[HTML][HTML] Self-adaptive federated authorization infrastructures

C Bailey, DW Chadwick, R de Lemos - Journal of Computer and System …, 2014 - Elsevier
Authorization infrastructures are an integral part of any network where resources need to be
protected. As networks expand and organizations start to federate access to their resources …

Run-time generation, transformation, and verification of access control models for self-protection

C Bailey, L Montrieux, R de Lemos, Y Yu… - Proceedings of the 9th …, 2014 - dl.acm.org
Self-adaptive access control, in which self-* properties are applied to protecting systems, is a
promising solution for the handling of malicious user behaviour in complex infrastructures. A …

[图书][B] Self-adaptive Authorisation Infrastructures

CM Bailey - 2015 - search.proquest.com
Traditional approaches in access control rely on immutable criteria in which to decide and
award access. These approaches are limited, notably when handling changes in an …

Malicious changeload for the resilience evaluation of self-adaptive authorisation infrastructures

C Bailey, R de Lemos - Future Generation Computer Systems, 2020 - Elsevier
Self-adaptive systems are able to modify their behaviour and/or structure in response to
changes that occur to the system, its environment, or even its goals. In terms of authorisation …

[PDF][PDF] 5.34 Runtime Testing of Self-Adaptive Systems

CE da Silva - Software Engineering for Self-Adaptive … - dagstuhl.sunsite.rwth-aachen.de
In our previous work we have tackled the problem of dynamically generating adaptation
plans in order to deal with situation not foreseen during development. We have developed a …