A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Towards Access Control Model Engineering
[chapter]
2011
Lecture Notes in Computer Science
This paper argues that model engineering principles and tools supporting these principles are important steps towards model based security engineering. ...
scope of domain-specific access control models. ...
This paper motivates and identifies basic, model-independent engineering principles for access control (AC) security models. ...
doi:10.1007/978-3-642-25560-1_27
fatcat:puyvddzp5jbq7fwlhasdank4km
Towards model-centric engineering of a dynamic access control product line
2012
Proceedings of the 16th International Software Product Line Conference on - SPLC '12 -volume 1
In this position paper, we sketch an approach for engineering dynamic access control systems based on core concepts from dynamic software product lines and executable runtime models. ...
In addition, different product variants of access control systems need to developed together systematically. These characteristics demand a product line engineering approach for enhanced reuse. ...
Finally, we feel that integrating the process-related knowledge from traditional SPL engineering should be more in the focus of research towards engineering truly dynamic software product lines. ...
doi:10.1145/2364412.2364437
dblp:conf/splc/DerakhshanmaneshSE12
fatcat:lun7mdqokzbz7ffomccqtjo5xy
Towards an Access Control Model for Collaborative Healthcare Systems
2016
Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies
Towards an Access Control Model for Collaborative Healthcare Systems. ...
In this study, an access control model for collaborative healthcare systems is proposed. ...
The management category comprises personnel Towards an Access Control Model for Collaborative Healthcare Systems who are mostly involved in managing others. ...
doi:10.5220/0005659102130222
dblp:conf/biostec/AbomharaK16
fatcat:zhgyls3m2zbtxawjp2pfrufd7y
Towards model-driven development of access control policies for web applications
2012
Proceedings of the Workshop on Model-Driven Security - MDsec '12
We introduce a UML-based notation for graphically modeling systems' security aspects in a simple and intuitive way and a model-driven process that transforms graphical specifications of access control ...
MODELING ACCESS CONTROL In this section, we outline UML-based Web Engineering (UWE) [5, 6] , an engineering approach for modeling web applications. ...
UACML [16] provides a UML-based metametamodel for access control, which can be specialized into various meta-models for, e.g., role-based access control or mandatory access control. ...
doi:10.1145/2422498.2422502
dblp:conf/models/BuschKMPT12
fatcat:wf4sgfionvfjra4i5qcs2eykeq
ACaaS: Access Control as a Service for IaaS Cloud
2013
2013 International Conference on Social Computing
access control as a service (ACaaS) for supporting multiple access control models As a reference implementation, we designed and implemented ACaaSRBAC, a service architecture that supports configurations ...
Related Work
2013年9月10日星期二
The Laboratory of Security Engineering for Future Computing
Slide 23
Authorization and access control solutions in clouds
-An authorization model that supports multi-tenancy ...
doi:10.1109/socialcom.2013.66
dblp:conf/socialcom/WuZASX13
fatcat:bqefdkmhvjfzjcrtj75vc753y4
An Access Control Metamodel for Web Service-Oriented Architecture
2007
International Conference on Software Engineering Advances (ICSEA 2007)
In this paper we present an access control model for WSOA and a blueprint of a WSOAaware authorization verification service which is part of the IdM architecture. ...
In section 3 we discuss related work on access control models and propose our enhancement towards WSOA. ...
Related Work on Access Control Models Formal access control models build the mathematical foundation to restrict access to resources. ...
doi:10.1109/icsea.2007.15
dblp:conf/icsea/EmigBABK07
fatcat:fgli43vjyrg73kriygreulmguu
Towards Security Assurance in Round-Trip Engineering: A Type-Based Approach
2013
Electronical Notes in Theoretical Computer Science
This paper proposes a round-trip engineering approach for access control that preserves security assurance both when generating code from models and vice versa. ...
Security assurance is a property that ensures that the application code behaves consistently with the access control policy specified at the design level. ...
As such, this is a first step towards a full-featured round-trip engineering mechanism for access control. ...
doi:10.1016/j.entcs.2013.02.007
fatcat:ehbn5j57hbbdxecdt6t374uqmq
2018 Index IEEE Letters of the Computer Society Vol. 1
2019
Letters of the IEEE Computer Society
HyPE: A Hybrid Approach toward Policy Engineering in Attribute-Based Access Control. ...
-June 2018 9-11 Probability distribution HyPE: A Hybrid Approach toward Policy Engineering in Attribute-Based Access Control. ...
doi:10.1109/locs.2019.2901241
fatcat:w2rexcfsg5d67bpcxbmaonwvia
Towards Digital Engineering – The Advent of Digital Systems Engineering
[article]
2020
arXiv
pre-print
This paper explores digital systems engineering, which aims at developing theory, methods, models, and tools to support the emerging digital engineering. ...
dependency relations among engineering artifacts; supporting model reproducibility and replicability; helping with trustworthiness evaluation of digital engineering artifacts. ...
This paper is a revision and further development of our earlier white paper on digital systems engineering (Huang et al., 2019) . ...
arXiv:2002.11672v2
fatcat:3s3u2xlay5aodjlzqegpkteroq
Towards Attribute-Based Access Control Policy Engineering Using Risk
[chapter]
2014
Lecture Notes in Computer Science
In this paper, we consider a policy engineering problem for attribute-based access control. The general goal is to help a policy writer to specify access control policies. ...
We use risk to quantify possible harm caused by misuses and abuses of granted access rights and apply the risk-benefit analysis to maximize the profit from granting an access. ...
Introduction Attribute-based access control (ABAC) [10, 17] is a recently proposed accesscontrol model which generalizes the existing models such as Discretionary Access Control (DAC), Mandatory Access ...
doi:10.1007/978-3-319-07076-6_6
fatcat:ubiyv5gdjfcmxpiaektdlksniq
Towards Attribute-Based Access Control Policy Engineering Using Risk
[chapter]
2014
Lecture Notes in Computer Science
In this paper, we consider a policy engineering problem for attribute-based access control. The general goal is to help a policy writer to specify access control policies. ...
We use risk to quantify possible harm caused by misuses and abuses of granted access rights and apply the risk-benefit analysis to maximize the profit from granting an access. ...
Introduction Attribute-based access control (ABAC) [10, 17] is a recently proposed accesscontrol model which generalizes the existing models such as Discretionary Access Control (DAC), Mandatory Access ...
doi:10.1007/978-3-319-14114-5_6
fatcat:nda2inmc3rdbtogehavimiervi
An access control and authorization model with Open stack cloud for Smart Grid
2020
Advances in Distributed Computing and Artificial Intelligence Journal
Our prime focus and interest is in the field of access control model based on Attribute base access control (ABAC) and with this paper we tried to integrate ABAC with openstack cloud for achieving finer ...
Smart grid domain in considered as case study which requires support of multiple access policies (RBAC, ABAC or DAC etc) with our model for access control and authorization. ...
We believe this work will facilitate the transition towards ABAC based access control and authorization models and will open prospective avenues to apply ABAC in real-world applications using the open-source ...
doi:10.14201/adcaij2020936987
fatcat:h6flqzwu4bekvg3zr7rn4to7au
Refined and Simplified Numerical Models of an Isolated Old Highway Bridge for PsD Testing
[chapter]
2015
Geotechnical, Geological and Earthquake Engineering
The advent of laboratory-controlled experiments, in combination with field observations, allowed during the last decades a fast advancement towards what we know today as modern earthquake engineering, ...
In an effort towards capitalizing on the existing infrastructures in Europe for experimental testing in earthquake engineering, the European Commission financed the SERIES Project (Seismic Engineering ...
doi:10.1007/978-3-319-10136-1_13
fatcat:vptcurf3svhhzirpndywlvs254
Thinking Towards a Pattern Language for Predicate Based Encryption Crypto-Systems
2012
2012 IEEE Sixth International Conference on Software Security and Reliability Companion
Providing an efficient means to realise distributed encrypted access control. ...
Predicate Based Encryption (PBE) is a novel family of public key encryption schemes that allows for expressive, and fine-grained, access control to be integrated within the cryptographic process. ...
Access Control Although Group Information Secrecy will model the confidentiality aspect of a PBE scheme, the style of access control also needs to be modelled. ...
doi:10.1109/sere-c.2012.34
dblp:conf/ssiri/Muijnck-HughesD12
fatcat:kyjndnidgvdvrnofacx7oj7t3e
Communication and control modeling for collaborative engineering
[chapter]
1996
IFIP Advances in Information and Communication Technology
We propose to define this environment by using OMI modeling and to implement it on internet network. We develop these concepts in a project financed by the French Research Ministry. ...
Collaborative engineering requires a distributed computer environment in which each user has a work station or a personal computer and which enables parallel and interrelated execution of operations. ...
Collaborative engineering constraints on project control In the context of a collaborative engineering project, existing project control systems are limited in that they typically lay down a perfectly ...
doi:10.1007/978-0-387-35065-3_42
fatcat:srok2zkzjbf55n7wahvyqadaxu
« Previous
Showing results 1 — 15 out of 653,322 results