ASPGen: an automatic security policy generating framework for apparmor

Y Li, C Huang, L Yuan, Y Ding… - 2020 IEEE Intl Conf on …, 2020 - ieeexplore.ieee.org
The security of the operating system has always been the basis of information systems.
Several security frameworks have been proposed to enhance the security of the operating …

Using ifttt to express and enforce ucon obligations

A La Marra, F Martinelli, P Mori, A Rizos… - … Security Practice and …, 2019 - Springer
Abstract If This Then That (IFTTT) is a free and widely used web-based platform where it is
possible to create applet chains (Applets) of simple conditional statements that combine …

A model-based approach for multi-level privacy policies derivation for cloud services

A Ghorbel, M Ghorbel, M Jmaiel - International Journal of …, 2021 - inderscienceonline.com
To benefit from the advantages offered by the cloud services, a data owner must move his
private data to external servers to be accessed and handled by unknown parties. This brings …

On the Accuracy Evaluation of Access Control Policies in a Social Network

J Yanez-Sierra, A Diaz-Perez… - 2020 International …, 2020 - ieeexplore.ieee.org
Access control policies are mandatory for organizations whose operation involves sharing
resources that must be kept private. In this paper, we address the problem of evaluating the …

Exploiting if this then that and usage control obligations for smart home security and management

G Giorgi, A La Marra, F Martinelli, P Mori… - Concurrency and …, 2022 - Wiley Online Library
In this article we present an application of the Usage Control paradigm to a Smart Home
infrastructure, based on a model extension and structured use of obligations. In the …

基于大语言模型的 AppArmor 安全策略自动生成方法

沙倚天, 刘少君, 钱欣, 吴越, 陈鹏… - 网络与信息安全 …, 2024 - infocomm-journal.com
在计算机信息系统的整体安全性中, 操作系统安全扮演着至关重要的角色,
而操作系统安全的基石是信息系统的安全. 目前, 已经有SELinux, AppArmor …

Usage Control in the Internet of Everything

A Rizos - 2020 - tesidottorato.depositolegale.it
The Internet of Things (IoT) is a world-wide network of heterogeneous interconnected
objects, uniquely addressable, which are based on standard communication protocols and …