Filters








415,663 Hits in 4.1 sec

Role-based viewing envelopes for information protection in collaborative modeling

C CERA
2004 Computer-Aided Design  
Information security and assurance are new frontiers for collaborative design.  ...  Role-based viewing is achieved through integration of multi-resolution geometry and with the security model.  ...  Role-based View A role-based view is a tailored 3D model which is customized for a specific user based on the roles defining the user's access permissions on the model.  ... 
doi:10.1016/s0010-4485(03)00203-3 fatcat:uxlhe6dj4jgktoi4nlr2wwc6uq

Role-based viewing envelopes for information protection in collaborative modeling

Christopher D. Cera, Taeseong Kim, JungHyun Han, William C. Regli
2004 Computer-Aided Design  
Information security and assurance are new frontiers for collaborative design.  ...  Role-based viewing is achieved through integration of multi-resolution geometry and with the security model.  ...  Role-based View A role-based view is a tailored 3D model which is customized for a specific user based on the roles defining the user's access permissions on the model.  ... 
doi:10.1016/j.cad.2003.09.014 fatcat:fu7ugfvd6vcbpcg3ocsypetghi

Toward sensitive information redaction in a collaborative, multilevel security environment

Peter Gehres, Nathan Singleton, George Louthan, John Hale
2010 Proceedings of the 6th International Symposium on Wikis and Open Collaboration - WikiSym '10  
The model allows for each page to be viewed at appropriate levels of classification transparently included or excluded based on the user's access level.  ...  Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia.  ...  Se-cureWiki constitutes a step toward a more truly collaborative model for high-security environments by integrating multiple security levels into dynamic, per-user views.  ... 
doi:10.1145/1832772.1832793 dblp:conf/wikis/GehresSLH10 fatcat:v7sztboqlban7cornpppa4gzfi

Multi-resolution Modeling in Collaborative Design [chapter]

JungHyun Han, Taeseong Kim, Christopher D. Cera, William C. Regli
2003 Lecture Notes in Computer Science  
This paper provides a framework for information assurance within collaborative design, based on a technique we call role-based viewing.  ...  Such rolebased viewing is achieved through integration of multi-resolution geometry and security models. 3D models are geometrically partitioned, and the partitioning is used to create multi-resolution  ...  Conclusions This paper has presented a new technique, role-based viewing, for collaborative 3D assembly design.  ... 
doi:10.1007/978-3-540-39737-3_50 fatcat:dgctu7b3kzh37idbgkt4llgmpm

Advanced Techniques and Tools for Secure Collaborative Modeling

Csaba Debreceni
2017 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems  
Unfortunately, traditional approaches for managing concurrent code development do not naturally extend to collaborative modeling which implies novel challenges.  ...  and incremental maintenance of view models to provide specific focus of the designers by abstracting from unnecessary details of the underlying system model.  ...  ACKNOWLEDGEMENT I would like to thank my advisor, Daniel Varro for his guidance during my research.  ... 
dblp:conf/models/Debreceni17 fatcat:nfamcsaxsvb73kdhv52w5bnxvu

The MONDO collaboration framework: secure collaborative modeling over existing version control systems

Csaba Debreceni, Gábor Bergmann, Márton Búr, István Ráth, Dániel Varró
2017 Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2017  
In this paper, we introduce the MONDO Collaboration Framework, which provides rule-based fine-grained model-level secure access control, property-based locking and automated model merge integrated over  ...  Model-based systems engineering of critical cyber-physical systems necessitates effective collaboration between different stakeholders while still providing secure protection of intellectual properties  ...  Access control policies for different collaborators are defined by security experts who are superusers from a security perspective.  ... 
doi:10.1145/3106237.3122829 dblp:conf/sigsoft/DebreceniBBRV17 fatcat:gau753zxujazvojtwdzw63nhqa

From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform [chapter]

Alexandre Kabil, Thierry Duval, Nora Cuppens, Gérard Le Comte, Yoran Halgand, Christophe Ponchel
2018 Lecture Notes in Computer Science  
Based on four Security Operations Centers (SOCs) visits we have made in different organizations, we have designed a cyber collaborative activity model which has been used as a reference to design our 3D  ...  Contrary to other research fields, cyber security is not harnessing yet the capabilities of Collaborative Virtual Environments (CVE) which can be used both for immersive and interactive data visualization  ...  or for internal security.  ... 
doi:10.1007/978-3-030-05171-6_14 fatcat:wxfdgzntande3lws4yn7swf7qe

Access Control for Collaborative Systems: A Web Services Based Approach

Anas Abou El Kalam, Yves Deswarte, Amine Baina, Mohamed Kaaniche
2007 IEEE International Conference on Web Services (ICWS 2007)  
This work proposes a new access control model for collaborative systems: "PolyOrBAC".  ...  On the one hand, we extend OrBAC (Organization-Based Access Control Model) to specify local as well as collaboration access control rules; on the other hand, we enforce these security policies by applying  ...  Our major aim in this paper is to define a global framework (model and mechanisms) for secure collaborative systems while respecting their functioning flexibilities.  ... 
doi:10.1109/icws.2007.30 dblp:conf/icws/KalamDBK07 fatcat:v2sh35jyazagnbxeg5rkydsm6u

3D CyberCOP: A Collaborative Platform for Cybersecurity Data Analysis and Training [chapter]

Alexandre Kabil, Thierry Duval, Nora Cuppens, Gérard Le Comte, Yoran Halgand, Christophe Ponchel
2018 Lecture Notes in Computer Science  
After visiting French Security Operations Centers (SOCs), we have defined a collaborative interaction model and some use-cases, to assess of the effectiveness of our solution.  ...  users to have a better understanding of a cyber situation by mediating interactions towards them and also by providing different points of view of the same data, on different scales.  ...  levels and who investigate incidents either for client companies or for internal security.  ... 
doi:10.1007/978-3-030-00560-3_24 fatcat:vw5mzfd4i5abrl733ooasrxiwi

Secure collaboration in mediator-free environments

Mohamed Shehab, Elisa Bertino, Arif Ghafoor
2005 Proceedings of the 12th ACM conference on Computer and communications security - CCS '05  
In this paper, we propose a distributed secure interoperability framework for mediator-free collaboration environments.  ...  We introduce the idea of secure access paths which enables domains to make localized access control decisions without having global view of the collaboration.  ...  The research of Mohamed Shehab and Arif Ghafoor has been supported by the sponsors of the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University, and the  ... 
doi:10.1145/1102120.1102130 dblp:conf/ccs/ShehabBG05 fatcat:3vo4y7u3bje3ho3umpmpx4wh3q

Collaborative Virtual Environment for Training Teams in Emergency Situations

C. Passos, S. Nazir, A.C. Mol, P.V. Carvalho
2016 Chemical Engineering Transactions  
For modelling the virtual environment we used Unity software for the land creation, and Autodesk 3ds Max for the scenery and objects. We include in the Unity core radiation detectors and avatars.  ...  This paper describes a Collaborative Virtual Environment (CVE) for training and assessment of collaboration among agents who deal with radiological and nuclear emergency situations at big events.  ...  Methodology for the CVE development for security agents training in big events The CVE modeling comprehends characteristics as shape and appearance of objects, ambient lighting, input and output devices  ... 
doi:10.3303/cet1653037 doaj:e92b20f263c44324b76efabbf48875de fatcat:24cezxlldzgmdc3ayhvjp5ury4

An interaction-based access control model (IBAC) for collaborative services

Mine Altunay, Gregory T. Byrd, Doug E. Brown, Ralph A. Dean
2008 2008 International Symposium on Collaborative Technologies and Systems  
We provide an access control model for a service participating in a collaboration.  ...  We propose a model for representing the collaboration context so that a service can be made aware of the existing interactions.  ...  Our access control model has an interaction-based view; each access requirement is stated for an interaction type.  ... 
doi:10.1109/cts.2008.4543977 dblp:conf/cts/AltunayBBD08 fatcat:n45vyyxpcvanbl55wvapsmmfqq

Efficiently supporting secure and reliable collaboration in scientific workflows

Jiangang Ma, Jinli Cao, Yanchun Zhang
2010 Journal of computer and system sciences (Print)  
In this paper, we present an access control framework and models for supporting secure and reliable collaboration.  ...  The proposed approaches combine control flows and data flow models to describe scientific workflows, and extend the atomicity sphere concept by considering two levels of atomicity abstraction at the level  ...  One such effective mechanism for balancing security and information choice for users is the concept of a view.  ... 
doi:10.1016/j.jcss.2009.11.008 fatcat:vjjpdlqrpnbhxdz5no5wcghode

Enhancement of National Collaboration Between Defence Establishment and Industry by Systems Approach

Jukka Anteroinen
2010 Journal of Military Studies  
The conceptual model of systems approach pursues to manage cooperation activities and mechanisms comprehensively and so fulfil expectations placed for the collaboration both by the defence establishment  ...  However, the model that it represents is of universal application, especially for countries that do not have a comprehensive defence industry but import the major part of their materiel from abroad.  ...  bid for collaboration model illustrates the conceptual collaboration model between the defence establishment and national industry.  ... 
doi:10.1515/jms-2016-0172 fatcat:ttkj6ed3sngvrfem3kaicegeiq

Idea to derive security policies from collaborative business processes

Ji Hu
2009 2009 13th Enterprise Distributed Object Computing Conference Workshops  
This paper introduces our ongoing research effort for developing algorithms and methods to derive security policies from formally defined business process models.  ...  However, managing security requirements in collaborative environments is error-prone, effort inefficient, and hard to be verified.  ...  SECURITY POLICIES FOR BUSINESS COLLABORATIONS Security related requirements can be managed by security policies.  ... 
doi:10.1109/edocw.2009.5331987 dblp:conf/edoc/Hu09 fatcat:hcwrxb2bl5balnlxvjoqcxcxme
« Previous Showing results 1 — 15 out of 415,663 results