Rules in Attribute Based Access Control

Vincent Hu

2015 IEEE International Conference on Information Reuse and Integration, 2015

View PDFchevron_right

Security Patterns for Physical Access Control Systems

Jose Ballesteros

Lecture Notes in Computer Science, 2007

View PDFchevron_right

Flow-Limited Authorization

Stephen Ndubuisi

2015 IEEE 28th Computer Security Foundations Symposium, 2015

View PDFchevron_right

The Patterns for Information System Security

diego abbo

Proceedings of the 11th International Conference on Enterprise Information

View PDFchevron_right

A Web Service for Hypermedia Role-Based Access Policies

Daniel Sanz

IEEE Latin America Transactions, 2006

View PDFchevron_right

On the use of OWL reasoning for evaluating access control policies

Mario Arrigoni Neri

2015

View PDFchevron_right

Context-Driven Policy Enforcement and Reconciliation for Web Services

Ghita Kouadri Mostefaoui

Proceedings of the Eighth International Conference on Enterprise Information Systems, 2006

View PDFchevron_right

Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach

Giorgia Tempestini

Journal of cybersecurity and privacy, 2022

View PDFchevron_right

Access to Data and Employee Actions for Information Security

Justyna Żywiołek

Sciendo eBooks, 2019

View PDFchevron_right

3. Integration policies

Raivo Vetik

The Russian Second Generation in Tallinn and Kohtla-Järve, 2011

View PDFchevron_right

The NIST model for role-based access control

David Ferraiolo

Proceedings of the fifth ACM workshop on Role-based access control - RBAC '00, 2000

View PDFchevron_right

Computer Science