[PDF][PDF] A policy-based management approach to security in cloud systems.
N Abwnawar - 2020 - academia.edu
In the era of service-oriented computing, ICT systems exponentially grow in their size and
complexity, becoming more and more dynamic and distributed, often spanning across …
complexity, becoming more and more dynamic and distributed, often spanning across …
[PDF][PDF] Interval temporal logic
Abstract Interval Temporal Logic (ITL) is a flexible notation for both propositional and first-
order reasoning about periods of time found in descriptions of hardware and software …
order reasoning about periods of time found in descriptions of hardware and software …
Verification and enforcement of access control policies
Access control mechanisms protect critical resources of systems from unauthorized access.
In a policy-based management approach, administrators define user privileges as rules that …
In a policy-based management approach, administrators define user privileges as rules that …
A formal approach for the identification of redundant authorization policies in Kubernetes
E Zahoor, M Chaudhary, S Akhtar, O Perrin - Computers & Security, 2023 - Elsevier
Application containerization allows for efficient resource utilization and improved
performance when compared to traditional virtualization techniques. However, managing …
performance when compared to traditional virtualization techniques. However, managing …
Influencing factors identification in smart society for insider threat in law enforcement agency using a mixed method approach
K Kisenasamy, S Perumal, V Raman… - International Journal of …, 2021 - Springer
One of the main principle goals for threat protection is to understand the behavior of the
employee. An employee who is trusted will have the potential to cause more harm to the …
employee. An employee who is trusted will have the potential to cause more harm to the …
Challenges in engineering self-adaptive authorisation infrastructures
As organisations expand and interconnect, authorisation infrastructures become
increasingly difficult to manage. Several solutions have been proposed, including self …
increasingly difficult to manage. Several solutions have been proposed, including self …
[LIBRO][B] Self-adaptive Authorisation Infrastructures
CM Bailey - 2015 - search.proquest.com
Traditional approaches in access control rely on immutable criteria in which to decide and
award access. These approaches are limited, notably when handling changes in an …
award access. These approaches are limited, notably when handling changes in an …
Shadowed authorization policies-a disaster waiting to happen?
E Zahoor, U Bibi, O Perrin - … Conference, Hong Kong, China, January 19 …, 2019 - Springer
Abstract Information security has been in the mainstream of computing for the last few
decades and our increasing reliance on the large scale distributed systems, such as the …
decades and our increasing reliance on the large scale distributed systems, such as the …
Low-latency service data aggregation using policy obligations
S Reiff-Marganiec, M Tilly… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
The Internet of Things, large scale sensor networks or even in social media, are now well
established and their use is growing daily. Usage scenarios in these fields highlight the …
established and their use is growing daily. Usage scenarios in these fields highlight the …
[PDF][PDF] Modeling of work-based access control for cooperative healthcare systems with xacml
M Abomhara, H Nergaard - Proceedings of the Fifth international …, 2016 - personales.upv.es
Access control is ideal for managing access to information and controlling legitimate user
activities by mediating every user attempt to access a system resource. However, in a …
activities by mediating every user attempt to access a system resource. However, in a …