Filters








653,322 Hits in 3.0 sec

Towards Access Control Model Engineering [chapter]

Winfried E. Kühnhauser, Anja Pölck
2011 Lecture Notes in Computer Science  
This paper argues that model engineering principles and tools supporting these principles are important steps towards model based security engineering.  ...  scope of domain-specific access control models.  ...  This paper motivates and identifies basic, model-independent engineering principles for access control (AC) security models.  ... 
doi:10.1007/978-3-642-25560-1_27 fatcat:puyvddzp5jbq7fwlhasdank4km

Towards model-centric engineering of a dynamic access control product line

Mahdi Derakhshanmanesh, Mazeiar Salehie, Jürgen Ebert
2012 Proceedings of the 16th International Software Product Line Conference on - SPLC '12 -volume 1  
In this position paper, we sketch an approach for engineering dynamic access control systems based on core concepts from dynamic software product lines and executable runtime models.  ...  In addition, different product variants of access control systems need to developed together systematically. These characteristics demand a product line engineering approach for enhanced reuse.  ...  Finally, we feel that integrating the process-related knowledge from traditional SPL engineering should be more in the focus of research towards engineering truly dynamic software product lines.  ... 
doi:10.1145/2364412.2364437 dblp:conf/splc/DerakhshanmaneshSE12 fatcat:lun7mdqokzbz7ffomccqtjo5xy

Towards an Access Control Model for Collaborative Healthcare Systems

Mohamed Abomhara, Geir M. Køien
2016 Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies  
Towards an Access Control Model for Collaborative Healthcare Systems.  ...  In this study, an access control model for collaborative healthcare systems is proposed.  ...  The management category comprises personnel Towards an Access Control Model for Collaborative Healthcare Systems who are mostly involved in managing others.  ... 
doi:10.5220/0005659102130222 dblp:conf/biostec/AbomharaK16 fatcat:zhgyls3m2zbtxawjp2pfrufd7y

Towards model-driven development of access control policies for web applications

Marianne Busch, Nora Koch, Massimiliano Masi, Rosario Pugliese, Francesco Tiezzi
2012 Proceedings of the Workshop on Model-Driven Security - MDsec '12  
We introduce a UML-based notation for graphically modeling systems' security aspects in a simple and intuitive way and a model-driven process that transforms graphical specifications of access control  ...  MODELING ACCESS CONTROL In this section, we outline UML-based Web Engineering (UWE) [5, 6] , an engineering approach for modeling web applications.  ...  UACML [16] provides a UML-based metametamodel for access control, which can be specialized into various meta-models for, e.g., role-based access control or mandatory access control.  ... 
doi:10.1145/2422498.2422502 dblp:conf/models/BuschKMPT12 fatcat:wf4sgfionvfjra4i5qcs2eykeq

ACaaS: Access Control as a Service for IaaS Cloud

Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi, Haiyong Xie
2013 2013 International Conference on Social Computing  
access control as a service (ACaaS) for supporting multiple access control models  As a reference implementation, we designed and implemented ACaaSRBAC, a service architecture that supports configurations  ...  Related Work 2013年9月10日星期二 The Laboratory of Security Engineering for Future Computing Slide 23  Authorization and access control solutions in clouds -An authorization model that supports multi-tenancy  ... 
doi:10.1109/socialcom.2013.66 dblp:conf/socialcom/WuZASX13 fatcat:bqefdkmhvjfzjcrtj75vc753y4

An Access Control Metamodel for Web Service-Oriented Architecture

Christian Emig, Frank Brandt, Sebastian Abeck, Jurgen Biermann, Heiko Klarl
2007 International Conference on Software Engineering Advances (ICSEA 2007)  
In this paper we present an access control model for WSOA and a blueprint of a WSOAaware authorization verification service which is part of the IdM architecture.  ...  In section 3 we discuss related work on access control models and propose our enhancement towards WSOA.  ...  Related Work on Access Control Models Formal access control models build the mathematical foundation to restrict access to resources.  ... 
doi:10.1109/icsea.2007.15 dblp:conf/icsea/EmigBABK07 fatcat:fgli43vjyrg73kriygreulmguu

Towards Security Assurance in Round-Trip Engineering: A Type-Based Approach

Jaime A. Pavlich-Mariscal, María Consuelo Franky, Ariel Lopez
2013 Electronical Notes in Theoretical Computer Science  
This paper proposes a round-trip engineering approach for access control that preserves security assurance both when generating code from models and vice versa.  ...  Security assurance is a property that ensures that the application code behaves consistently with the access control policy specified at the design level.  ...  As such, this is a first step towards a full-featured round-trip engineering mechanism for access control.  ... 
doi:10.1016/j.entcs.2013.02.007 fatcat:ehbn5j57hbbdxecdt6t374uqmq

2018 Index IEEE Letters of the Computer Society Vol. 1

2019 Letters of the IEEE Computer Society  
HyPE: A Hybrid Approach toward Policy Engineering in Attribute-Based Access Control.  ...  -June 2018 9-11 Probability distribution HyPE: A Hybrid Approach toward Policy Engineering in Attribute-Based Access Control.  ... 
doi:10.1109/locs.2019.2901241 fatcat:w2rexcfsg5d67bpcxbmaonwvia

Towards Digital Engineering – The Advent of Digital Systems Engineering [article]

Jingwei Huang, Adrian Gheorghe, Holly Handley, Pilar Pazos, Ariel Pinto, Samuel Kovacic, Andy Collins, Charles Keating, Andres Sousa-Poza, Ghaith Rabadi, Resit Unal, Teddy Cotter (+2 others)
2020 arXiv   pre-print
This paper explores digital systems engineering, which aims at developing theory, methods, models, and tools to support the emerging digital engineering.  ...  dependency relations among engineering artifacts; supporting model reproducibility and replicability; helping with trustworthiness evaluation of digital engineering artifacts.  ...  This paper is a revision and further development of our earlier white paper on digital systems engineering (Huang et al., 2019) .  ... 
arXiv:2002.11672v2 fatcat:3s3u2xlay5aodjlzqegpkteroq

Towards Attribute-Based Access Control Policy Engineering Using Risk [chapter]

Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin
2014 Lecture Notes in Computer Science  
In this paper, we consider a policy engineering problem for attribute-based access control. The general goal is to help a policy writer to specify access control policies.  ...  We use risk to quantify possible harm caused by misuses and abuses of granted access rights and apply the risk-benefit analysis to maximize the profit from granting an access.  ...  Introduction Attribute-based access control (ABAC) [10, 17] is a recently proposed accesscontrol model which generalizes the existing models such as Discretionary Access Control (DAC), Mandatory Access  ... 
doi:10.1007/978-3-319-07076-6_6 fatcat:ubiyv5gdjfcmxpiaektdlksniq

Towards Attribute-Based Access Control Policy Engineering Using Risk [chapter]

Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin
2014 Lecture Notes in Computer Science  
In this paper, we consider a policy engineering problem for attribute-based access control. The general goal is to help a policy writer to specify access control policies.  ...  We use risk to quantify possible harm caused by misuses and abuses of granted access rights and apply the risk-benefit analysis to maximize the profit from granting an access.  ...  Introduction Attribute-based access control (ABAC) [10, 17] is a recently proposed accesscontrol model which generalizes the existing models such as Discretionary Access Control (DAC), Mandatory Access  ... 
doi:10.1007/978-3-319-14114-5_6 fatcat:nda2inmc3rdbtogehavimiervi

An access control and authorization model with Open stack cloud for Smart Grid

Yagnik A Rathod
2020 Advances in Distributed Computing and Artificial Intelligence Journal  
Our prime focus and interest is in the field of access control model based on Attribute base access control (ABAC) and with this paper we tried to integrate ABAC with openstack cloud for achieving finer  ...  Smart grid domain in considered as case study which requires support of multiple access policies (RBAC, ABAC or DAC etc) with our model for access control and authorization.  ...  We believe this work will facilitate the transition towards ABAC based access control and authorization models and will open prospective avenues to apply ABAC in real-world applications using the open-source  ... 
doi:10.14201/adcaij2020936987 fatcat:h6flqzwu4bekvg3zr7rn4to7au

Refined and Simplified Numerical Models of an Isolated Old Highway Bridge for PsD Testing [chapter]

Fabrizio Paolacci, Luigi Di Sarno, Raffaele De Risi, Giuseppe Abbiati, Arkam Mohammad Zeki Mohamad, Marialaura Malena, Daniele Corritore
2015 Geotechnical, Geological and Earthquake Engineering  
The advent of laboratory-controlled experiments, in combination with field observations, allowed during the last decades a fast advancement towards what we know today as modern earthquake engineering,  ...  In an effort towards capitalizing on the existing infrastructures in Europe for experimental testing in earthquake engineering, the European Commission financed the SERIES Project (Seismic Engineering  ... 
doi:10.1007/978-3-319-10136-1_13 fatcat:vptcurf3svhhzirpndywlvs254

Thinking Towards a Pattern Language for Predicate Based Encryption Crypto-Systems

Jan de Muijnck-Hughes, Ishbel Duncan
2012 2012 IEEE Sixth International Conference on Software Security and Reliability Companion  
Providing an efficient means to realise distributed encrypted access control.  ...  Predicate Based Encryption (PBE) is a novel family of public key encryption schemes that allows for expressive, and fine-grained, access control to be integrated within the cryptographic process.  ...  Access Control Although Group Information Secrecy will model the confidentiality aspect of a PBE scheme, the style of access control also needs to be modelled.  ... 
doi:10.1109/sere-c.2012.34 dblp:conf/ssiri/Muijnck-HughesD12 fatcat:kyjndnidgvdvrnofacx7oj7t3e

Communication and control modeling for collaborative engineering [chapter]

Z. Idelmerfaa, E. Rondeau, J. Richard
1996 IFIP Advances in Information and Communication Technology  
We propose to define this environment by using OMI modeling and to implement it on internet network. We develop these concepts in a project financed by the French Research Ministry.  ...  Collaborative engineering requires a distributed computer environment in which each user has a work station or a personal computer and which enables parallel and interrelated execution of operations.  ...  Collaborative engineering constraints on project control In the context of a collaborative engineering project, existing project control systems are limited in that they typically lay down a perfectly  ... 
doi:10.1007/978-0-387-35065-3_42 fatcat:srok2zkzjbf55n7wahvyqadaxu
« Previous Showing results 1 — 15 out of 653,322 results