Calcul du risque dans les systèmes de contrôle d'accès: approche basée sur le flux d'informations

S Boulares - 2017 - di.uqo.ca
Les entreprises dépendent de l'information pour répondre à leurs besoins d'affaires. C'est
pour cela que des systèmes de contrôle d'accès sont mis en place pour assurer la protection …

Content sensitivity based access control model for big data

AK Thandapani Kumarasamy - 2017 - shareok.org
Big data technologies have seen tremendous growth in recent years. They are being widely
used in both industry and academia. In spite of such exponential growth, these technologies …

Content Sensitivity Based Access Control Model for Big Data

AKT Kumarasamy - 2017 - search.proquest.com
Big data technologies have seen tremendous growth in recent years. They are being widely
used in both industry and academia. In spite of such exponential growth, these technologies …

Sécurité des ressources collaboratives dans les réseaux sociaux d'entreprise

A Bouchami - 2016 - theses.hal.science
Cette thèse porte sur la sécurité dans les environnements collaboratifs. Nous nous sommes
particulièrement focalisés dans nos travaux sur la gestion des identités numériques, la …

[PDF][PDF] There are two sides to every question

C vs Attacker - researchgate.net
We investigate security enforcement mechanisms that run in parallel with a system; the aim
is to check and modify the run-time behaviour of a possible attacker in order to guarantee …

[PDF][PDF] An Access Authorization Scheme for Mobile Node Based on Risk Evaluation.

J Wang, J Li - Metallurgical & Mining Industry, 2015 - metaljournal.com.ua
Constraints on conventional access delegation rules on mobile nodes (MNs) are simple.
The overall fuzzy evaluation is used to integrate the trust risk that is assessed based on the …

Introducing Probabilities in Controller Strategies

J den Hartog, I Matteucci - International Workshop on Data Privacy …, 2014 - Springer
In this paper we propose a basic framework to merge security controllers with probabilistic
concepts. This framework provides a first step towards quantitative security achieved by …

[引用][C] Risk aware Access Control model for Trust Based collaborative organizations in cloud

R Aluvalu, K Chennam, A Jabbar, S Ahamed - International Journal of Engineering …, 2018

[引用][C] Risk-Based Access Control Model: A Systematic

HF Atlam, MA Azad, MO Alassafi, AA Alshdadi…