In conventional database, the most popular access control model specifies policies explicitly for each role of every user against each data object manually. Nowadays, in large-scale …
In this paper we present a Risk Management System. The goal of the RMS is to decrease risks related to information access. The goal is met by taking the context of operations into …
En primer lugar, me gustaría agradecer a mis directores de tesis, Marta e Isaac, sin vuestra confianza este trabajo no hubiese sido posible. Habéis sido fuentes de inspiración y me …
Business organizations widely accepting cloud computing to handle their complex business process and increased business transactions. Organizations IT infrastructure and IT …
This thesis proposes an Ecosystem perspective for the engineering of SoS and CPS and illustrates the impact of this perspective in three areas of contribution category First, from a …
The fusion of pervasive internet connectivity and emerging technologies in smart cities creates fragile cyber-physical-natural ecosystems. Industrial Control Systems (ICS) are …
Risikobasierte Authentifizierung (RBA) ist eine adaptive Sicherheitsmaßnahme zur Stärkung passwortbasierter Authentifizierung. Sie zeichnet Merkmale während des Logins auf und …
P Marcus, M Kessel… - … Conference on Mobile …, 2013 - personales.upv.es
A number of studies extended access control policies with constraints, aiming at the restriction of mobile users' access to appropriate authorized areas. Recent research …